scispace - formally typeset
C

Charles A. Kamhoua

Researcher at United States Army Research Laboratory

Publications -  231
Citations -  3743

Charles A. Kamhoua is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Game theory & Computer science. The author has an hindex of 23, co-authored 208 publications receiving 2558 citations. Previous affiliations of Charles A. Kamhoua include Raytheon & Washington University in St. Louis.

Papers
More filters
Proceedings ArticleDOI

Diversity Modeling to Evaluate Security of Multiple SDN Controllers

TL;DR: A network diversity modeling framework is presented to assess impact on security risk due to multiple SDN controllers and it is revealed that having similar resource instances in different multipleSDN controllers increases the security risk.
Proceedings ArticleDOI

Mitigation of Jamming Attacks via Deception

TL;DR: The paper proposes the novel technique of sending fake information over a second transmitter-receiver pair in order to deceive the jammer into investing some of its jamming power budget for jamming the channel carrying fake information.
Book ChapterDOI

Towards Secure Software-Defined Networking Integrated Cyber-Physical Systems: Attacks and Countermeasures

TL;DR: In this paper, the authors give an overview of SDN, smart grid and SDN-based smart grid, and discuss various types of attacks related to SDN architecture and their countermeasures.
OtherDOI

A Hypergame‐Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT)

TL;DR: In this paper, a defense strategy to secure the Internet of Battlefield Things (IoBT) based on a hypergame employing deceptive techniques is developed, where the defender updates its perceived list of compromised nodes and actively feeds false signals to the adversary to create deception.
Posted Content

Contract-Theoretic Resource Allocation for Critical Infrastructure Protection

TL;DR: Simulation results show that the proposed contract-theoretic approach maximizes the CC's utility while ensuring that no infrastructure has an incentive to ask for another contract, despite the lack of exact information at the CC.