default search action
Kevin A. Kwiat
Person information
- affiliation: Air Force Research Laboratory (AFRL), Rome, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j34]Hong Zhao, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. IEEE Trans. Dependable Secur. Comput. 17(4): 716-729 (2020) - [j33]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. IEEE Trans. Dependable Secur. Comput. 17(6): 1257-1268 (2020)
2010 – 2019
- 2019
- [j32]Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
Transfer learning for detecting unknown network attacks. EURASIP J. Inf. Secur. 2019: 1 (2019) - [c125]Jielong Xu, Jian Tang, Zhiyuan Xu, Chengxiang Yin, Kevin A. Kwiat, Charles A. Kamhoua:
A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing. IPDPS 2019: 262-272 - 2018
- [j31]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Establishing evolutionary game models for CYBer security information EXchange (CYBEX). J. Comput. Syst. Sci. 98: 27-52 (2018) - [j30]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua, Chonggang Wang:
GPU-Accelerated High-Throughput Online Stream Data Processing. IEEE Trans. Big Data 4(2): 191-202 (2018) - [j29]Hui Geng, Kevin A. Kwiat, Charles A. Kamhoua, Yiyu Shi:
On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 123-132 (2018) - [j28]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua:
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding. IEEE Trans. Very Large Scale Integr. Syst. 26(10): 2007-2015 (2018) - [c124]Yuzhe Richard Tang, Qiwu Zou, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ChainFS: Blockchain-Secured Cloud Storage. IEEE CLOUD 2018: 987-990 - [c123]Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen:
QOI: Assessing Participation in Threat Information Sharing. ICASSP 2018: 6951-6955 - [c122]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). ICC 2018: 1-6 - [c121]Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Diversity Modeling to Evaluate Security of Multiple SDN Controllers. ICNC 2018: 344-348 - [c120]Danda B. Rawat, Laurent Njilla, Kevin A. Kwiat, Charles A. Kamhoua:
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity. ICNC 2018: 425-431 - [c119]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Qiaoyan Yu:
Securing FPGA-based obsolete component replacement for legacy systems. ISQED 2018: 401-406 - [c118]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory. MWSCAS 2018: 853-856 - [i5]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). CoRR abs/1806.01885 (2018) - 2017
- [j27]Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar:
Game Theory for Cyber Security and Privacy. ACM Comput. Surv. 50(2): 30:1-30:37 (2017) - [j26]Osama Abbas Hussein Al Tameemi, Ayad Al-Rumaithi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs. IEEE Trans. Cogn. Commun. Netw. 3(1): 67-81 (2017) - [j25]Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Trojan Detection Game: A Prospect-Theoretic Approach. IEEE Trans. Veh. Technol. 66(9): 7697-7710 (2017) - [c117]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security? CLOUD 2017: 50-57 - [c116]Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles A. Kamhoua, Kevin A. Kwiat:
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. CLOUD 2017: 302-309 - [c115]Praveen Rao, Anas Katib, Kobus Barnard, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data. AAAI Workshops 2017 - [c114]Christophe Bobda, Joshua Mead, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip. ARC 2017: 47-59 - [c113]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. CCGrid 2017: 458-467 - [c112]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. CCGrid 2017: 468-477 - [c111]Carlo Di Giulio, Charles A. Kamhoua, Roy H. Campbell, Read Sprabery, Kevin A. Kwiat, Masooda N. Bashir:
IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers. CCGrid 2017: 1090-1099 - [c110]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - [c109]Shameek Bhattacharjee, Mehrdad Salimitari, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation. DASC/PiCom/DataCom/CyberSciTech 2017: 446-453 - [c108]Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. DASC/PiCom/DataCom/CyberSciTech 2017: 527-533 - [c107]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. DASC/PiCom/DataCom/CyberSciTech 2017: 639-644 - [c106]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only). FPGA 2017: 289 - [c105]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c104]Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. HASE 2017: 9-12 - [c103]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c102]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. HASE 2017: 84-87 - [c101]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. HOST 2017: 172 - [c100]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking information sharing for threat intelligence. HotWeb 2017: 6:1-6:7 - [c99]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A game theoretic approach for inspecting web-based malvertising. ICC 2017: 1-6 - [c98]Ian D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua:
