Kevin A. Kwiat
Affiliations:- Air Force Research Laboratory (AFRL), Rome, USA
According to our database1,
Kevin A. Kwiat
authored at least 159 papers
between 1988 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on csiac.org
On csauthors.net:
Bibliography
2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
2019
EURASIP J. Inf. Secur., 2019
A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing.
Proceedings of the 2019 IEEE International Parallel and Distributed Processing Symposium, 2019
2018
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding.
IEEE Trans. Very Large Scale Integr. Syst., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
IEEE Trans. Big Data, 2018
Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
IEEE Trans. Veh. Technol., 2017
IEEE Trans. Cogn. Commun. Netw., 2017
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Cloud security certifications: a comparison to improve cloud service provider security.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip.
Proceedings of the Applied Reconfigurable Computing - 13th International Symposium, 2017
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Multi Scale Comput. Syst., 2016
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
Proceedings of the 2016 International Conference on Computing, 2016
RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Wirel. Networks, 2015
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015
Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
IEEE Trans. Syst. Man Cybern. Syst., 2014
Comput. Secur., 2014
A game theoretic approach to detect and co-exist with malicious nodes in wireless networks.
Comput. Networks, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
J. Supercomput., 2013
Pervasive Mob. Comput., 2013
IEEE J. Sel. Areas Commun., 2013
Int. J. Secur. Softw. Eng., 2013
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Traffic management in wireless sensor networks: Decoupling congestion control and fairness.
Comput. Commun., 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Game theoretic analysis of users and providers behavior in network under scarce resources.
Proceedings of the International Conference on Computing, Networking and Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Hierarchical adaptive QoS control for voting-based data collection in hostile scenarios.
Proceedings of the 8th International Conference on Network and Service Management, 2012
A game theoretic approach for modeling optimal data sharing on Online Social Networks.
Proceedings of the 9th International Conference on Electrical Engineering, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Ad Hoc Networks, 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the CRiSIS 2011, 2011
2010
IEEE Trans. Computers, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Improving complex distributed software system availability through information hiding.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Performance engineering of replica voting protocols for high assurance data collection systems.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems.
ACM Trans. Auton. Adapt. Syst., 2007
A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments.
Int. J. Distributed Sens. Networks, 2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Take Intelligent Risk and Optimize Decision Based on Time, Available Resources and Risk Tolerance Limits.
Proceedings of the 13th IEEE Real-Time and Embedded Technology and Applications Symposium, 2007
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006
2005
Proceedings of the 2005 International Conference on a World of Wireless, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 9th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2005), 2005
2004
Energy-efficient distributed authorisation server (DAS) placement for sensor networks.
Int. J. High Perform. Comput. Netw., 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Energy-efficient placement/activation algorithms for authorization servers in sensor network.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Incorporating Timeliness in Atomic Write of Shared Data for Distributed Embedded Systems.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
2003
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
Proceedings of the Global Telecommunications Conference, 2003
2002
Inf. Syst. Frontiers, 2002
2001
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
2000
Engineering Resource Management for the Information Grid and the Emerging Role of E-Commerce.
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000
1996
Proceedings of the 6th Great Lakes Symposium on VLSI (GLS-VLSI '96), 1996
1995
Proceedings of the Sixth IEEE International Workshop on Rapid System Prototyping (RSP '95), 1995
1994
1993
1992
Proceedings of the 10th IEEE VLSI Test Symposium (VTS'92), 1992
1991
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991
1988
Proceedings of the Proceedings International Test Conference 1988, 1988