Charles Kamhoua
Charles Kamhoua
DEVCOM Army Research Laboratory, Network Security Branch
Verified email at
Cited by
Cited by
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
Game theory for cyber security and privacy
CT Do, NH Tran, C Hong, CA Kamhoua, KA Kwiat, E Blasch, S Ren, ...
ACM Computing Surveys (CSUR) 50 (2), 1-37, 2017
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
Transfer learning for detecting unknown network attacks
J Zhao, S Shetty, JW Pan, C Kamhoua, K Kwiat
EURASIP Journal on Information Security 2019 (1), 1-13, 2019
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
Countering selfish mining in blockchains
M Saad, L Njilla, C Kamhoua, A Mohaisen
2019 International Conference on Computing, Networking and Communications …, 2019
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
An evolutionary game-theoretic framework for cyber-threat information sharing
D Tosh, S Sengupta, C Kamhoua, K Kwiat, A Martin
2015 IEEE International Conference on Communications (ICC), 7341-7346, 2015
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11Th international conference on cloud computing (CLOUD), 302-309, 2018
A survey of defensive deception: Approaches using game theory and machine learning
M Zhu, AH Anwar, Z Wan, JH Cho, CA Kamhoua, MP Singh
IEEE Communications Surveys & Tutorials 23 (4), 2460-2493, 2021
Blockchain for distributed systems security
S Shetty, CA Kamhoua, LL Njilla
John Wiley & Sons, 2019
Reducing Informational Disadvantages to Improve Cyber Risk Management
S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ...
The Geneva Papers on Risk and Insurance-Issues and Practice 43, 224-238, 2018
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th international symposium on high assurance systems engineering …, 2016
Data provenance in the cloud: A blockchain-based approach
D Tosh, S Shetty, X Liang, C Kamhoua, LL Njilla
IEEE consumer electronics magazine 8 (4), 38-44, 2019
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou, K Makki
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
Blocktrail: A scalable multichain solution for blockchain-based audit trails
A Ahmad, M Saad, L Njilla, C Kamhoua, M Bassiouni, A Mohaisen
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
Adversarial machine learning for 5G communications security
YE Sagduyu, T Erpek, Y Shi
Game Theory and Machine Learning for Cyber Security, 270-288, 2021
Generative adversarial attacks against intrusion detection systems using active learning
D Shu, NO Leslie, CA Kamhoua, CS Tucker
Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20