Electric grid power flow model camouflage against topology leaking attacks. INFOCOM 2017: 1-9 - [c97]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud security certifications: a comparison to improve cloud service provider security. ICC 2017: 120:1-120:12 - [c96]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Assessing Quality of Contribution in Information Sharing for Threat Intelligence. PAC 2017: 182-183 - [i4]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking Information Sharing for Actionable Threat Intelligence. CoRR abs/1702.00548 (2017) - [i3]Omar Al-Ibrahim, Aziz Mohaisen, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence. CoRR abs/1702.00552 (2017) - [i2]AbdelRahman Eldosouky, Walid Saad, Charles A. Kamhoua, Kevin A. Kwiat:
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection. CoRR abs/1702.06436 (2017) - [i1]Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Trojan Detection Game: A Prospect-Theoretic Approach. CoRR abs/1703.07499 (2017) - 2016
- [j24]Charles A. Kamhoua, Hong Zhao, Manuel Rodríguez, Kevin A. Kwiat:
A Game-Theoretic Approach for Testing for Hardware Trojans. IEEE Trans. Multi Scale Comput. Syst. 2(3): 199-210 (2016) - [c95]Praveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content. CIT 2016: 407-414 - [c94]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick Eviction of Virtual Machines through Proactive Snapshots. CLUSTER 2016: 156-157 - [c93]Key-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Game Theory with Learning for Cyber Security Monitoring. HASE 2016: 1-8 - [c92]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua:
Design Diversity for Mitigating Monoculture Induced Threats. HASE 2016: 17-18 - [c91]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
CSRS: Cyber Survive and Recover Simulator. HASE 2016: 110-113 - [c90]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. AsianHOST 2016: 1-6 - [c89]Travis E. Schulze, Kevin A. Kwiat, Charles A. Kamhoua, Shih-Chieh Chang, Yiyu Shi:
RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan. AsianHOST 2016: 1-6 - [c88]Osama Abbas Al Tameemi, Ayad Al-Rumaithi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Connectivity and rendezvous in distributed DSA networks. ICNC 2016: 1-7 - [c87]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick eviction of virtual machines through proactive live snapshots. UCC 2016: 99-107 - 2015
- [j23]Hong Zhao, Kevin A. Kwiat:
Guest Editorial. J. Comput. Inf. Technol. 23(4): iii-iv (2015) - [j22]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat:
Vector quantization based QoS evaluation in cognitive radio networks. Wirel. Networks 21(6): 1899-1911 (2015) - [c86]Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew P. Martin:
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach. CLOUD 2015: 556-563 - [c85]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua:
G-Storm: GPU-enabled high-throughput online data processing in Storm. IEEE BigData 2015: 307-312 - [c84]Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis. CISDA 2015: 1-8 - [c83]Hong Zhao, Kevin A. Kwiat, Charles A. Kamhoua, Manuel Rodríguez:
Applying chaos theory for runtime Hardware Trojan detection. CISDA 2015: 1-6 - [c82]Deepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat:
Game Theoretic Modeling to Enforce Security Information Sharing among Firms. CSCloud 2015: 7-12 - [c81]Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. CSCloud 2015: 382-389 - [c80]AbdelRahman Eldosouky, Walid Saad, Charles A. Kamhoua, Kevin A. Kwiat:
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection. GLOBECOM 2015: 1-6 - [c79]Deepak K. Tosh, Matthew Molloy, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Cyber-Investment and Cyber-Information Exchange Decision Modeling. HPCC/CSS/ICESS 2015: 1219-1224 - [c78]Jielong Xu, Jian Tang, Brendan Mumey, Weiyi Zhang, Kevin A. Kwiat, Charles A. Kamhoua:
Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers. ICC 2015: 5466-5472 - [c77]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat, Andrew P. Martin:
An evolutionary game-theoretic framework for cyber-threat information sharing. ICC 2015: 7341-7346 - [c76]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks. ICC 2015: 7534-7539 - [c75]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Capacity bounds of finite secondary cognitive radio networks. ICNC 2015: 476-481 - [c74]Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Bayesian inference based decision reliability under imperfect monitoring. IM 2015: 1333-1338 - [c73]Ming Zhao, Francois D'Ugard, Kevin A. Kwiat, Charles A. Kamhoua:
Multi-level VM replication based survivability for mission-critical cloud computing. IM 2015: 1351-1356 - [c72]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks. MILCOM 2015: 103-108 - [c71]Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multinomial trust in presence of uncertainty and adversaries in DSA networks. MILCOM 2015: 611-616 - [c70]Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
Modeling fault tolerant architectures with design diversity for secure systems. MILCOM 2015: 1254-1263 - [c69]Festus Hategekimana, Adil Tbatou, Christophe Bobda, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware isolation technique for IRC-based botnets detection. ReConFig 2015: 1-6 - [c68]Charles A. Kamhoua, Anbang Ruan, Andrew P. Martin, Kevin A. Kwiat:
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. UCC 2015: 217-226 - 2014
- [j21]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat, Qing Li:
A game theoretic approach to detect and co-exist with malicious nodes in wireless networks. Comput. Networks 71: 63-83 (2014) - [j20]Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:
Trusted Online Social Network (OSN) services with optimal data management. Comput. Secur. 42: 116-136 (2014) - [j19]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Social network attack simulation with honeytokens. Soc. Netw. Anal. Min. 4(1): 221 (2014) - [j18]Li Wang, Shangping Ren, Bogdan Korel, Kevin A. Kwiat, Eric Salerno:
Improving System Reliability Against Rational Attacks Under Given Resources. IEEE Trans. Syst. Man Cybern. Syst. 44(4): 446-456 (2014) - [c67]Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodríguez:
Game Theoretic Modeling of Security and Interdependency in a Public Cloud. IEEE CLOUD 2014: 514-521 - [c66]Charles A. Kamhoua, Manuel Rodríguez, Kevin A. Kwiat:
Testing for Hardware Trojans: A Game-Theoretic Approach. GameSec 2014: 360-369 - [c65]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
Diversity and System Security: A Game Theoretic Perspective. MILCOM 2014: 146-151 - [c64]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat:
Vector quantization based QoS evaluation in cognitive radio networks. WOCC 2014: 1-6 - 2013
- [j17]Li Wang, Zheng Li, Shangping Ren, Kevin A. Kwiat:
Optimal Voting Strategy against Random and Targeted Attacks. Int. J. Secur. Softw. Eng. 4(4): 25-46 (2013) - [j16]Jielong Xu, Jian Tang, Kevin A. Kwiat, Weiyi Zhang, Guoliang Xue:
Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach. IEEE J. Sel. Areas Commun. 31(12): 2610-2619 (2013) - [j15]Wenjing Wang, Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat:
Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive Mob. Comput. 9(4): 572-587 (2013) - [j14]Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph Giordano, Kevin A. Kwiat:
Component survivability at runtime for mission-critical distributed systems. J. Supercomput. 66(3): 1390-1417 (2013) - [c63]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Game theoretic attack analysis in online social network (OSN) services. ASONAM 2013: 1012-1019 - [c62]Enas F. Khairullah, Mainak Chatterjee, Kevin A. Kwiat:
Pricing-based routing in cognitive radio networks. GLOBECOM 2013: 908-912 - [c61]Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat:
Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks. ICC 2013: 2612-2616 - [c60]Xinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat:
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory. LCN 2013: 835-842 - 2012
- [j13]Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat, Pramod K. Varshney:
Traffic management in wireless sensor networks: Decoupling congestion control and fairness. Comput. Commun. 35(6): 670-681 (2012) - [j12]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
Surviving in Cyberspace: A Game Theoretic Approach. J. Commun. 7(6): 436-450 (2012) - [c59]Jielong Xu, Jian Tang, Kevin A. Kwiat, Weiyi Zhang, Guoliang Xue:
Survivable Virtual Infrastructure Mapping in Virtualized Data Centers. IEEE CLOUD 2012: 196-203 - [c58]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
A game theoretic approach for modeling optimal data sharing on Online Social Networks. CCE 2012: 1-6 - [c57]Mohammad Rabby, Kaliappa Ravindran, Kevin A. Kwiat:
Hierarchical adaptive QoS control for voting-based data collection in hostile scenarios. CNSM 2012: 194-198 - [c56]Swastik Brahma, Pramod K. Varshney, Mainak Chatterjee, Kevin A. Kwiat:
Optimal content delivery in DSA networks: A path auction based framework. ICC 2012: 1843-1847 - [c55]Charles A. Kamhoua, Niki Pissinou, Kia Makki, Kevin A. Kwiat, S. Sitharama Iyengar:
Game theoretic analysis of users and providers behavior in network under scarce resources. ICNC 2012: 1149-1155 - [c54]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Optimal State Management of Data Sharing in Online Social Network (OSN) Services. TrustCom 2012: 648-655 - [c53]Saptarshi Debroy, Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat:
An effective use of spectrum usage estimation for IEEE 802.22 networks. WCNC 2012: 3239-3243 - [c52]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Towards trusted data management in online social network (OSN) services. WorldCIS 2012: 202-203 - 2011
- [j11]Mukundan Venkataraman, Mainak Chatterjee, Kevin A. Kwiat:
A dynamic reconfigurable routing framework for wireless sensor networks. Ad Hoc Networks 9(7): 1270-1286 (2011) - [j10]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Cooperation in Wireless Networks with Unreliable Channels. IEEE Trans. Commun. 59(10): 2808-2817 (2011) - [c51]Li Wang, Zheng Li, Shangping Ren, Kevin A. Kwiat:
Optimal Voting Strategy Against Rational Attackers. CRiSIS 2011: 1-8 - [c50]Kevin A. Kwiat:
Fault tolerance for fight-through: a basis for strategic survival. SIN 2011: 1-2 - [c49]Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat:
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. SIN 2011: 73-80 - [c48]Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux:
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. SIN 2011: 183-190 - [c47]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Collaborative jamming and collaborative defense in Cognitive Radio Networks. WOWMOM 2011: 1-6 - 2010
- [j9]Shamik Sengupta, Mainak Chatterjee, Kevin A. Kwiat:
A Game Theoretic Framework for Power Control in Wireless Sensor Networks. IEEE Trans. Computers 59(2): 231-242 (2010) - [c46]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Attacker Detection Game in Wireless Networks with Channel Uncertainty. ICC 2010: 1-5 - [c45]