Follow
Charles Kamhoua
Charles Kamhoua
DEVCOM Army Research Laboratory, Network Security Branch
Verified email at army.mil
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
8882017
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
507*2020
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
3082017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
2262017
Transfer learning for detecting unknown network attacks
J Zhao, S Shetty, JW Pan, C Kamhoua, K Kwiat
EURASIP Journal on Information Security 2019, 1-13, 2019
1232019
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
1172017
Countering selfish mining in blockchains
M Saad, L Njilla, C Kamhoua, A Mohaisen
2019 International Conference on Computing, Networking and Communications …, 2019
1002019
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
912019
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
892015
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
752019
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11Th international conference on cloud computing (CLOUD), 302-309, 2018
692018
Blockchain for distributed systems security
S Shetty, CA Kamhoua, LL Njilla
John Wiley & Sons, 2019
662019
Reducing Informational Disadvantages to Improve Cyber Risk Management
S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ...
The Geneva Papers on Risk and Insurance-Issues and Practice 43, 224-238, 2018
662018
A survey of defensive deception: Approaches using game theory and machine learning
M Zhu, AH Anwar, Z Wan, JH Cho, CA Kamhoua, MP Singh
IEEE Communications Surveys & Tutorials 23 (4), 2460-2493, 2021
652021
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
592016
Data provenance in the cloud: A blockchain-based approach
D Tosh, S Shetty, X Liang, C Kamhoua, LL Njilla
IEEE consumer electronics magazine 8 (4), 38-44, 2019
582019
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
582011
Blocktrail: A scalable multichain solution for blockchain-based audit trails
A Ahmad, M Saad, L Njilla, C Kamhoua, M Bassiouni, A Mohaisen
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
552019
Establishing evolutionary game models for cyber security information exchange (cybex)
D Tosh, S Sengupta, CA Kamhoua, KA Kwiat
Journal of Computer and System Sciences 98, 27-52, 2018
532018
Generative adversarial attacks against intrusion detection systems using active learning
D Shu, NO Leslie, CA Kamhoua, CS Tucker
Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020
522020
The system can't perform the operation now. Try again later.
Articles 1–20