Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid ¡¦, 2017 | 446 | 2017 |
Security implications of blockchain cloud with analysis of block withholding attack DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid ¡¦, 2017 | 121 | 2017 |
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses H Chen, M Pendleton, L Njilla, S Xu ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020 | 63 | 2020 |
Exploring the attack surface of blockchain: A systematic overview M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ... arXiv preprint arXiv:1904.03487, 2019 | 58 | 2019 |
Consensus protocols for blockchain-based data provenance: Challenges and opportunities DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile ¡¦, 2017 | 58 | 2017 |
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 302-309, 2018 | 31 | 2018 |
Reducing informational disadvantages to improve cyber risk management S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ... The Geneva Papers on Risk and Insurance-Issues and Practice 43 (2), 224-238, 2018 | 26 | 2018 |
Triad-nvm: Persistency for integrity-protected and encrypted non-volatile memories A Awad, M Ye, Y Solihin, L Njilla, KA Zubair Proceedings of the 46th International Symposium on Computer Architecture ¡¦, 2019 | 23 | 2019 |
Countering selfish mining in blockchains M Saad, L Njilla, C Kamhoua, A Mohaisen 2019 International Conference on Computing, Networking and Communications ¡¦, 2019 | 23 | 2019 |
Blockchain-empowered secure internet-of-battlefield things (iobt) architecture DK Tosh, S Shetty, P Foytik, L Njilla, CA Kamhoua MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 593-598, 2018 | 22 | 2018 |
iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity DB Rawat, L Njilla, K Kwiat, C Kamhoua 2018 International Conference on Computing, Networking and Communications ¡¦, 2018 | 22 | 2018 |
Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm M Nojoumian, A Golchubian, L Njilla, K Kwiat, C Kamhoua Science and Information Conference, 1118-1134, 2018 | 21 | 2018 |
Estimation of safe sensor measurements of autonomous system under attack RG Dutta, X Guo, T Zhang, K Kwiat, C Kamhoua, L Njilla, Y Jin Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 20 | 2017 |
Blocktrail: A scalable multichain solution for blockchain-based audit trails A Ahmad, M Saad, L Njilla, C Kamhoua, M Bassiouni, A Mohaisen ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 19 | 2019 |
Data provenance assurance in the cloud using blockchain S Shetty, V Red, C Kamhoua, K Kwiat, L Njilla Disruptive Technologies in Sensors and Sensor Systems 10206, 102060I, 2017 | 18 | 2017 |
Exploring the attack surface of blockchain: A comprehensive survey M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ... IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020 | 17 | 2020 |
Data provenance in the cloud: A blockchain-based approach D Tosh, S Shetty, X Liang, C Kamhoua, LL Njilla IEEE consumer electronics magazine 8 (4), 38-44, 2019 | 16 | 2019 |
FPGA-oriented moving target defense against security threats from malicious FPGA tools Z Zhang, Q Yu, L Njilla, C Kamhoua 2018 IEEE International Symposium on Hardware Oriented Security and Trust ¡¦, 2018 | 16 | 2018 |
A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish iot devices F Afghah, A Shamsoshoara, L Njilla, C Kamhoua IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops ¡¦, 2018 | 15 | 2018 |
Game theoretic modeling of security and trust relationship in cyberspace LY Njilla, N Pissinou, K Makki International Journal of Communication Systems 29 (9), 1500-1512, 2016 | 15 | 2016 |