Charles A. Kamhoua

Orcid: 0000-0003-2169-5975

According to our database1, Charles A. Kamhoua authored at least 195 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment.
Ad Hoc Networks, March, 2024

GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec., February, 2024

Decision Theory-Guided Deep Reinforcement Learning for Fast Learning.
CoRR, 2024

A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception.
IEEE Trans. Netw. Serv. Manag., September, 2023

Synthesizing Attack-Aware Control and Active Sensing Strategies Under Reactive Sensor Attacks.
IEEE Control. Syst. Lett., 2023

Optimizing Sensor Allocation Against Attackers With Uncertain Intentions: A Worst-Case Regret Minimization Approach.
IEEE Control. Syst. Lett., 2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.
CoRR, 2023

Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game.
Proceedings of the IEEE International Conference on Communications, 2023

Cyber Resilience Measurement Through Logical Attack Graph Analysis.
Proceedings of the IEEE International Conference on Communications, 2023

Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber Deception.
Proceedings of the 2nd on Graph Neural Networking Workshop 2023, 2023

IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception.
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023

Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC).
Proceedings of the International Conference on Computer, 2023

Game and Prospect Theoretic Hardware Trojan Testing.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

2022
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory.
IEEE Trans. Netw. Serv. Manag., 2022

Honeypot Allocation for Cyber Deception Under Uncertainty.
IEEE Trans. Netw. Serv. Manag., 2022

Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables.
J. Netw. Comput. Appl., 2022

Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things.
IEEE Internet Things J., 2022

A Partially Observable Stochastic Zero-sum Game for a Network Epidemic Control Problem.
Dyn. Games Appl., 2022

Understanding Dropout for Graph Neural Networks.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Cyber Deception Metrics For Interconnected Complex Systems.
Proceedings of the Winter Simulation Conference, 2022

MAVIPER: Learning Decision Tree Policies for Interpretable Multi-agent Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Deep Reinforcement Learning for Deception in IRS-assisted UAV Communications.
Proceedings of the IEEE Military Communications Conference, 2022

Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness.
Proceedings of the IEEE Military Communications Conference, 2022

Understanding Adversarial Examples Through Deep Neural Network's Classification Boundary and Uncertainty Regions.
Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022), 2022

Deep Learning for Secure Transmission in Wireless Communication Networks.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory.
Proceedings of the IEEE Global Communications Conference, 2022

A Network Centrality Game for Epidemic Control.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception.
IEEE Control. Syst. Lett., 2021

Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions.
CoRR, 2021

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey.
CoRR, 2021

Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats.
CoRR, 2021

A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning.
IEEE Commun. Surv. Tutorials, 2021

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021

Deep Learning for Cyber Deception in Wireless Networks.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions.
Proceedings of the 38th International Conference on Machine Learning, 2021

Learning Generative Deception Strategies in Combinatorial Masking Games.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Network Games with Strategic Machine Learning.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection.
IEEE Trans. Dependable Secur. Comput., 2020

Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising.
IEEE Trans. Dependable Secur. Comput., 2020

Blockchain Enabled Named Data Networking for Secure Vehicle-to-Everything Communications.
IEEE Netw., 2020

Secure-by-synthesis network with active deception and temporal logic specifications.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

Generative adversarial attacks against intrusion detection systems using active learning.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems.
Proceedings of the Security and Privacy in Communication Networks, 2020

Cybersecurity Deception Experimentation System.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Mitigation of Jamming Attacks via Deception.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Honeypot Allocation over Attack Graphs in Cyber Deception Games.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Software Diversity for Cyber Deception.
Proceedings of the IEEE Global Communications Conference, 2020

Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems.
Proceedings of the IEEE Global Communications Conference, 2020

Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Harnessing the Power of Deception in Attack Graph-Based Security Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Blocking Adversarial Influence in Social Networks.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Game Theoretic Framework for Software Diversity for Network Security.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Game Theory on Attack Graph for Cyber Deception.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Fast Approximate Score Computation on Large-Scale Distributed Data for Learning Multinomial Bayesian Networks.
ACM Trans. Knowl. Discov. Data, 2019

Transfer learning for detecting unknown network attacks.
EURASIP J. Inf. Secur., 2019

Learning and Planning in Feature Deception Games.
CoRR, 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games.
Comput. Secur., 2019

Secure Wireless Communications for Vehicle-to-Everything.
IEEE Commun. Mag., 2019

Data Provenance in the Cloud: A Blockchain-Based Approach.
IEEE Consumer Electron. Mag., 2019

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019

An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019

A game-theoretic framework for dynamic cyber deception in internet of battlefield things.
Proceedings of the MobiQuitous 2019, 2019

A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019

Compact Representation of Value Function in Partially Observable Stochastic Games.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Countering Selfish Mining in Blockchains.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Behavioral Cyber Deception: A Game and Prospect Theoretic Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

A moving target defense against adversarial machine learning.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

2018
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding.
IEEE Trans. Very Large Scale Integr. Syst., 2018

