Laurent Njilla
Orcid: 0000-0001-8902-7418
According to our database1,
Laurent Njilla
authored at least 122 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Adaptive learning-based hybrid recommender system for deception in Internet of Thing.
Comput. Networks, 2024
Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems.
IEEE Access, 2024
An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
FLAS: A Federated Learning Framework for Adaptive Security in Edge-Driven UAV Networks.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023
2022
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment.
Network, 2022
J. Parallel Distributed Comput., 2022
IEEE Internet Things J., 2022
EURASIP J. Inf. Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
2021
IEEE Internet Things J., 2021
Intell. Converged Networks, 2021
ACM Comput. Surv., 2021
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Distributed Network Optimization for Secure Operation of Interdependent Complex Networks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021
2020
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications.
IEEE Trans. Very Large Scale Integr. Syst., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions.
Cryptogr., 2020
IEEE Commun. Surv. Tutorials, 2020
Proceedings of the 29th Wireless and Optical Communications Conference, 2020
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments.
Proceedings of the Spring Simulation Conference, 2020
Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE International Smart Cities Conference, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense.
IEEE Trans. Very Large Scale Integr. Syst., 2019
EAI Endorsed Trans. Security Safety, 2019
IEEE Consumer Electron. Mag., 2019
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the IEEE International Conference on Smart Computing, 2019
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019
Quantifying location privacy in permissioned blockchain-based internet of things (IoT).
Proceedings of the MobiQuitous 2019, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
Proceedings of the 46th International Symposium on Computer Architecture, 2019
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019
FastChain: Lightweight Blockchain with Sharding for Internet of Battlefield-Things in NS-3.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters.
Proceedings of the 19th IEEE/ACM International Symposium on Cluster, 2019
Proceedings of the 48th IEEE Applied Imagery Pattern Recognition Workshop, 2019
2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018
Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs).
CoRR, 2018
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 19th International Symposium on Quality Electronic Design, 2018
A stochastic game approach to cyber-physical security with applications to smart grid.
Proceedings of the IEEE INFOCOM 2018, 2018
A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices.
Proceedings of the IEEE INFOCOM 2018, 2018
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
FPGA-oriented moving target defense against security threats from malicious FPGA tools.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 47th IEEE Applied Imagery Pattern Recognition Workshop, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence.
CoRR, 2017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Int. J. Commun. Syst., 2016
Proceedings of the Annual IEEE Systems Conference, 2016
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015