Follow
Charles Kamhoua
Charles Kamhoua
US Army Research Laboratory, Network Security Branch
Verified email at army.mil
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
6612017
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
261*2020
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
2202017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
1852017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
882017
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
742015
Transfer learning for detecting unknown network attacks
J Zhao, S Shetty, JW Pan, C Kamhoua, K Kwiat
EURASIP Journal on Information Security 2019 (1), 1-13, 2019
672019
Countering selfish mining in blockchains
M Saad, L Njilla, C Kamhoua, A Mohaisen
2019 International Conference on Computing, Networking and Communications …, 2019
572019
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
532019
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11th international conference on cloud computing (CLOUD), 302-309, 2018
532018
Game theoretic modeling of security and interdependency in a public cloud
CA Kamhoua, L Kwiat, KA Kwiat, JS Park, M Zhao, M Rodriguez
2014 IEEE 7th international conference on cloud computing, 514-521, 2014
502014
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
502011
Reducing informational disadvantages to improve cyber risk management
S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ...
The Geneva Papers on Risk and Insurance-Issues and Practice 43 (2), 224-238, 2018
482018
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
472016
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
452019
Cyber-investment and cyber-information exchange decision modeling
DK Tosh, M Molloy, S Sengupta, CA Kamhoua, KA Kwiat
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
452015
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
442015
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
422018
iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity
DB Rawat, L Njilla, K Kwiat, C Kamhoua
2018 International Conference on Computing, Networking and Communications …, 2018
412018
Game theoretic modeling to enforce security information sharing among firms
DK Tosh, S Sengupta, S Mukhopadhyay, CA Kamhoua, KA Kwiat
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
392015
The system can't perform the operation now. Try again later.
Articles 1–20