default search action
Laurent Njilla
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Priva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems. IEEE Access 12: 171559-171570 (2024) - [j22]Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Adaptive learning-based hybrid recommender system for deception in Internet of Thing. Comput. Networks 255: 110853 (2024) - [j21]Matthew Sharp, Laurent Njilla, Chin-Tser Huang, Tieming Geng:
Blockchain-Based E-Voting Mechanisms: A Survey and a Proposal. Network 4(4): 426-442 (2024) - [c95]Uttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua:
A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain. CCNC 2024: 982-985 - [c94]Uttam Ghosh, Laurent Njilla, Debashis Das, Eugene Levin:
FLAS: A Federated Learning Framework for Adaptive Security in Edge-Driven UAV Networks. ICC 2024: 1298-1303 - [c93]Priva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Bayesian Game for Cyber Deception Against Remote Attack on Automotive Systems. ICNC 2024: 387-393 - [c92]Debashis Das, Laurent Njilla, Uttam Ghosh, Sachin Shetty, Eugene Levin:
An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks. INFOCOM (Workshops) 2024: 1-6 - 2023
- [c91]Satyaki Nan, Laurent Njilla, Swastik Brahma, Charles A. Kamhoua:
Game and Prospect Theoretic Hardware Trojan Testing. CISS 2023: 1-6 - [c90]Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. DSN 2023: 1-13 - [c89]Ruiran Wang, Laurent Njilla, Shucheng Yu:
A-C: An NDN-based Blockchain Network With Erasure Coding. ICNC 2023: 591-595 - [c88]Maurice Ngouen, Mohammad Ashiqur Rahman, Nagarajan Prabakar, A. Selcuk Uluagac, Laurent Njilla:
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption. IOTSMS 2023: 141-148 - [c87]Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices. PIMRC 2023: 1-6 - [c86]Chin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng:
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. UbiSec 2023: 436-449 - [i12]Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices. CoRR abs/2303.12367 (2023) - [i11]Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. CoRR abs/2305.09669 (2023) - 2022
- [j20]Jing Lin, Laurent L. Njilla, Kaiqi Xiong:
Secure machine learning against adversarial samples at test time. EURASIP J. Inf. Secur. 2022(1): 1 (2022) - [j19]Ashok Raja, Laurent Njilla, Jiawei Yuan:
Adversarial Attacks and Defenses Toward AI-Assisted UAV Infrastructure Inspection. IEEE Internet Things J. 9(23): 23379-23389 (2022) - [j18]Songlin He, Eric Ficke, Mir Mehedi Ahsan Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
Blockchain-based automated and robust cyber security management. J. Parallel Distributed Comput. 163: 62-82 (2022) - [j17]Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. Network 2(1): 66-80 (2022) - [c85]Mohammad Rahman, Laurent Njilla, Swastik Brahma:
Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans. CCWC 2022: 948-952 - [c84]Swastik Brahma, Laurent Njilla, Satyaki Nan:
Optimal Auction Design with Malicious Sellers. PerCom Workshops 2022: 661-666 - [c83]Tieming Geng, Laurent Njilla, Chin-Tser Huang:
A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks. SenSys 2022: 1222-1228 - [c82]Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. TrustCom 2022: 835-842 - 2021
- [j16]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement. IEEE Access 9: 49662-49682 (2021) - [j15]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 53(3): 67:1-67:43 (2021) - [j14]Anthony Dowling, Lauren Huie, Laurent Njilla, Hong Zhao, Yaoqing Liu:
Toward long-range adaptive communication via information centric networking. Intell. Converged Networks 2(1): 1-15 (2021) - [j13]Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu:
Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference. IEEE Internet Things J. 8(5): 3300-3309 (2021) - [c81]Swastik Brahma, Satyaki Nan, Laurent Njilla:
Strategic Hardware Trojan Testing with Hierarchical Trojan Types. CISS 2021: 1-6 - [c80]Iyanuoluwa Emiola, Laurent Njilla, Chinwendu Enyioha:
On Distributed Optimization in the Presence of Malicious Agents. CISS 2021: 1-6 - [c79]M. Hadi Amini, Laurent L. Njilla, Ahmed Imteaj, Calvin Mark:
Distributed Network Optimization for Secure Operation of Interdependent Complex Networks. CSCI 2021: 1777-1782 - [c78]Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification. DSC 2021: 1-8 - [c77]Swastik Brahma, Laurent Njilla, Satyaki Nan:
Game Theoretic Hardware Trojan Testing Under Cost Considerations. GameSec 2021: 251-270 - [c76]Ashok Raja, Laurent Njilla, Jiawei Yuan:
Blur the Eyes of UAV: Effective Attacks on UAV-based Infrastructure Inspection. ICTAI 2021: 661-665 - [c75]Jiawei Yuan, Laurent Njilla:
Lightweight and Reliable Decentralized Reward System using Blockchain. INFOCOM Workshops 2021: 1-6 - [c74]Nathan Daughety, Marcus Pendleton, Shouhuai Xu, Laurent Njilla, John V. Franco:
vCDS: A Virtualized Cross Domain Solution Architecture. MILCOM 2021: 61-68 - [c73]Amirahmad Chapnevis, Ismail Güvenç, Laurent Njilla, Eyuphan Bulut:
Collaborative Trajectory Optimization for Outage-aware Cellular-Enabled UAVs. VTC Spring 2021: 1-6 - [i10]Iyanuoluwa Emiola, Laurent Njilla, Chinwendu Enyioha:
On Distributed Optimization in the Presence of Malicious Agents. CoRR abs/2101.09347 (2021) - 2020
- [j12]Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla:
Measuring Decentrality in Blockchain Based Systems. IEEE Access 8: 178372-178390 (2020) - [j11]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [j10]Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Robert Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla:
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions. Cryptogr. 4(2): 17 (2020) - [j9]Hong Zhao, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. IEEE Trans. Dependable Secur. Comput. 17(4): 716-729 (2020) - [j8]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [j7]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. IEEE Trans. Dependable Secur. Comput. 17(6): 1257-1268 (2020) - [j6]Wei Yan, Ning Zhang, Laurent L. Njilla, Xuan Zhang:
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications. IEEE Trans. Very Large Scale Integr. Syst. 28(10): 2196-2209 (2020) - [c72]Ronald Doku, Danda B. Rawat, Moses Garuba, Laurent Njilla:
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things. CCNC 2020: 1-6 - [c71]Eric Muhati, Danda B. Rawat, Moses Garuba, Laurent Njilla:
CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks. CCNC 2020: 1-4 - [c70]Jing Lin, Laurent L. Njilla, Kaiqi Xiong:
Robust Machine Learning against Adversarial Samples at Test Time. ICC 2020: 1-6 - [c69]Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Detecting Counterfeit ICs with Blockchain-based Verification Framework. ISC2 2020: 1-8 - [c68]Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, Laurent Njilla:
Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures. SmartGridComm 2020: 1-6 - [c67]Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak K. Tosh, Laurent Njilla:
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments. SpringSim 2020: 1-12 - [c66]Yaoqing Liu, Laurent Njilla, Anthony Dowling, Wan Du:
Empowering Named Data Networks for Ad-Hoc Long-Range Communication. WOCC 2020: 1-6 - [i9]Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu:
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference. IACR Cryptol. ePrint Arch. 2020: 155 (2020)
2010 – 2019
- 2019
- [j5]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent L. Njilla:
Data Provenance in the Cloud: A Blockchain-Based Approach. IEEE Consumer Electron. Mag. 8(4): 38-44 (2019) - [j4]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha:
Attacker Capability based Dynamic Deception Model for Large-Scale Networks. EAI Endorsed Trans. Security Safety 6(21): e2 (2019) - [j3]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Qiaoyan Yu:
Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense. IEEE Trans. Very Large Scale Integr. Syst. 27(3): 665-678 (2019) - [c65]Laurent Njilla, Larry Pearlstein, Xin-Wen Wu, Adam Lutz, Soundararajan Ezekiel:
Internet of Things Anomaly Detection using Machine Learning. AIPR 2019: 1-6 - [c64]Soamar Homsi, Gang Quan, Wujie Wen, Gustavo A. Chaparro-Baquero, Laurent Njilla:
Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters. CCGRID 2019: 272-281 - [c63]Zhuosheng Zhang, Laurent L. Njilla, Shucheng Yu, Jiawei Yuan:
Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading. GLOBECOM 2019: 1-6 - [c62]Marco A. Gamarra, Sachin Shetty, David M. Nicol, Laurent Njilla, Oscar R. González:
Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure. GLOBECOM 2019: 1-7 - [c61]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen:
Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. IEEE ICBC 2019: 285-292 - [c60]Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Mostafa A. Bassiouni, Aziz Mohaisen:
BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails. ICC 2019: 1-6 - [c59]Marco A. Gamarra, Sachin Shetty, Oscar R. González, Laurent Njilla, Marcus Pendleton, Charles A. Kamhoua:
