![]() | 2009 | |
---|---|---|
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Backes, Peng Ning: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings Springer 2009 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Yao Liu, Michael K. Reiter, Peng Ning: False data injection attacks against state estimation in electric power grids. ACM Conference on Computer and Communications Security 2009: 21-32 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning: Countering kernel rootkits with lightweight hook protection. ACM Conference on Computer and Communications Security 2009: 545-554 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Attila Altay Yavuz, Peng Ning: BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ACSAC 2009: 219-228 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang: HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | An Liu, Peng Ning, Chun Wang: Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan: Securing network access in wireless sensor networks. WISEC 2009: 261-268 |
2008 | ||
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | An Liu, Peng Ning: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Sangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | An Liu, Young-Hyun Oh, Peng Ning: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Qi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008) |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008) |
2007 | ||
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 ACM 2007 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Vijay Atluri: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Ernesto Damiani, Seth Proctor: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Pan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Ronghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty: Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007) |
2006 | ||
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Kun Sun, Peng Ning, Cliff Wang: TinySeRSync: secure and resilient time synchronization in wireless sensor networks. ACM Conference on Computer and Communications Security 2006: 264-277 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Kun Sun, Pai Peng, Peng Ning, Cliff Wang: Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Pai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Yan Zhai, Peng Ning, Jun Xu: Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Kun Sun, Peng Ning, Cliff Wang: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 395-408 (2006) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006) |
2005 | ||
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Dingbang Xu, Peng Ning: Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ACSAC 2005: 537-546 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Pan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Lei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Pan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Kun Sun: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005) |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Kun Sun, Peng Ning, Cliff Wang: Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 177-189 (2005) |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 1(2): 204-239 (2005) |
2004 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Dingbang Xu, Peng Ning: Alert Correlation through Triggering Events and Common Resources. ACSAC 2004: 360-369 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Qinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Pan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Qinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant: Building Attack Scenarios through Integration of Complementary Alert Correlation Method. NDSS 2004 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004) |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Dingbang Xu: Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004) |
2003 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Dingbang Xu: Learning attack strategies from intrusion alerts. ACM Conference on Computer and Communications Security 2003: 200-209 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Dingbang Xu: Adapting Query Optimization Techniques for Efficient Alert Correlation. DBSec 2003: 75-88 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Kun Sun: How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Donggang Liu, Peng Ning: Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) |
2002 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002) |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002) |
2001 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Yiqun Lisa Yin: Efficient Software Implementation for Finite Field Multiplication in Normal Basis. ICICS 2001: 177-188 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001) |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001) |
2000 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000) |