On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

GPU-Accelerated High-Throughput Online Stream Data Processing.
IEEE Trans. Big Data, 2018

Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018

Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018

Cloud Reliability: Possible Sources of Security and Legal Issues?
IEEE Cloud Comput., 2018

Optimal Deployments of Defense Mechanisms for the Internet of Things.
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018

A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018

Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Securing FPGA-based obsolete component replacement for legacy systems.
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018

Game Theoretic Characterization of Collusive Behavior Among Attackers.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A stochastic game approach to cyber-physical security with applications to smart grid.
Proceedings of the IEEE INFOCOM 2018, 2018

A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices.
Proceedings of the IEEE INFOCOM 2018, 2018

iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity.
Proceedings of the 2018 International Conference on Computing, 2018

Diversity Modeling to Evaluate Security of Multiple SDN Controllers.
Proceedings of the 2018 International Conference on Computing, 2018

Enabling Cooperative IoT Security via Software Defined Networks (SDN).
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

FPGA-oriented moving target defense against security threats from malicious FPGA tools.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

An Initial Study of Targeted Personality Models in the FlipIt Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Game theoretic modeling of cyber deception in the Internet of Battlefield Things.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

ChainFS: Blockchain-Secured Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Hardware Trojan Detection Game: A Prospect-Theoretic Approach.
IEEE Trans. Veh. Technol., 2017

Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs.
IEEE Trans. Cogn. Commun. Netw., 2017

Game Theory for Cyber Security and Privacy.
ACM Comput. Surv., 2017

Rethinking Information Sharing for Actionable Threat Intelligence.
CoRR, 2017

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017

Reputation Routing in MANETs.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Assessing Quality of Contribution in Information Sharing for Threat Intelligence.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Approach to detect non-adversarial overlapping collusion in crowdsourcing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Cloud security certifications: a comparison to improve cloud service provider security.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Electric grid power flow model camouflage against topology leaking attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Preventing Colluding Identity Clone Attacks in Online Social Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

A Markov Game Theoritic Approach for Power Grid Security.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

A game theoretic approach for inspecting web-based malvertising.
Proceedings of the IEEE International Conference on Communications, 2017

Rethinking information sharing for threat intelligence.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

Synthesis of hardware sandboxes for Trojan mitigation in systems on chip.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Cyber Security Resource Allocation: A Markov Decision Process Approach.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Approximate Power Grid Protection Against False Data Injection Attacks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Estimation of Safe Sensor Measurements of Autonomous System Under Attack.
Proceedings of the 54th Annual Design Automation Conference, 2017

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip.
Proceedings of the Applied Reconfigurable Computing - 13th International Symposium, 2017

Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Game-Theoretic Approach for Testing for Hardware Trojans.
IEEE Trans. Multi Scale Comput. Syst., 2016

Quick eviction of virtual machines through proactive live snapshots.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Connectivity and rendezvous in distributed DSA networks.
Proceedings of the 2016 International Conference on Computing, 2016

RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Game Theory with Learning for Cyber Security Monitoring.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Design Diversity for Mitigating Monoculture Induced Threats.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

CSRS: Cyber Survive and Recover Simulator.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Quick Eviction of Virtual Machines through Proactive Snapshots.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Hardware isolation technique for IRC-based botnets detection.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015

Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Modeling fault tolerant architectures with design diversity for secure systems.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Multinomial trust in presence of uncertainty and adversaries in DSA networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Multi-level VM replication based survivability for mission-critical cloud computing.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Bayesian inference based decision reliability under imperfect monitoring.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Capacity bounds of finite secondary cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An evolutionary game-theoretic framework for cyber-threat information sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber-Investment and Cyber-Information Exchange Decision Modeling.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Contract-Theoretic Resource Allocation for Critical Infrastructure Protection.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Game Theoretic Modeling to Enforce Security Information Sharing among Firms.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Applying chaos theory for runtime Hardware Trojan detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

On the use of design diversity in fault tolerant and secure systems: A qualitative analysis.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

G-Storm: GPU-enabled high-throughput online data processing in Storm.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Social network attack simulation with honeytokens.
Soc. Netw. Anal. Min., 2014

Trusted Online Social Network (OSN) services with optimal data management.
Comput. Secur., 2014

Diversity and System Security: A Game Theoretic Perspective.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Testing for Hardware Trojans: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Game Theoretic Modeling of Security and Interdependency in a Public Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Game theoretic attack analysis in online social network (OSN) services.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Surviving in Cyberspace: A Game Theoretic Approach.
J. Commun., 2012

Towards trusted data management in online social network (OSN) services.
Proceedings of the 2012 World Congress on Internet Security, 2012

Optimal State Management of Data Sharing in Online Social Network (OSN) Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Game theoretic analysis of users and providers behavior in network under scarce resources.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

A game theoretic approach for modeling optimal data sharing on Online Social Networks.
Proceedings of the 9th International Conference on Electrical Engineering, 2012

2011
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy.
Proceedings of IEEE International Conference on Communications, 2011

2010
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010


  Loading...