default search action
Kevin A. Kwiat
Person information
- affiliation: Air Force Research Laboratory (AFRL), Rome, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j34]Hong Zhao, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. IEEE Trans. Dependable Secur. Comput. 17(4): 716-729 (2020) - [j33]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. IEEE Trans. Dependable Secur. Comput. 17(6): 1257-1268 (2020)
2010 – 2019
- 2019
- [j32]Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
Transfer learning for detecting unknown network attacks. EURASIP J. Inf. Secur. 2019: 1 (2019) - [c125]Jielong Xu, Jian Tang, Zhiyuan Xu, Chengxiang Yin, Kevin A. Kwiat, Charles A. Kamhoua:
A Deep Recurrent Neural Network Based Predictive Control Framework for Reliable Distributed Stream Data Processing. IPDPS 2019: 262-272 - 2018
- [j31]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Establishing evolutionary game models for CYBer security information EXchange (CYBEX). J. Comput. Syst. Sci. 98: 27-52 (2018) - [j30]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua, Chonggang Wang:
GPU-Accelerated High-Throughput Online Stream Data Processing. IEEE Trans. Big Data 4(2): 191-202 (2018) - [j29]Hui Geng, Kevin A. Kwiat, Charles A. Kamhoua, Yiyu Shi:
On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 123-132 (2018) - [j28]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua:
Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding. IEEE Trans. Very Large Scale Integr. Syst. 26(10): 2007-2015 (2018) - [c124]Yuzhe Richard Tang, Qiwu Zou, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ChainFS: Blockchain-Secured Cloud Storage. IEEE CLOUD 2018: 987-990 - [c123]Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen:
QOI: Assessing Participation in Threat Information Sharing. ICASSP 2018: 6951-6955 - [c122]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). ICC 2018: 1-6 - [c121]Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Diversity Modeling to Evaluate Security of Multiple SDN Controllers. ICNC 2018: 344-348 - [c120]Danda B. Rawat, Laurent Njilla, Kevin A. Kwiat, Charles A. Kamhoua:
iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity. ICNC 2018: 425-431 - [c119]Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Qiaoyan Yu:
Securing FPGA-based obsolete component replacement for legacy systems. ISQED 2018: 401-406 - [c118]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory. MWSCAS 2018: 853-856 - [i5]Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat:
Enabling Cooperative IoT Security via Software Defined Networks (SDN). CoRR abs/1806.01885 (2018) - 2017
- [j27]Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar:
Game Theory for Cyber Security and Privacy. ACM Comput. Surv. 50(2): 30:1-30:37 (2017) - [j26]Osama Abbas Hussein Al Tameemi, Ayad Al-Rumaithi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs. IEEE Trans. Cogn. Commun. Netw. 3(1): 67-81 (2017) - [j25]Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Trojan Detection Game: A Prospect-Theoretic Approach. IEEE Trans. Veh. Technol. 66(9): 7697-7710 (2017) - [c117]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security? CLOUD 2017: 50-57 - [c116]Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles A. Kamhoua, Kevin A. Kwiat:
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. CLOUD 2017: 302-309 - [c115]Praveen Rao, Anas Katib, Kobus Barnard, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data. AAAI Workshops 2017 - [c114]Christophe Bobda, Joshua Mead, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip. ARC 2017: 47-59 - [c113]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. CCGrid 2017: 458-467 - [c112]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. CCGrid 2017: 468-477 - [c111]Carlo Di Giulio, Charles A. Kamhoua, Roy H. Campbell, Read Sprabery, Kevin A. Kwiat, Masooda N. Bashir:
IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers. CCGrid 2017: 1090-1099 - [c110]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - [c109]Shameek Bhattacharjee, Mehrdad Salimitari, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation. DASC/PiCom/DataCom/CyberSciTech 2017: 446-453 - [c108]Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. DASC/PiCom/DataCom/CyberSciTech 2017: 527-533 - [c107]Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. DASC/PiCom/DataCom/CyberSciTech 2017: 639-644 - [c106]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only). FPGA 2017: 289 - [c105]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c104]Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. HASE 2017: 9-12 - [c103]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c102]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. HASE 2017: 84-87 - [c101]Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. HOST 2017: 172 - [c100]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking information sharing for threat intelligence. HotWeb 2017: 6:1-6:7 - [c99]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A game theoretic approach for inspecting web-based malvertising. ICC 2017: 1-6 - [c98]Ian D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua:
Electric grid power flow model camouflage against topology leaking attacks. INFOCOM 2017: 1-9 - [c97]Carlo Di Giulio, Read Sprabery, Charles A. Kamhoua, Kevin A. Kwiat, Roy H. Campbell, Masooda N. Bashir:
Cloud security certifications: a comparison to improve cloud service provider security. ICC 2017: 120:1-120:12 - [c96]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Assessing Quality of Contribution in Information Sharing for Threat Intelligence. PAC 2017: 182-183 - [i4]Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Rethinking Information Sharing for Actionable Threat Intelligence. CoRR abs/1702.00548 (2017) - [i3]Omar Al-Ibrahim, Aziz Mohaisen, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence. CoRR abs/1702.00552 (2017) - [i2]AbdelRahman Eldosouky, Walid Saad, Charles A. Kamhoua, Kevin A. Kwiat:
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection. CoRR abs/1702.06436 (2017) - [i1]Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware Trojan Detection Game: A Prospect-Theoretic Approach. CoRR abs/1703.07499 (2017) - 2016
- [j24]Charles A. Kamhoua, Hong Zhao, Manuel Rodríguez, Kevin A. Kwiat:
A Game-Theoretic Approach for Testing for Hardware Trojans. IEEE Trans. Multi Scale Comput. Syst. 2(3): 199-210 (2016) - [c95]Praveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content. CIT 2016: 407-414 - [c94]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick Eviction of Virtual Machines through Proactive Snapshots. CLUSTER 2016: 156-157 - [c93]Key-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Game Theory with Learning for Cyber Security Monitoring. HASE 2016: 1-8 - [c92]Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua:
Design Diversity for Mitigating Monoculture Induced Threats. HASE 2016: 17-18 - [c91]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
CSRS: Cyber Survive and Recover Simulator. HASE 2016: 110-113 - [c90]Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. AsianHOST 2016: 1-6 - [c89]Travis E. Schulze, Kevin A. Kwiat, Charles A. Kamhoua, Shih-Chieh Chang, Yiyu Shi:
RECORD: Temporarily Randomized Encoding of COmbinational Logic for Resistance to Data Leakage from hardware Trojan. AsianHOST 2016: 1-6 - [c88]Osama Abbas Al Tameemi, Ayad Al-Rumaithi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Connectivity and rendezvous in distributed DSA networks. ICNC 2016: 1-7 - [c87]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick eviction of virtual machines through proactive live snapshots. UCC 2016: 99-107 - 2015
- [j23]Hong Zhao, Kevin A. Kwiat:
Guest Editorial. J. Comput. Inf. Technol. 23(4): iii-iv (2015) - [j22]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat:
Vector quantization based QoS evaluation in cognitive radio networks. Wirel. Networks 21(6): 1899-1911 (2015) - [c86]Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew P. Martin:
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach. CLOUD 2015: 556-563 - [c85]Zhenhua Chen, Jielong Xu, Jian Tang, Kevin A. Kwiat, Charles A. Kamhoua:
G-Storm: GPU-enabled high-throughput online data processing in Storm. IEEE BigData 2015: 307-312 - [c84]Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
