scispace - formally typeset
C

Charles A. Kamhoua

Researcher at United States Army Research Laboratory

Publications -  231
Citations -  3743

Charles A. Kamhoua is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Game theory & Computer science. The author has an hindex of 23, co-authored 208 publications receiving 2558 citations. Previous affiliations of Charles A. Kamhoua include Raytheon & Washington University in St. Louis.

Papers
More filters
Book ChapterDOI

Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic

TL;DR: This work provides a new game theoretical model which is part of the family of partially observable stochastic games (POSG) but with particular features and proves the consistency of heuristic search value iteration (HSVI) based algorithms.
Proceedings ArticleDOI

Compact Representation of Value Function in Partially Observable Stochastic Games

TL;DR: In this paper, the authors propose an abstraction technique that addresses the issue of the curse of dimensionality by projecting high-dimensional beliefs to characteristic vectors of significantly lower dimension (e.g., marginal probabilities).
Proceedings ArticleDOI

A game theoretic approach for inspecting web-based malvertising

TL;DR: This paper designs a normal form game between the malvertiser and the ad network, define their strategies and payoff functions, and compute their pure-strategy and mixed-str strategy Nash equilibria, and derives several insights from the results that can serve as guidelines for thead network to decide its best inspection strategy.
Proceedings Article

Countering Double-Spending in Next-Generation Blockchains

TL;DR: In this paper, the use of hash-based, one-time signatures in the context of the blockchain system was studied and it was shown how the replacement of currently utilized schemes into a one time signature can help deter double-spending.
Proceedings ArticleDOI

A game-theoretic framework for dynamic cyber deception in internet of battlefield things

TL;DR: A novel approach for cyber deception to protect important nodes and trap the adversary is proposed and a sequential approach of honeypot placement to defend and protect the network vital nodes is presented.