2009 | ||
---|---|---|
86 | Michael Backes, Peng Ning: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings Springer 2009 | |
85 | Yao Liu, Michael K. Reiter, Peng Ning: False data injection attacks against state estimation in electric power grids. ACM Conference on Computer and Communications Security 2009: 21-32 | |
84 | Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning: Countering kernel rootkits with lightweight hook protection. ACM Conference on Computer and Communications Security 2009: 545-554 | |
83 | Attila Altay Yavuz, Peng Ning: BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ACSAC 2009: 219-228 | |
82 | Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang: HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470 | |
81 | Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124 | |
80 | An Liu, Peng Ning, Chun Wang: Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250 | |
79 | Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan: Securing network access in wireless sensor networks. WISEC 2009: 261-268 | |
2008 | ||
78 | Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008 | |
77 | An Liu, Peng Ning: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256 | |
76 | Sangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 | |
75 | An Liu, Young-Hyun Oh, Peng Ning: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562 | |
74 | Qi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12 | |
73 | Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
72 | Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) | |
71 | Peng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008) | |
70 | Donggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008) | |
2007 | ||
69 | Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 ACM 2007 | |
68 | Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007 | |
67 | Peng Ning, Vijay Atluri: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
66 | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
65 | Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007 | |
64 | Peng Ning, Ernesto Damiani, Seth Proctor: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
63 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572 | |
62 | Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462 | |
61 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12 | |
60 | Pan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56 | |
59 | Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642 | |
58 | Ronghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79 | |
57 | Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty: Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8 | |
56 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007) | |
2006 | ||
55 | Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006 | |
54 | Kun Sun, Peng Ning, Cliff Wang: TinySeRSync: secure and resilient time synchronization in wireless sensor networks. ACM Conference on Computer and Communications Security 2006: 264-277 | |
53 | Kun Sun, Pai Peng, Peng Ning, Cliff Wang: Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140 | |
52 | Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348 | |
51 | Pai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349 | |
50 | Yan Zhai, Peng Ning, Jun Xu: Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284 | |
49 | Kun Sun, Peng Ning, Cliff Wang: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 395-408 (2006) | |
48 | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006) | |
2005 | ||
47 | Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005 | |
46 | Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234 | |
45 | Dingbang Xu, Peng Ning: Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ACSAC 2005: 537-546 | |
44 | Donggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619 | |
43 | Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113 | |
42 | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191 | |
41 | Pan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362 | |
40 | Lei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171 | |
39 | Wenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005 | |
38 | Donggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106 | |
37 | Wenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67 | |
36 | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 | |
35 | Pan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522 | |
34 | Donggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20 | |
33 | Donggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005) | |
32 | Peng Ning, Kun Sun: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005) | |
31 | Kun Sun, Peng Ning, Cliff Wang: Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 177-189 (2005) | |
30 | Donggang Liu, Peng Ning: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 1(2): 204-239 (2005) | |
2004 | ||
29 | Dingbang Xu, Peng Ning: Alert Correlation through Triggering Events and Common Resources. ACSAC 2004: 360-369 | |
28 | Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48 | |
27 | Qinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207 | |
26 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271 | |
25 | Pan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38 | |
24 | Qinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303 | |
23 | Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant: Building Attack Scenarios through Integration of Complementary Alert Correlation Method. NDSS 2004 | |
22 | Donggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004) | |
21 | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) | |
20 | Peng Ning, Dingbang Xu: Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004) | |
2003 | ||
19 | Peng Ning, Dingbang Xu: Learning attack strategies from intrusion alerts. ACM Conference on Computer and Communications Security 2003: 200-209 | |
18 | Donggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240 | |
17 | Donggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61 | |
16 | Peng Ning, Dingbang Xu: Adapting Query Optimization Techniques for Efficient Alert Correlation. DBSec 2003: 75-88 | |
15 | Peng Ning, Kun Sun: How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67 | |
14 | Donggang Liu, Peng Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003 | |
13 | Donggang Liu, Peng Ning: Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82 | |
12 | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) | |
2002 | ||
11 | Peng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254 | |
10 | Peng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94 | |
9 | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002) | |
8 | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002) | |
2001 | ||
7 | Peng Ning, Yiqun Lisa Yin: Efficient Software Implementation for Finite Field Multiplication in Normal Basis. ICICS 2001: 177-188 | |
6 | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 | |
5 | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001) | |
4 | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001) | |
2000 | ||
3 | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640 | |
2 | Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180 | |
1 | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000) |