Kevin A. Kwiat

According to our database1, Kevin A. Kwiat authored at least 151 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Transfer learning for detecting unknown network attacks.
EURASIP J. Information Security, 2019

2018
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding.
IEEE Trans. VLSI Syst., 2018

On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

GPU-Accelerated High-Throughput Online Stream Data Processing.
IEEE Trans. Big Data, 2018

Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018

A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018

Securing FPGA-based obsolete component replacement for legacy systems.
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018

iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity.
Proceedings of the 2018 International Conference on Computing, 2018

Diversity Modeling to Evaluate Security of Multiple SDN Controllers.
Proceedings of the 2018 International Conference on Computing, 2018

Enabling Cooperative IoT Security via Software Defined Networks (SDN).
Proceedings of the 2018 IEEE International Conference on Communications, 2018

QOI: Assessing Participation in Threat Information Sharing.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

ChainFS: Blockchain-Secured Cloud Storage.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Hardware Trojan Detection Game: A Prospect-Theoretic Approach.
IEEE Trans. Vehicular Technology, 2017

Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs.
IEEE Trans. Cogn. Comm. & Networking, 2017

Game Theory for Cyber Security and Privacy.
ACM Comput. Surv., 2017

Assessing Quality of Contribution in Information Sharing for Threat Intelligence.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Cloud security certifications: a comparison to improve cloud service provider security.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Electric grid power flow model camouflage against topology leaking attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A game theoretic approach for inspecting web-based malvertising.
Proceedings of the IEEE International Conference on Communications, 2017

Rethinking information sharing for threat intelligence.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

Synthesis of hardware sandboxes for Trojan mitigation in systems on chip.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Cyber Security Resource Allocation: A Markov Decision Process Approach.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Approximate Power Grid Protection Against False Data Injection Attacks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Estimation of Safe Sensor Measurements of Autonomous System Under Attack.
Proceedings of the 54th Annual Design Automation Conference, 2017

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip.
Proceedings of the Applied Reconfigurable Computing - 13th International Symposium, 2017

Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Game-Theoretic Approach for Testing for Hardware Trojans.
IEEE Trans. Multi-Scale Computing Systems, 2016

Quick eviction of virtual machines through proactive live snapshots.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Connectivity and rendezvous in distributed DSA networks.
Proceedings of the 2016 International Conference on Computing, 2016

RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Game Theory with Learning for Cyber Security Monitoring.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Design Diversity for Mitigating Monoculture Induced Threats.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

CSRS: Cyber Survive and Recover Simulator.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Quick Eviction of Virtual Machines through Proactive Snapshots.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Guest Editorial.
CIT, 2015

On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Hardware isolation technique for IRC-based botnets detection.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015

Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Modeling fault tolerant architectures with design diversity for secure systems.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Multinomial trust in presence of uncertainty and adversaries in DSA networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Multi-level VM replication based survivability for mission-critical cloud computing.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Bayesian inference based decision reliability under imperfect monitoring.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Capacity bounds of finite secondary cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An evolutionary game-theoretic framework for cyber-threat information sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber-Investment and Cyber-Information Exchange Decision Modeling.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Contract-Theoretic Resource Allocation for Critical Infrastructure Protection.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Game Theoretic Modeling to Enforce Security Information Sharing among Firms.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Applying chaos theory for runtime Hardware Trojan detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

On the use of design diversity in fault tolerant and secure systems: A qualitative analysis.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

G-Storm: GPU-enabled high-throughput online data processing in Storm.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Improving System Reliability Against Rational Attacks Under Given Resources.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2014

Social network attack simulation with honeytokens.
Social Netw. Analys. Mining, 2014

Trusted Online Social Network (OSN) services with optimal data management.
Computers & Security, 2014

A game theoretic approach to detect and co-exist with malicious nodes in wireless networks.
Computer Networks, 2014

Vector quantization based QoS evaluation in cognitive radio networks.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

Testing for Hardware Trojans: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Game Theoretic Modeling of Security and Interdependency in a Public Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Component survivability at runtime for mission-critical distributed systems.
The Journal of Supercomputing, 2013

Collaborative jamming and collaborative defense in cognitive radio networks.
Pervasive and Mobile Computing, 2013

Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach.
IEEE Journal on Selected Areas in Communications, 2013

Optimal Voting Strategy against Random and Targeted Attacks.
IJSSE, 2013

Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2013

Pricing-based routing in cognitive radio networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Game theoretic attack analysis in online social network (OSN) services.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Surviving in Cyberspace: A Game Theoretic Approach.
JCM, 2012

Traffic management in wireless sensor networks: Decoupling congestion control and fairness.
Computer Communications, 2012

Towards trusted data management in online social network (OSN) services.
Proceedings of the 2012 World Congress on Internet Security, 2012