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems. ICC 2019: 1-7 - [c58]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. ICNC 2019: 360-364 - [c57]Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua:
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. ICNC 2019: 457-462 - [c56]Yongxin Liu, Laurent L. Njilla, Jian Wang, Houbing Song:
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud. ICNC 2019: 797-801 - [c55]Monica Senapati, Laurent Njilla, Praveen Rao:
A Method for Scalable First-Order Rule Learning on Twitter Data. ICDE Workshops 2019: 274-277 - [c54]Utsab Khakurel, Danda B. Rawat, Laurent Njilla:
FastChain: Lightweight Blockchain with Sharding for Internet of Battlefield-Things in NS-3. ICII 2019: 241-247 - [c53]Hong Zhao, Laurent Njilla:
Hardware Assisted Chaos Based IoT Authentication. ICNSC 2019: 169-174 - [c52]Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions. ISC2 2019: 1-8 - [c51]Amro Awad, Mao Ye, Yan Solihin, Laurent Njilla, Kazi Abu Zubair:
Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories. ISCA 2019: 104-115 - [c50]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Edwin Aguilar, Eric Perez:
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT. MASS Workshops 2019: 172-173 - [c49]Abel O. Gomez Rivera, Deepak K. Tosh, Laurent Njilla:
Scalable Blockchain Implementation for Edge-based Internet of Things Platform. MILCOM 2019: 1-6 - [c48]Erick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, Laurent Njilla:
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security. MILCOM 2019: 841-846 - [c47]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). MobiQuitous 2019: 116-125 - [c46]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework. SecureComm (2) 2019: 205-223 - [c45]Ronald Doku, Danda B. Rawat, Moses Garuba, Laurent Njilla:
LightChain: On the Lightweight Blockchain for the Internet-of-Things. SMARTCOMP 2019: 444-448 - [c44]Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla:
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. WISA 2019: 299-312 - [i8]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - [i7]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses. CoRR abs/1908.04507 (2019) - 2018
- [j2]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Daniel Bowden, Laurent Njilla, Charles A. Kamhoua:
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications. EAI Endorsed Trans. Pervasive Health Technol. 4(15): e3 (2018) - [c43]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Charles A. Kamhoua, Laurent Njilla:
CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud. IEEE CLOUD 2018: 302-309 - [c42]Yuzhe Richard Tang, Qiwu Zou, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ChainFS: Blockchain-Secured Cloud Storage. IEEE CLOUD 2018: 987-990 - [c41]David Kornish, Justin Geary, Victor Sansing, Soundararajan Ezekiel, Larry Pearlstein, Laurent Njilla:
Malware Classification using Deep Convolutional Neural Networks. AIPR 2018: 1-6 - [c40]Abdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Laurent Njilla:
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications. CNS 2018: 1-2 - [c39]Geremew Begna, Danda B. Rawat, Moses Garuba, Laurent Njilla:
SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework. CNS 2018: 1-2 - [c38]Zhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua:
FPGA-oriented moving target defense against security threats from malicious FPGA tools. HOST 2018: 163-166 - [c37]Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen:
QOI: Assessing Participation in Threat Information Sharing. ICASSP 2018: 6951-6955 - [c36]Marco A. Gamarra, Sachin Shetty, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla:
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. ICC 2018: 1-7 - [c35]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). ICC 2018: 1-6 - [c34]Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Diversity Modeling to Evaluate Security of Multiple SDN Controllers. ICNC 2018: 344-348 - [c33]Danda B. Rawat, Laurent Njilla, Kevin A. Kwiat, Charles A. Kamhoua:
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity. ICNC 2018: 425-431 - [c32]Yuanxiong Guo, Yanmin Gong, Laurent L. Njilla, Charles A. Kamhoua:
A stochastic game approach to cyber-physical security with applications to smart grid. INFOCOM Workshops 2018: 33-38 - [c31]Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua:
