C
Charles A. Kamhoua
Researcher at United States Army Research Laboratory
Publications - 231
Citations - 3743
Charles A. Kamhoua is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Game theory & Computer science. The author has an hindex of 23, co-authored 208 publications receiving 2558 citations. Previous affiliations of Charles A. Kamhoua include Raytheon & Washington University in St. Louis.
Papers
More filters
Proceedings ArticleDOI
Cyber Threat Information sharing: A category-theoretic approach
TL;DR: The use of a category theory based approach to cyber threat information sharing is presented, the Functorial Query Language (FQL) is introduced and is used to implement the STIX schema.
Proceedings ArticleDOI
On the feasibility of an open-implementation cloud infrastructure: a game theoretic analysis
TL;DR: This paper aims to justify the benefits of a fully Open-Implementation cloud infrastructure, which means that the cloud's implementation and configuration details can be inspected by both the legitimate and malicious cloud users, and reduces the total security threats.
Book ChapterDOI
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework
TL;DR: This paper proposes the design and placement of network decoys considering scenarios where defender’s action influence an attacker to change its strategies and tactics dynamically while maintaining the trade-off between availability and security.
Journal ArticleDOI
Deceptive Labeling: Hypergames on Graphs for Stealthy Deception
TL;DR: This letter presents a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary and uses the solution to synthesize stealthy deceptive strategies.
Proceedings ArticleDOI
Hardware isolation technique for IRC-based botnets detection
TL;DR: Since, unlike other viruses, to be able to freely communicate with their masters, botnets' primary objective is to disable any protection mechanism found on the target machine; the proposed hardware-based isolation infrastructure presents an improvement over existing software-based solutions.