• Publications
  • Influence
ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
TLDR
We propose ProvChain, an architecture to collect and verify cloud data provenance, by embedding the provenance data into blockchain transactions. Expand
Exploring the Attack Surface of Blockchain: A Systematic Overview
TLDR
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Expand
Game Theory for Cyber Security and Privacy
TLDR
In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes: cyber physical security, communication security, and privacy. Expand
Mitigating routing misbehavior in multi-hop networks using evolutionary game theory
TLDR
Multi-hop wireless networks have been an active research area for decades, however, the solutions proposed to solve routing misbehaviors are still not robust. Expand
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
TLDR
The blockchain technology has emerged as an attractive solution to address performance and security issues in distributed systems. Expand
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy
TLDR
We investigate network security and privacy in autonomous multi-hop network as a game between the nodes in the network. Expand
Establishing evolutionary game models for CYBer security information EXchange (CYBEX)
TLDR
We present an evolutionary game theoretic framework to investigate the economic benefits of cybersecurity information sharing and analyze the impacts and consequences of not participating in the game. Expand
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
TLDR
This work shows that there are multiple Nash equilibria for the public cloud security game. Expand
G-Storm: GPU-enabled high-throughput online data processing in Storm
TLDR
We present the design, implementation and evaluation of G-Storm, a GPU-enabled parallel system based on Storm, which harnesses the massively parallel computing power of GPUs for high-throughput online stream data processing. Expand
Hardware Trojan Detection Game: A Prospect-Theoretic Approach
TLDR
In this paper, a novel game-theoretic framework is proposed to analyze the interactions between a hardware manufacturer, acting as an attacker, and an IC testing facility that test the circuits for hardware torjans. Expand
...
1
2
3
4
5
...