Follow
Laurent Njilla
Title
Cited by
Cited by
Year
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
6652017
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses
H Chen, M Pendleton, L Njilla, S Xu
ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020
2452020
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
1852017
Exploring the attack surface of blockchain: A systematic overview
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
arXiv preprint arXiv:1904.03487, 2019
1482019
Exploring the attack surface of blockchain: A comprehensive survey
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1977-2008, 2020
1222020
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
882017
Countering selfish mining in blockchains
M Saad, L Njilla, C Kamhoua, A Mohaisen
2019 International Conference on Computing, Networking and Communications …, 2019
572019
Mempool optimization for defending against DDoS attacks in PoW-based blockchain systems
M Saad, L Njilla, C Kamhoua, J Kim, DH Nyang, A Mohaisen
2019 IEEE international conference on blockchain and cryptocurrency (ICBC …, 2019
542019
CloudPoS: A proof-of-stake consensus design for blockchain integrated cloud
D Tosh, S Shetty, P Foytik, C Kamhoua, L Njilla
2018 IEEE 11th international conference on cloud computing (CLOUD), 302-309, 2018
532018
Triad-nvm: Persistency for integrity-protected and encrypted non-volatile memories
A Awad, M Ye, Y Solihin, L Njilla, KA Zubair
Proceedings of the 46th International Symposium on Computer Architecture …, 2019
522019
Reducing informational disadvantages to improve cyber risk management
S Shetty, M McShane, L Zhang, JP Kesan, CA Kamhoua, K Kwiat, ...
The Geneva Papers on Risk and Insurance-Issues and Practice 43 (2), 224-238, 2018
482018
iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity
DB Rawat, L Njilla, K Kwiat, C Kamhoua
2018 International Conference on Computing, Networking and Communications …, 2018
412018
Blockchain for distributed systems security
S Shetty, CA Kamhoua, LL Njilla
John Wiley & Sons, 2019
382019
Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm
M Nojoumian, A Golchubian, L Njilla, K Kwiat, C Kamhoua
Science and Information Conference, 1118-1134, 2018
362018
Blocktrail: A scalable multichain solution for blockchain-based audit trails
A Ahmad, M Saad, L Njilla, C Kamhoua, M Bassiouni, A Mohaisen
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
352019
Blockchain-empowered secure internet-of-battlefield things (iobt) architecture
DK Tosh, S Shetty, P Foytik, L Njilla, CA Kamhoua
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 593-598, 2018
352018
Data provenance in the cloud: A blockchain-based approach
D Tosh, S Shetty, X Liang, C Kamhoua, LL Njilla
IEEE consumer electronics magazine 8 (4), 38-44, 2019
312019
Estimation of safe sensor measurements of autonomous system under attack
RG Dutta, X Guo, T Zhang, K Kwiat, C Kamhoua, L Njilla, Y Jin
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
302017
Overview of attack surfaces in blockchain
M Saad, J Spaulding, L Njilla, CA Kamhoua, D Nyang, A Mohaisen
Blockchain for distributed systems security, 51-66, 2019
292019
Data provenance assurance in the cloud using blockchain
S Shetty, V Red, C Kamhoua, K Kwiat, L Njilla
Disruptive Technologies in Sensors and Sensor Systems 10206, 125-135, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20