Follow
Deepak K. Tosh
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
8662017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
2202017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
1152017
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
872015
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11Th international conference on cloud computing (CLOUD), 302-309, 2018
672018
Tikiri—Towards a lightweight blockchain for IoT
E Bandara, D Tosh, P Foytik, S Shetty, N Ranasinghe, K De Zoysa
Future Generation Computer Systems 119, 154-165, 2021
582021
Data provenance in the cloud: A blockchain-based approach
D Tosh, S Shetty, X Liang, C Kamhoua, LL Njilla
IEEE consumer electronics magazine 8 (4), 38-44, 2019
552019
Privacy-preserving cybersecurity information exchange mechanism
I Vakilinia, DK Tosh, S Sengupta
2017 International Symposium on Performance Evaluation of Computer and …, 2017
512017
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
502018
Cyber-investment and cyber-information exchange decision modeling
DK Tosh, M Molloy, S Sengupta, CA Kamhoua, KA Kwiat
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
482015
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
462015
Blockchain-empowered secure internet-of-battlefield things (iobt) architecture
DK Tosh, S Shetty, P Foytik, L Njilla, CA Kamhoua
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 593-598, 2018
452018
Game theoretic modeling to enforce security information sharing among firms
DK Tosh, S Sengupta, S Mukhopadhyay, CA Kamhoua, KA Kwiat
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
432015
Exploring the attack surfaces in blockchain enabled smart cities
X Liang, S Shetty, D Tosh
2018 IEEE international smart cities conference (ISC2), 1-8, 2018
362018
3-way game model for privacy-preserving cybersecurity information exchange framework
I Vakilinia, DK Tosh, S Sengupta
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 829-834, 2017
332017
Attribute based sharing in cybersecurity information exchange framework
I Vakilinia, DK Tosh, S Sengupta
2017 International Symposium on Performance Evaluation of Computer and …, 2017
282017
Hidden markov model and cyber deception for the prevention of adversarial lateral movement
MAR Al Amin, S Shetty, L Njilla, DK Tosh, C Kamhoua
IEEE Access 9, 49662-49682, 2021
272021
An SDN based framework for guaranteeing security and performance in information-centric cloud networks
U Ghosh, P Chatterjee, D Tosh, S Shetty, K Xiong, C Kamhoua
2017 IEEE 10th international conference on cloud computing (CLOUD), 749-752, 2017
252017
Risk management using cyber-threat information sharing and cyber-insurance
DK Tosh, S Shetty, S Sengupta, JP Kesan, CA Kamhoua
International conference on game theory for networks, 154-164, 2017
252017
Three layer game theoretic decision framework for cyber-investment and cyber-insurance
DK Tosh, I Vakilinia, S Shetty, S Sengupta, CA Kamhoua, L Njilla, K Kwiat
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
222017
The system can't perform the operation now. Try again later.
Articles 1–20