scispace - formally typeset
C

Charles A. Kamhoua

Researcher at United States Army Research Laboratory

Publications -  231
Citations -  3743

Charles A. Kamhoua is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Game theory & Computer science. The author has an hindex of 23, co-authored 208 publications receiving 2558 citations. Previous affiliations of Charles A. Kamhoua include Raytheon & Washington University in St. Louis.

Papers
More filters
Proceedings ArticleDOI

Cyber Threat Information sharing: A category-theoretic approach

TL;DR: The use of a category theory based approach to cyber threat information sharing is presented, the Functorial Query Language (FQL) is introduced and is used to implement the STIX schema.
Proceedings ArticleDOI

On the feasibility of an open-implementation cloud infrastructure: a game theoretic analysis

TL;DR: This paper aims to justify the benefits of a fully Open-Implementation cloud infrastructure, which means that the cloud's implementation and configuration details can be inspected by both the legitimate and malicious cloud users, and reduces the total security threats.
Book ChapterDOI

Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework

TL;DR: This paper proposes the design and placement of network decoys considering scenarios where defender’s action influence an attacker to change its strategies and tactics dynamically while maintaining the trade-off between availability and security.
Journal ArticleDOI

Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

TL;DR: This letter presents a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary and uses the solution to synthesize stealthy deceptive strategies.
Proceedings ArticleDOI

Hardware isolation technique for IRC-based botnets detection

TL;DR: Since, unlike other viruses, to be able to freely communicate with their masters, botnets' primary objective is to disable any protection mechanism found on the target machine; the proposed hardware-based isolation infrastructure presents an improvement over existing software-based solutions.