An effective use of spectrum usage estimation for IEEE 802.22 networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Optimal State Management of Data Sharing in Online Social Network (OSN) Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Game theoretic analysis of users and providers behavior in network under scarce resources.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Optimal content delivery in DSA networks: A path auction based framework.
Proceedings of IEEE International Conference on Communications, 2012

Hierarchical adaptive QoS control for voting-based data collection in hostile scenarios.
Proceedings of the 8th International Conference on Network and Service Management, 2012

A game theoretic approach for modeling optimal data sharing on Online Social Networks.
Proceedings of the 9th International Conference on Electrical Engineering, 2012

Survivable Virtual Infrastructure Mapping in Virtualized Data Centers.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Cooperation in Wireless Networks with Unreliable Channels.
IEEE Trans. Communications, 2011

A dynamic reconfigurable routing framework for wireless sensor networks.
Ad Hoc Networks, 2011

Collaborative jamming and collaborative defense in Cognitive Radio Networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Fault tolerance for fight-through: a basis for strategic survival.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Trust based fusion over noisy channels through anomaly detection in cognitive radio networks.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Optimal Voting Strategy Against Rational Attackers.
Proceedings of the CRiSIS 2011, 2011

2010
A Game Theoretic Framework for Power Control in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Improving complex distributed software system availability through information hiding.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Congestion control and fairness in wireless sensor networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems.
Proceedings of the Computer Network Security, 2010

Attacker Detection Game in Wireless Networks with Channel Uncertainty.
Proceedings of IEEE International Conference on Communications, 2010

2009
User-input driven QoS management in ad hoc networks.
Computer Communications, 2009

Traffic based dynamic routing for wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Dynamic spectrum access in cognitive radio based tactical networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Cooperation in Ad Hoc Networks with Noisy Channels.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Coexistence with malicious nodes: A game theoretic approach.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
Enforcing cooperation in ad hoc networks with unreliable channel.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Retrofitting Cyber Physical Systems for Survivability through External Coordination.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Performance engineering of replica voting protocols for high assurance data collection systems.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.
Proceedings of the The Third International Conference on Availability, 2008

Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems.
TAAS, 2007

A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments.
IJDSN, 2007

An Economic Approach to Hierarchical Routing in Resource Rationed Ad Hoc Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Take Intelligent Risk and Optimize Decision Based on Time, Available Resources and Risk Tolerance Limits.
Proceedings of the 13th IEEE Real-Time and Embedded Technology and Applications Symposium, 2007

A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Secure Distributed Agreement Protocols for Information Assurance Applications.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

QoS-LI: QoS Loss Inference in Disadvantaged Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Effective worm detection for various scan techniques.
Journal of Computer Security, 2006

Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Replica voting: A distributed middleware service for real-time dependable systems.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Simulation-Based Validation of Protocols for Distributed Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Timed Publish-Subscribe Coomunication for Distributed Embedded Systems.
Proceedings of the 9th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2005), 2005

2004
Energy-efficient distributed authorisation server (DAS) placement for sensor networks.
IJHPCN, 2004

An Effective Architecture and Algorithm for Detecting Worms with Various Scan.
Proceedings of the Network and Distributed System Security Symposium, 2004

Energy-efficient placement/activation algorithms for authorization servers in sensor network.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Incorporating Timeliness in Atomic Write of Shared Data for Distributed Embedded Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

2003
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

Modeling the Spread of Active Worms.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

'Timed atomic write': a programming primitive for distributed embedded systems.
Proceedings of the Global Telecommunications Conference, 2003

2002
Using Markets to Engineer Resource Management for the Information Grid.
Information Systems Frontiers, 2002

2001
An Analytical Framework for Reasoning about Intrusions.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Can Reliability and Security be Joined Reliably and Securely?.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

2000
Engineering Resource Management for the Information Grid and the Emerging Role of E-Commerce.
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000

Exploiting the Overlap of Security and Fault-Tolerance.
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000

1996
Software Fault Tolerance Using Dynamically Reconfigurable FPGAs.
Proceedings of the 6th Great Lakes Symposium on VLSI (GLS-VLSI '96), 1996

1995
Modeling a versatile FPGA for prototyping adaptive systems.
Proceedings of the Sixth IEEE International Workshop on Rapid System Prototyping (RSP '95), 1995

1993
A Method for Consistent Fault Coverage Reporting.
IEEE Design & Test of Computers, 1993

1992
Effective concurrent test for a parallel-input multiplier using modulo 3.
Proceedings of the 10th IEEE VLSI Test Symposium (VTS'92), 1992

Empirical bounds on fault coverage loss due to LFSR aliasing.
Proceedings of the 10th IEEE VLSI Test Symposium (VTS'92), 1992

1991
Design verification using logic tests.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991

1988
Defining a Standard for Fault Simulator Evaluation.
Proceedings of the Proceedings International Test Conference 1988, 1988


  Loading...