Charles Kamhoua
Charles Kamhoua
US Army Research Laboratory, Network Security Branch
Verified email at mail.mil
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
3482017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
1002017
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
882017
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
502015
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
492017
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
452011
Game theoretic modeling of security and interdependency in a public cloud
CA Kamhoua, L Kwiat, KA Kwiat, JS Park, M Zhao, M Rodriguez
2014 IEEE 7th international conference on cloud computing, 514-521, 2014
412014
Game theoretic modeling to enforce security information sharing among firms
DK Tosh, S Sengupta, S Mukhopadhyay, CA Kamhoua, KA Kwiat
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
342015
Security-aware virtual machine allocation in the cloud: A game theoretic approach
L Kwiat, CA Kamhoua, KA Kwiat, J Tang, A Martin
2015 IEEE 8th International Conference on Cloud Computing, 556-563, 2015
332015
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
302016
Cyber-investment and cyber-information exchange decision modeling
DK Tosh, M Molloy, S Sengupta, CA Kamhoua, KA Kwiat
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
302015
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
292015
Mitigating routing misbehavior in multi-hop networks using evolutionary game theory
CA Kamhoua, N Pissinou, J Miller, SK Makki
2010 IEEE Globecom Workshops, 1957-1962, 2010
272010
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
252018
Exploring the attack surface of blockchain: A systematic overview
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
arXiv preprint arXiv:1904.03487, 2019
232019
G-Storm: GPU-enabled high-throughput online data processing in Storm
Z Chen, J Xu, J Tang, K Kwiat, C Kamhoua
2015 IEEE International Conference on Big Data (Big Data), 307-312, 2015
212015
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 302-309, 2018
192018
Game theoretic analysis of cooperation in autonomous multi hop networks: The consequences of unequal traffic load
CA Kamhoua, N Pissinou, SK Makki
2010 IEEE Globecom Workshops, 1973-1978, 2010
192010
A game-theoretic approach for testing for hardware trojans
CA Kamhoua, H Zhao, M Rodriguez, KA Kwiat
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 199-210, 2016
182016
Reducing Informational Disadvantages to Improve Cyber Risk Management
S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ...
The Geneva Papers on Risk and Insurance-Issues and Practice 43 (2), 224-238, 2018
172018
The system can't perform the operation now. Try again later.
Articles 1–20