On the use of design diversity in fault tolerant and secure systems: A qualitative analysis. CISDA 2015: 1-8 - [c83]Hong Zhao, Kevin A. Kwiat, Charles A. Kamhoua, Manuel Rodríguez:
Applying chaos theory for runtime Hardware Trojan detection. CISDA 2015: 1-6 - [c82]Deepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat:
Game Theoretic Modeling to Enforce Security Information Sharing among Firms. CSCloud 2015: 7-12 - [c81]Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. CSCloud 2015: 382-389 - [c80]AbdelRahman Eldosouky, Walid Saad, Charles A. Kamhoua, Kevin A. Kwiat:
Contract-Theoretic Resource Allocation for Critical Infrastructure Protection. GLOBECOM 2015: 1-6 - [c79]Deepak K. Tosh, Matthew Molloy, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Cyber-Investment and Cyber-Information Exchange Decision Modeling. HPCC/CSS/ICESS 2015: 1219-1224 - [c78]Jielong Xu, Jian Tang, Brendan Mumey, Weiyi Zhang, Kevin A. Kwiat, Charles A. Kamhoua:
Cost-Efficient Virtual Server Provisioning and Selection in distributed Data Centers. ICC 2015: 5466-5472 - [c77]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat, Andrew P. Martin:
An evolutionary game-theoretic framework for cyber-threat information sharing. ICC 2015: 7341-7346 - [c76]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
NAPF: Percolation driven probabilistic flooding for interference limited cognitive radio networks. ICC 2015: 7534-7539 - [c75]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Capacity bounds of finite secondary cognitive radio networks. ICNC 2015: 476-481 - [c74]Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Bayesian inference based decision reliability under imperfect monitoring. IM 2015: 1333-1338 - [c73]Ming Zhao, Francois D'Ugard, Kevin A. Kwiat, Charles A. Kamhoua:
Multi-level VM replication based survivability for mission-critical cloud computing. IM 2015: 1351-1356 - [c72]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks. MILCOM 2015: 103-108 - [c71]Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multinomial trust in presence of uncertainty and adversaries in DSA networks. MILCOM 2015: 611-616 - [c70]Manuel Rodríguez, Kevin A. Kwiat, Charles A. Kamhoua:
Modeling fault tolerant architectures with design diversity for secure systems. MILCOM 2015: 1254-1263 - [c69]Festus Hategekimana, Adil Tbatou, Christophe Bobda, Charles A. Kamhoua, Kevin A. Kwiat:
Hardware isolation technique for IRC-based botnets detection. ReConFig 2015: 1-6 - [c68]Charles A. Kamhoua, Anbang Ruan, Andrew P. Martin, Kevin A. Kwiat:
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. UCC 2015: 217-226 - 2014
- [j21]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat, Qing Li:
A game theoretic approach to detect and co-exist with malicious nodes in wireless networks. Comput. Networks 71: 63-83 (2014) - [j20]Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:
Trusted Online Social Network (OSN) services with optimal data management. Comput. Secur. 42: 116-136 (2014) - [j19]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Social network attack simulation with honeytokens. Soc. Netw. Anal. Min. 4(1): 221 (2014) - [j18]Li Wang, Shangping Ren, Bogdan Korel, Kevin A. Kwiat, Eric Salerno:
Improving System Reliability Against Rational Attacks Under Given Resources. IEEE Trans. Syst. Man Cybern. Syst. 44(4): 446-456 (2014) - [c67]Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodríguez:
Game Theoretic Modeling of Security and Interdependency in a Public Cloud. IEEE CLOUD 2014: 514-521 - [c66]Charles A. Kamhoua, Manuel Rodríguez, Kevin A. Kwiat:
Testing for Hardware Trojans: A Game-Theoretic Approach. GameSec 2014: 360-369 - [c65]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
Diversity and System Security: A Game Theoretic Perspective. MILCOM 2014: 146-151 - [c64]Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat:
Vector quantization based QoS evaluation in cognitive radio networks. WOCC 2014: 1-6 - 2013
- [j17]Li Wang, Zheng Li, Shangping Ren, Kevin A. Kwiat:
Optimal Voting Strategy against Random and Targeted Attacks. Int. J. Secur. Softw. Eng. 4(4): 25-46 (2013) - [j16]Jielong Xu, Jian Tang, Kevin A. Kwiat, Weiyi Zhang, Guoliang Xue:
Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach. IEEE J. Sel. Areas Commun. 31(12): 2610-2619 (2013) - [j15]Wenjing Wang, Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat:
Collaborative jamming and collaborative defense in cognitive radio networks. Pervasive Mob. Comput. 9(4): 572-587 (2013) - [j14]Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph Giordano, Kevin A. Kwiat:
Component survivability at runtime for mission-critical distributed systems. J. Supercomput. 66(3): 1390-1417 (2013) - [c63]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Game theoretic attack analysis in online social network (OSN) services. ASONAM 2013: 1012-1019 - [c62]Enas F. Khairullah, Mainak Chatterjee, Kevin A. Kwiat:
Pricing-based routing in cognitive radio networks. GLOBECOM 2013: 908-912 - [c61]Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat:
Utilizing misleading information for cooperative spectrum sensing in cognitive radio networks. ICC 2013: 2612-2616 - [c60]Xinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat:
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory. LCN 2013: 835-842 - 2012
- [j13]Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat, Pramod K. Varshney:
Traffic management in wireless sensor networks: Decoupling congestion control and fairness. Comput. Commun. 35(6): 670-681 (2012) - [j12]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
Surviving in Cyberspace: A Game Theoretic Approach. J. Commun. 7(6): 436-450 (2012) - [c59]Jielong Xu, Jian Tang, Kevin A. Kwiat, Weiyi Zhang, Guoliang Xue:
Survivable Virtual Infrastructure Mapping in Virtualized Data Centers. IEEE CLOUD 2012: 196-203 - [c58]Charles A. Kamhoua, Kevin A. Kwiat, Joon S. Park:
A game theoretic approach for modeling optimal data sharing on Online Social Networks. CCE 2012: 1-6 - [c57]Mohammad Rabby, Kaliappa Ravindran, Kevin A. Kwiat:
Hierarchical adaptive QoS control for voting-based data collection in hostile scenarios. CNSM 2012: 194-198 - [c56]Swastik Brahma, Pramod K. Varshney, Mainak Chatterjee, Kevin A. Kwiat:
Optimal content delivery in DSA networks: A path auction based framework. ICC 2012: 1843-1847 - [c55]Charles A. Kamhoua, Niki Pissinou, Kia Makki, Kevin A. Kwiat, S. Sitharama Iyengar:
Game theoretic analysis of users and providers behavior in network under scarce resources. ICNC 2012: 1149-1155 - [c54]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Optimal State Management of Data Sharing in Online Social Network (OSN) Services. TrustCom 2012: 648-655 - [c53]Saptarshi Debroy, Shameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat:
An effective use of spectrum usage estimation for IEEE 802.22 networks. WCNC 2012: 3239-3243 - [c52]Joon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat:
Towards trusted data management in online social network (OSN) services. WorldCIS 2012: 202-203 - 2011
- [j11]Mukundan Venkataraman, Mainak Chatterjee, Kevin A. Kwiat:
A dynamic reconfigurable routing framework for wireless sensor networks. Ad Hoc Networks 9(7): 1270-1286 (2011) - [j10]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Cooperation in Wireless Networks with Unreliable Channels. IEEE Trans. Commun. 59(10): 2808-2817 (2011) - [c51]Li Wang, Zheng Li, Shangping Ren, Kevin A. Kwiat:
Optimal Voting Strategy Against Rational Attackers. CRiSIS 2011: 1-8 - [c50]Kevin A. Kwiat:
Fault tolerance for fight-through: a basis for strategic survival. SIN 2011: 1-2 - [c49]Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat:
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. SIN 2011: 73-80 - [c48]Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux:
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. SIN 2011: 183-190 - [c47]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Collaborative jamming and collaborative defense in Cognitive Radio Networks. WOWMOM 2011: 1-6 - 2010
- [j9]Shamik Sengupta, Mainak Chatterjee, Kevin A. Kwiat:
