Cloud Computing and Blockchain Technology

  1. Tosh D.K., Shetty S., Foytik P., Kamhoua C., and Njilla L., "Blockchain Empowered Secure Internet-of-Battlefield Things (IoBT) Architecture", To appear in MILCOM, Los Angeles, October 2018.
  2. Tosh D.K., Shetty S., Foytik P., Kamhoua C., and Njilla L., "CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud", IEEE International Conference on Cloud Computing (Cloud 2018), July 2-7, 2018, San Francisco, CA, USA, August 2018 (Acceptance ratio: 19%)
  3. Liang X., Shetty S., Tosh D.K., Ji Y., and Li D., "Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System using Blockchain", 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), August 2018 (Acceptance ratio: 30.5%=33/108)
  4. Tosh D.K., Shetty S., Liang X., Kamhoua C., and Njilla L., "Consensus Protocols for Blockchain-based Data Provenance: Challenges and Opportunities", in Proceedings of IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 469-474, 2017.
  5. Liang X., Shetty S., Tosh D.K., Foytik P., and Zhang L., "Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger using Intel Software Guard Extensions", in Proceedings of 19th Intl. Conference on Information and Communications Security (ICICS), Dec 6-8, 2017.
  6. Ghosh, U., Chatterjee, P., Tosh D.K., Shetty S., Xiong, K., Kamhoua C., “A SDN based Framework for Guaranteeing Security and Performance in Information Centric Cloud Networks", in IEEE International Conference on Cloud Computing (CLOUD) (short paper), 2017
  7. Tosh D.K., Shetty S., Liang X., Kamhoua C., Kwiat K., and Njilla L., "Security implications of blockchain cloud with analysis of block withholding attack", in Proceedings of 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 458–467, 2017   
  8. Liang X., Shetty S., Tosh D.K., Kamhoua C., Kwiat K., Njilla L., "Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability", in Proceedings of 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 468–477, 2017   

Cyber-Threat Information Sharing and Cyber-Insurance

  1. Tosh D.K., Vakilinia I., Shetty S., Sengupta S., Kamhoua C., Njilla L., Kwiat K., "Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance", 8th Conference on Decision and Game Theory for Security (GameSec), pp. 519-532, Vienna, Austria, October 23-25, 2017
  2. Tosh D.K., Vakilinia I., Shetty S., Sengupta S., Kesan J., Kamhoua C., "Risk Management using Cyber-Threat Information Sharing and Cyber-Insurance", in EAI International Conference on Game Theory for Networks (GameNets), 2017 (Invited)
  3. Tosh D.K., Sengupta S., "Establishing Evolutionary Game Models for Cybersecurity Information Exchange (CYBEX)", Elsevier Journal of Computer and System Sciences (JCSS), Available online 19 October 2016, ISSN 0022-0000, http://dx.doi.org/10.1016/j.jcss.2016.08.005.   
  4. Tosh D.K., Sengupta S., Mukhopadhyay S., Kamhoua C., and Kwiat K., "Game Theoretic Modeling to Enforce Security Information Sharing among Firms", in Proceedings of the 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 7--12, 2015   
  5. Kamhoua C., Martin A., Tosh D.K., Kwiat K., Heitzenrater C., and Sengupta S., "Cyber-threats Information Sharing in Cloud Computing: A Game Theoretic Approach", in Proceedings of the 2nd IEEE Intl. Conf. on Cyber Security and Cloud Computing (CSCloud), pp. 382--389, 2015   
  6. Tosh D.K., M. Molloy, Sengupta S., Kamhoua C., and Kwiat K., "Cyber-investment and cyber-information exchange decision modeling", in Proceedings of the 7th IEEE International Conference on Cyberspace Safety and Security (CSS), pp. 1219–1224, 2015   
  7. Tosh D.K., Sengupta S., Kamhoua C.A., Kwiat K.A., Martin A., "An Evolutionary Game-Theoretic Framework for Cyber-threat Information Sharing", in Proceedings of IEEE International Conference on Communications (ICC), pp. 7341--7346, 2015   

Privacy Preservation in Cyber-Threat Informtion Sharing

  1. Vakilinia I., Tosh D.K., Sengupta S., "3-way Game Model for Privacy-Preserving Cybersecurity Information Exchange Framework", To appear in Military Communications Conference (MILCOM), IEEE, 2017
  2. Vakilinia I., Tosh D.K., Sengupta S., "Attribute Based Sharing in Cybersecurity Information Exchange Framework", To appear in The International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2017
  3. Vakilinia I., Tosh D.K., Sengupta S., "Privacy-Preserving Cybersecurity Information Exchange Scheme", in The International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), 2017

Cognitive Radio and Wireless Networks

  1. Tosh D.K., Sengupta S.,"An Adaptive Game Theoretic Framework for Self-coexistence among Cognitive Radio Enabled Smart Grid Networks", chapter in Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security, Taylor & Francis LLC, CRC Press, 2016
  2. Tosh D.K., Sengupta S., "Heterogeneous Access Network(s) Selection in Multi-Interface Radio Devices", in Proceedings of 12th International Workshop on Managing Ubiquitous Communications and Services, in conjunction with IEEE PerCom, pp. 117--122, 2015   
  3. Tosh D.K., Sengupta, S., "Self-coexistence in cognitive radio networks using multi-stage perception learning", in Proceedings of International Conference in Vehicular Technology and Communications (IEEE VTC-2013-Fall), vol.1, no.5, pp. 2-5, 2013   
  4. Tosh D.K., Udgata, S.K., Sabat, S.L., "Cognitive Radio Parameter Adaptation using Multi-Objective Evolutionary Algorithm", in Proceedings of International Conference on Soft Computing for Problem Solving (SocProS), vol. 1, pp. 697-708, 2011