Follow
Charles Kamhoua
Charles Kamhoua
DEVCOM Army Research Laboratory, Network Security Branch
Verified email at army.mil
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
8662017
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
481*2020
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
3002017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
2202017
Transfer learning for detecting unknown network attacks
J Zhao, S Shetty, JW Pan, C Kamhoua, K Kwiat
EURASIP Journal on Information Security 2019, 1-13, 2019
1172019
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
1152017
Countering selfish mining in blockchains
M Saad, L Njilla, C Kamhoua, A Mohaisen
2019 International Conference on Computing, Networking and Communications …, 2019
952019
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
872015
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
842019
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
692019
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11Th international conference on cloud computing (CLOUD), 302-309, 2018
672018
Reducing Informational Disadvantages to Improve Cyber Risk Management
S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ...
The Geneva Papers on Risk and Insurance-Issues and Practice 43, 224-238, 2018
652018
Blockchain for distributed systems security
S Shetty, CA Kamhoua, LL Njilla
John Wiley & Sons, 2019
642019
A survey of defensive deception: Approaches using game theory and machine learning
M Zhu, AH Anwar, Z Wan, JH Cho, CA Kamhoua, MP Singh
IEEE Communications Surveys & Tutorials 23 (4), 2460-2493, 2021
592021
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
572016
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
572011
Data provenance in the cloud: A blockchain-based approach
D Tosh, S Shetty, X Liang, C Kamhoua, LL Njilla
IEEE consumer electronics magazine 8 (4), 38-44, 2019
552019
Blocktrail: A scalable multichain solution for blockchain-based audit trails
A Ahmad, M Saad, L Njilla, C Kamhoua, M Bassiouni, A Mohaisen
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
522019
Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm
M Nojoumian, A Golchubian, L Njilla, K Kwiat, C Kamhoua
Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume …, 2019
512019
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
502018
The system can't perform the operation now. Try again later.
Articles 1–20