A Game Theoretic Framework for Power Control in Wireless Sensor Networks. IEEE Trans. Computers 59(2): 231-242 (2010) - [c46]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Attacker Detection Game in Wireless Networks with Channel Uncertainty. ICC 2010: 1-5 - [c45]Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. MMM-ACNS 2010: 102-117 - [c44]Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat:
Congestion control and fairness in wireless sensor networks. PerCom Workshops 2010: 413-418 - [c43]Li Wang, Yair Leiferman, Shangping Ren, Kevin A. Kwiat, Xiaowei Li:
Improving complex distributed software system availability through information hiding. SAC 2010: 452-456 - [c42]Ruchika Mehresh, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation. SRDS 2010: 363-367
2000 – 2009
- 2009
- [j8]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
User-input driven QoS management in ad hoc networks. Comput. Commun. 32(11): 1306-1315 (2009) - [c41]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Coexistence with malicious nodes: A game theoretic approach. GAMENETS 2009: 277-286 - [c40]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Cooperation in Ad Hoc Networks with Noisy Channels. SECON 2009: 1-9 - [c39]Shamik Sengupta, Mainak Chatterjee, Kevin A. Kwiat:
Dynamic spectrum access in cognitive radio based tactical networks. WCNC 2009: 1343-1348 - [c38]Mukundan Venkataraman, Mainak Chatterjee, Kevin A. Kwiat:
Traffic based dynamic routing for wireless sensor networks. WCNC 2009: 2619-2624 - 2008
- [c37]Shangping Ren, Kevin A. Kwiat:
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. ARES 2008: 1180-1187 - [c36]Kaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir:
Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. ARES 2008: 1234-1239 - [c35]Kaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir:
Performance engineering of replica voting protocols for high assurance data collection systems. COMSWARE 2008: 424-433 - [c34]Kun Xiao, Shangping Ren, Kevin A. Kwiat:
Retrofitting Cyber Physical Systems for Survivability through External Coordination. HICSS 2008: 465 - [c33]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Enforcing cooperation in ad hoc networks with unreliable channel. MASS 2008: 456-462 - 2007
- [j7]Shangping Ren, Yue Yu, Kevin A. Kwiat, Jeffrey J. P. Tsai:
A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments. Int. J. Distributed Sens. Networks 3(2): 175-199 (2007) - [j6]Shangping Ren, Yue Yu, Nianen Chen, Jeffrey J. P. Tsai, Kevin A. Kwiat:
The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems. ACM Trans. Auton. Adapt. Syst. 2(3): 10 (2007) - [c32]Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
QoS-LI: QoS Loss Inference in Disadvantaged Networks. AINA Workshops (2) 2007: 524-529 - [c31]Kaliappa Nadar Ravindran, Kevin A. Kwiat:
A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems. COMSWARE 2007 - [c30]Ali Sabbir, Kaliappa Ravindran, Kevin A. Kwiat:
Secure Distributed Agreement Protocols for Information Assurance Applications. COMSWARE 2007 - [c29]Kun Xiao, Nianen Chen, Shangping Ren, Limin Shen, Xianhe Sun, Kevin A. Kwiat, Michael Macalik:
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment. SESS@ICSE 2007: 4 - [c28]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
Delay-Transmission Probability Tradeoffs in IEEE 802.11 based Ad hoc Networks. ISWCS 2007: 190-194 - [c27]Yue Yu, Shangping Ren, Kevin A. Kwiat:
Take Intelligent Risk and Optimize Decision Based on Time, Available Resources and Risk Tolerance Limits. IEEE Real-Time and Embedded Technology and Applications Symposium 2007: 315-325 - [c26]Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
An Economic Approach to Hierarchical Routing in Resource Rationed Ad Hoc Networks. WOWMOM 2007: 1-8 - 2006
- [j5]Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat:
Effective worm detection for various scan techniques. J. Comput. Secur. 14(4): 359-387 (2006) - [c25]Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems. Annual Simulation Symposium 2006: 196-203 - [c24]Kevin A. Kwiat:
Bringing the economic model to the human-computer interface. CCNC 2006: 711-714 - [c23]Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir, Bei Cao:
Replica voting: A distributed middleware service for real-time dependable systems. COMSWARE 2006: 1-7 - [c22]Kevin A. Kwiat, Shangping Ren:
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. SUTC (1) 2006: 394-402 - [c21]Jiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat:
Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery. WOWMOM 2006: 456-458 - 2005
- [c20]Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat:
Timed Publish-Subscribe Coomunication for Distributed Embedded Systems. DS-RT 2005: 290-297 - [c19]Kaliappa Nadar Ravindran, Kevin A. Kwiat, Gwangyu Ding:
Simulation-Based Validation of Protocols for Distributed Systems. HICSS 2005 - [c18]Kevin A. Kwiat, Kaliappa Nadar Ravindran, Patrick Hurley:
Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems. WOWMOM 2005: 153-162 - 2004
- [j4]Sibabrata Ray, Danyang Zhang, Kevin A. Kwiat:
Energy-efficient distributed authorisation server (DAS) placement for sensor networks. Int. J. High Perform. Comput. Netw. 1(4): 193-202 (2004) - [c17]Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir:
Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems. ICDCS Workshops 2004: 347-353 - [c16]Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat:
Incorporating Timeliness in Atomic Write of Shared Data for Distributed Embedded Systems. ICDCS Workshops 2004: 884-889 - [c15]Sibabrata Ray, Kevin A. Kwiat, Danyang Zhang:
Energy-efficient placement/activation algorithms for authorization servers in sensor network. ISCC 2004: 312-317 - [c14]Jiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat:
An Effective Architecture and Algorithm for Detecting Worms with Various Scan. NDSS 2004 - 2003
- [c13]Kaliappa Ravindran, Ali Sabbir, Kevin A. Kwiat:
'Timed atomic write': a programming primitive for distributed embedded systems. GLOBECOM 2003: 3926-3932 - [c12]Zesheng Chen, Lixin Gao, Kevin A. Kwiat:
Modeling the Spread of Active Worms. INFOCOM 2003: 1890-1900 - [c11]Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. IWIA 2003: 25-36 - 2002
- [j3]Kevin A. Kwiat:
Using Markets to Engineer Resource Management for the Information Grid. Inf. Syst. Frontiers 4(1): 55-62 (2002) - 2001
- [c10]Kevin A. Kwiat:
Can Reliability and Security be Joined Reliably and Securely?. SRDS 2001: 72-73 - [c9]Shambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat:
An Analytical Framework for Reasoning about Intrusions. SRDS 2001: 99- - 2000
- [c8]Kevin A. Kwiat:
Engineering Resource Management for the Information Grid and the Emerging Role of E-Commerce. AIWoRC 2000: 319-324 - [c7]Ben Hardekopf, Kevin A. Kwiat:
Exploiting the Overlap of Security and Fault-Tolerance. AIWoRC 2000: 361-366
1990 – 1999
- 1996
- [c6]Kevin A. Kwiat, Warren Debany, Salim Hariri:
Software Fault Tolerance Using Dynamically Reconfigurable FPGAs. Great Lakes Symposium on VLSI 1996: 39- - 1995
- [c5]Kevin A. Kwiat, Warren H. Debany Jr., Salim Hariri:
Modeling a versatile FPGA for prototyping adaptive systems. RSP 1995: 174-181 - 1994
- [j2]Warren H. Debany Jr., Mark Gorniak, Anthony R. Macera, Daniel Daskiewich, Kevin A. Kwiat, Heather B. Dussault:
Empirical Bounds on Fault Coverage Loss Due to LFSR Aliasing. VLSI Design 1(4): 313-326 (1994) - 1993
- [j1]Warren H. Debany Jr., Kevin A. Kwiat, Sami A. Al-Arian:
A Method for Consistent Fault Coverage Reporting. IEEE Des. Test Comput. 10(3): 68-79 (1993) - 1992
- [c4]Warren H. Debany Jr., Mark Gorniak, Daniel Daskiewich, Anthony R. Macera, Kevin A. Kwiat, Heather B. Dussault:
Empirical bounds on fault coverage loss due to LFSR aliasing. VTS 1992: 143-148 - [c3]Warren H. Debany Jr., Anthony R. Macera, Daniel Daskiewich, Mark Gorniak, Kevin A. Kwiat, Heather B. Dussault:
Effective concurrent test for a parallel-input multiplier using modulo 3. VTS 1992: 280-285 - 1991
- [c2]Warren H. Debany Jr., Mark Gorniak, Anthony R. Macera, Kevin A. Kwiat, Heather B. Dussault, Daniel Daskiewich:
Design verification using logic tests. RSP 1991: 17-24
1980 – 1989
- 1988
- [c1]Sami A. Al-Arian, Kevin A. Kwiat:
Defining a Standard for Fault Simulator Evaluation. ITC 1988: 1001
Coauthor Index
aka: Laurent L. Njilla
aka: Kaliappa Ravindran
aka: Osama Abbas Hussein Al Tameemi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint