The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of Laurent Njilla Laurent L. Njilla ( http://dblp.L3S.de/Authors/Laurent_Njilla )

Publication years (Num. hits)
2016 (3) 2017 (23) 2018 (22) 2019 (15)
Publication types (Num. hits)
article(11) inproceedings(52)
Venues (Conferences, Journals, ...)
CoRR(8) ICC(5) ICNC(5) CCGRID(3) HASE(3) CNS(2) DASC/PiCom/DataCom/CyberSciTec...(2) HOST(2) ICDCS Workshops(2) IEEE CLOUD(2) INFOCOM Workshops(2) PAC(2) AAAI Workshops(1) AIPR(1) AsianHOST(1) CAMAD(1) More (+10 of total 37)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 64 publication records. Showing 63 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent L. Njilla Data Provenance in the Cloud: A Blockchain-Based Approach. Search on Bibsonomy IEEE Consumer Electronics Magazine The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yongxin Liu, Laurent L. Njilla, Jian Wang, Houbing Song An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud. Search on Bibsonomy ICNC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Qiaoyan Yu Thwarting Security Threats From Malicious FPGA Tools With Novel FPGA-Oriented Moving Target Defense. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen Exploring the Attack Surface of Blockchain: A Systematic Overview. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Ronald Doku, Danda B. Rawat, Moses Garuba, Laurent Njilla LightChain: On the Lightweight Blockchain for the Internet-of-Things. Search on Bibsonomy SMARTCOMP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Joongheon Kim, DaeHun Nyang, Aziz Mohaisen Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. Search on Bibsonomy IEEE ICBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Monica Senapati, Laurent Njilla, Praveen Rao A Method for Scalable First-Order Rule Learning on Twitter Data. Search on Bibsonomy ICDE Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen Countering Selfish Mining in Blockchains. Search on Bibsonomy ICNC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. Search on Bibsonomy ICNC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marco A. Gamarra, Sachin Shetty, Oscar R. Gonzalez, Laurent Njilla, Marcus Pendleton, Charles A. Kamhoua Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ashar Ahmad, Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Mostafa Bassiouni, Aziz Mohaisen BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Soamar Homsi, Gang Quan, Wujie Wen, Gustavo A. Chaparro-Baquero, Laurent Njilla Game Theoretic-Based Approaches for Cybersecurity-Aware Virtual Machine Placement in Public Cloud Clusters. Search on Bibsonomy CCGRID The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hong Zhao, Laurent Njilla Hardware Assisted Chaos Based IoT Authentication. Search on Bibsonomy ICNSC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amro Awad, Mao Ye, Yan Solihin, Laurent Njilla, Kazi Abu Zubair Triad-NVM: persistency for integrity-protected and encrypted non-volatile memories. Search on Bibsonomy ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuanxiong Guo, Yanmin Gong, Laurent L. Njilla, Charles A. Kamhoua A stochastic game approach to cyber-physical security with applications to smart grid. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xueping Liang, Sachin Shetty, Deepak K. Tosh, Daniel Bowden, Laurent Njilla, Charles A. Kamhoua Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications. Search on Bibsonomy EAI Endorsed Trans. Pervasive Health Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen Countering Selfish Mining in Blockchains. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat Enabling Cooperative IoT Security via Software Defined Networks (SDN). Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua A Reputation-based Stackelberg Game Model to Enhance Secrecy Rate in Spectrum Leasing to Selfish IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Amro Awad, Laurent Njilla, Mao Ye Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories (NVMs). Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Phuc Thai, Laurent Njilla, Tuyet Duong, Lei Fan, Hong-Sheng Zhou A Generic Paradigm for Blockchain Design. Search on Bibsonomy MobiQuitous The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory. Search on Bibsonomy MWSCAS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Geremew Begna, Danda B. Rawat, Moses Garuba, Laurent Njilla SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework. Search on Bibsonomy CNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Laurent Njilla Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications. Search on Bibsonomy CNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danda B. Rawat, Laurent Njilla, Kevin A. Kwiat, Charles A. Kamhoua iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity. Search on Bibsonomy ICNC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat Diversity Modeling to Evaluate Security of Multiple SDN Controllers. Search on Bibsonomy ICNC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuzhe Tang, Qiwu Zou, Ju Chen, Kai Li, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla ChainFS: Blockchain-Secured Cloud Storage. Search on Bibsonomy IEEE CLOUD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Deepak K. Tosh, Sachin Shetty, Peter Foytik, Charles A. Kamhoua, Laurent Njilla CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud. Search on Bibsonomy IEEE CLOUD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Garegin Grigoryan, Yaoqing Liu, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat Enabling Cooperative IoT Security via Software Defined Networks (SDN). Search on Bibsonomy ICC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marco A. Gamarra, Sachin Shetty, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. Search on Bibsonomy ICC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jeman Park 0001, Hisham Alasmary, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla, Aziz Mohaisen QOI: Assessing Participation in Threat Information Sharing. Search on Bibsonomy ICASSP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiming Zhang, Qiaoyan Yu, Laurent Njilla, Charles A. Kamhoua FPGA-oriented moving target defense against security threats from malicious FPGA tools. Search on Bibsonomy HOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiming Zhang, Laurent Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Qiaoyan Yu Securing FPGA-based obsolete component replacement for legacy systems. Search on Bibsonomy ISQED The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Deepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. Search on Bibsonomy MILCOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Kornish, Justin Geary, Victor Sansing, Soundararajan Ezekiel, Larry Pearlstein, Laurent Njilla Malware Classification using Deep Convolutional Neural Networks. Search on Bibsonomy AIPR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou Cyber Security Resource Allocation: A Markov Decision Process Approach. Search on Bibsonomy HASE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar 0001, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla Approach to detect non-adversarial overlapping collusion in crowdsourcing. Search on Bibsonomy IPCCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omar Al-Ibrahim, Aziz Mohaisen, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Rethinking Information Sharing for Actionable Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. Search on Bibsonomy HASE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. Search on Bibsonomy HASE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Automatic Generation of Hardware Sandboxes for Trojan Mitigation in Systems on Chip (Abstract Only). Search on Bibsonomy FPGA The full citation details ... 2017 DBLP  BibTeX  RDF
1Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. Search on Bibsonomy GameSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla A game theoretic approach for inspecting web-based malvertising. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Laurent Njilla, Harold N. Ouete, Niki Pissinou, Kia Makki Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration. Search on Bibsonomy SysCon The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Rethinking information sharing for threat intelligence. Search on Bibsonomy HotWeb The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Praveen Rao, Anas Katib, Kobus Barnard, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Scalable Score Computation for Learning Multinomial Bayesian Networks over Distributed Data. Search on Bibsonomy AAAI Workshops The full citation details ... 2017 DBLP  BibTeX  RDF
1Aziz Mohaisen, Zhongshu Gu, Kui Ren 0001, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang Understanding the Privacy Implications of DNSSEC Look-Aside Validation. Search on Bibsonomy PAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Assessing Quality of Contribution in Information Sharing for Threat Intelligence. Search on Bibsonomy PAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. Search on Bibsonomy CCGrid The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. Search on Bibsonomy CCGrid The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Bobda, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Synthesis of hardware sandboxes for Trojan mitigation in systems on chip. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar 0001, Jonathan Beltran, Charles A. Kamhoua, Brandon L. Hernandez, Laurent Njilla, Alex Pissinou Makki Preventing Colluding Identity Clone Attacks in Online Social Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gael Kamdem, Charles A. Kamhoua, Yue Lu, Sachin Shetty, Laurent Njilla A Markov Game Theoritic Approach for Power Grid Security. Search on Bibsonomy ICDCS Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin Approximate Power Grid Protection Against False Data Injection Attacks. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla Consensus protocols for blockchain-based data provenance: Challenges and opportunities. Search on Bibsonomy UEMCON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin Estimation of Safe Sensor Measurements of Autonomous System Under Attack. Search on Bibsonomy DAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Laurent L. Njilla, Harold N. Ouete, Dean K. Doungwa Monitoring colluding behavior in MANETs using game theory. Search on Bibsonomy CAMAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Praveen Rao, Anas Katib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Probabilistic Inference on Twitter Data to Discover Suspicious Users and Malicious Content. Search on Bibsonomy CIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Syed Rafay Hasan, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. Search on Bibsonomy AsianHOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #63 of 63 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license