A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices. INFOCOM Workshops 2018: 312-317 - [c30]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Qiaoyan Yu:
Securing FPGA-based obsolete component replacement for legacy systems. ISQED 2018: 401-406 - [c29]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. MILCOM 2018: 593-598 - [c28]Phuc Thai, Laurent Njilla, Tuyet Duong, Lei Fan, Hong-Sheng Zhou:
A Generic Paradigm for Blockchain Design. MobiQuitous 2018: 460-469 - [c27]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory. MWSCAS 2018: 853-856 - [i6]Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua:
A Reputation-based Stackelberg Game Model to Enhance Secrecy Rate in Spectrum Leasing to Selfish IoT Devices. CoRR abs/1802.05832 (2018) - [i5]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). CoRR abs/1806.01885 (2018) - [i4]Amro Awad, Laurent Njilla, Mao Ye:
Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs). CoRR abs/1810.09438 (2018) - [i3]Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. CoRR abs/1811.09943 (2018) - 2017
- [c26]Praveen Rao, Anas Katib, Kobus Barnard, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data. AAAI Workshops 2017 - [c25]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. CCGrid 2017: 458-467 - [c24]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. CCGrid 2017: 468-477 - [c23]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - [c22]Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. DASC/PiCom/DataCom/CyberSciTech 2017: 527-533 - [c21]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. DASC/PiCom/DataCom/CyberSciTech 2017: 639-644 - [c20]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only). FPGA 2017: 289 - [c19]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c18]Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. HASE 2017: 9-12 - [c17]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c16]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. HASE 2017: 84-87 - [c15]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. HOST 2017: 172 - [c14]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking information sharing for threat intelligence. HotWeb 2017: 6:1-6:7 - [c13]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A game theoretic approach for inspecting web-based malvertising. ICC 2017: 1-6 - [c12]Gael Kamdem, Charles A. Kamhoua, Yue Lu, Sachin Shetty, Laurent Njilla:
A Markov Game Theoritic Approach for Power Grid Security. ICDCS Workshops 2017: 139-144 - [c11]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Charles A. Kamhoua, Brandon L. Hernandez, Laurent Njilla, Alex Pissinou Makki:
Preventing Colluding Identity Clone Attacks in Online Social Networks. ICDCS Workshops 2017: 187-192 - [c10]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla:
Approach to detect non-adversarial overlapping collusion in crowdsourcing. IPCCC 2017: 1-8 - [c9]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Assessing Quality of Contribution in Information Sharing for Threat Intelligence. PAC 2017: 182-183 - [c8]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - [c7]Laurent Njilla, Harold N. Ouete, Niki Pissinou, Kia Makki:
Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration. SysCon 2017: 1-8 - [c6]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla:
Consensus protocols for blockchain-based data provenance: Challenges and opportunities. UEMCON 2017: 469-474 - [i2]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking Information Sharing for Actionable Threat Intelligence. CoRR abs/1702.00548 (2017) - [i1]Omar Al-Ibrahim, Aziz Mohaisen, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence. CoRR abs/1702.00552 (2017) - 2016
- [j1]Laurent Yamen Njilla, Niki Pissinou, Kia Makki:
Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 29(9): 1500-1512 (2016) - [c5]Praveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content. CIT 2016: 407-414 - [c4]Laurent L. Njilla, Harold N. Ouete, Dean K. Doungwa:
Monitoring colluding behavior in MANETs using game theory. CAMAD 2016: 152-153 - [c3]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. AsianHOST 2016: 1-6 - [c2]Laurent Yamen Njilla, Patricia Echual, Niki Pissinou, Kia Makki:
A game-theoretic approach on resource allocation with colluding nodes in MANETs. SysCon 2016: 1-8 - 2015
- [c1]Laurent Yamen Njilla, Niki Pissinou:
Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach. CISDA 2015: 1-6
Coauthor Index
aka: Aziz Mohaisen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint