Charles A. Kamhoua
Orcid: 0000-0003-2169-5975
According to our database1,
Charles A. Kamhoua
authored at least 209 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment.
Ad Hoc Networks, March, 2024
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec., February, 2024
Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception.
CoRR, 2024
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach.
Comput. Secur., 2024
Adaptive learning-based hybrid recommender system for deception in Internet of Thing.
Comput. Networks, 2024
An Unsupervised Graph Neural Network Approach to Deceive UAV Network Reconnaissance Attack.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception.
IEEE Trans. Netw. Serv. Manag., September, 2023
Synthesizing Attack-Aware Control and Active Sensing Strategies Under Reactive Sensor Attacks.
IEEE Control. Syst. Lett., 2023
Optimizing Sensor Allocation Against Attackers With Uncertain Intentions: A Worst-Case Regret Minimization Approach.
IEEE Control. Syst. Lett., 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber Deception.
Proceedings of the 2nd on Graph Neural Networking Workshop 2023, 2023
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, 2023
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC).
Proceedings of the International Conference on Computer, 2023
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023
Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
2022
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Netw. Serv. Manag., 2022
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables.
J. Netw. Comput. Appl., 2022
Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things.
IEEE Internet Things J., 2022
A Partially Observable Stochastic Zero-sum Game for a Network Epidemic Control Problem.
Dyn. Games Appl., 2022
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
Proceedings of the Winter Simulation Conference, 2022
MAVIPER: Learning Decision Tree Policies for Interpretable Multi-agent Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Understanding Adversarial Examples Through Deep Neural Network's Classification Boundary and Uncertainty Regions.
Proceedings of the Workshop on Artificial Intelligence Safety 2022 (AISafety 2022) co-located with the Thirty-First International Joint Conference on Artificial Intelligence and the Twenty-Fifth European Conference on Artificial Intelligence (IJCAI-ECAI-2022), 2022
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022
Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
IEEE Control. Syst. Lett., 2021
Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions.
CoRR, 2021
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey.
CoRR, 2021
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions.
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Blockchain Enabled Named Data Networking for Secure Vehicle-to-Everything Communications.
IEEE Netw., 2020
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Generative adversarial attacks against intrusion detection systems using active learning.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense.
IEEE Trans. Very Large Scale Integr. Syst., 2019
Fast Approximate Score Computation on Large-Scale Distributed Data for Learning Multinomial Bayesian Networks.
ACM Trans. Knowl. Discov. Data, 2019
EURASIP J. Inf. Secur., 2019
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games.
Comput. Secur., 2019
IEEE Consumer Electron. Mag., 2019
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019
A game-theoretic framework for dynamic cyber deception in internet of battlefield things.
Proceedings of the MobiQuitous 2019, 2019
A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
2018
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding.
IEEE Trans. Very Large Scale Integr. Syst., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
IEEE Trans. Big Data, 2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018
Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018
IEEE Cloud Comput., 2018
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A stochastic game approach to cyber-physical security with applications to smart grid.
Proceedings of the IEEE INFOCOM 2018, 2018
A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices.
Proceedings of the IEEE INFOCOM 2018, 2018
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
FPGA-oriented moving target defense against security threats from malicious FPGA tools.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the 56th Annual Allerton Conference on Communication, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
IEEE Trans. Veh. Technol., 2017
IEEE Trans. Cogn. Commun. Netw., 2017
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Cloud security certifications: a comparison to improve cloud service provider security.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip.
Proceedings of the Applied Reconfigurable Computing - 13th International Symposium, 2017
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Multi Scale Comput. Syst., 2016
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
Proceedings of the 2016 International Conference on Computing, 2016
RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015
Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Comput. Secur., 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Game theoretic analysis of users and providers behavior in network under scarce resources.
Proceedings of the International Conference on Computing, Networking and Communications, 2012
A game theoretic approach for modeling optimal data sharing on Online Social Networks.
Proceedings of the 9th International Conference on Electrical Engineering, 2012
2011
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy.
Proceedings of IEEE International Conference on Communications, 2011
2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010