BibTeX records: Peng Ning

download as .bib file

@article{DBLP:journals/access/YangZN23,
  author       = {Jie Yang and
                  Hongchang Zhang and
                  Peng Ning},
  title        = {Path Planning and Trajectory Optimization Based on Improved {APF}
                  and Multi-Target},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {139121--139132},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3338683},
  doi          = {10.1109/ACCESS.2023.3338683},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YangZN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouZSLJAWNR23,
  author       = {Jinmeng Zhou and
                  Tong Zhang and
                  Wenbo Shen and
                  Dongyoon Lee and
                  Changhee Jung and
                  Ahmed M. Azab and
                  Ruowen Wang and
                  Peng Ning and
                  Kui Ren},
  title        = {Automatic Permission Check Analysis for Linux Kernel},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1849--1866},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3165368},
  doi          = {10.1109/TDSC.2022.3165368},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouZSLJAWNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/QiaoNXYLC22,
  author       = {Guangda Qiao and
                  Peng Ning and
                  Xiao Xia and
                  Yang Yu and
                  Xiaohui Lu and
                  Tinghai Cheng},
  title        = {Achieving Smooth Motion for Piezoelectric Stick-Slip Actuator With
                  the Inertial Block Structure},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {69},
  number       = {4},
  pages        = {3948--3958},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIE.2021.3073314},
  doi          = {10.1109/TIE.2021.3073314},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/QiaoNXYLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/FengZZMWYJWAN19,
  author       = {Qian Feng and
                  Rundong Zhou and
                  Yanhui Zhao and
                  Jia Ma and
                  Yifei Wang and
                  Na Yu and
                  Xudong Jin and
                  Jian Wang and
                  Ahmed M. Azab and
                  Peng Ning},
  title        = {Learning Binary Representation for Automatic Patch Detection},
  booktitle    = {16th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2019, Las Vegas, NV, USA, January 11-14, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCNC.2019.8651721},
  doi          = {10.1109/CCNC.2019.8651721},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/FengZZMWYJWAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HyunSN17,
  author       = {Sangwon Hyun and
                  Kun Sun and
                  Peng Ning},
  title        = {FEC-Seluge: Efficient, reliable, and secure large data dissemination
                  using erasure codes},
  journal      = {Comput. Commun.},
  volume       = {104},
  pages        = {191--203},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2017.01.005},
  doi          = {10.1016/J.COMCOM.2017.01.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/HyunSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HeDND17,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning and
                  Rudra Dutta},
  title        = {A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant
                  and Opportunistic Resource Sharing Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {35},
  number       = {3},
  pages        = {615--627},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSAC.2017.2659581},
  doi          = {10.1109/JSAC.2017.2659581},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/HeDND17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenAGN17,
  author       = {Quan Chen and
                  Ahmed M. Azab and
                  Guruprasad Ganesh and
                  Peng Ning},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials
                  from Memory Corruption Attacks},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {167--178},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053029},
  doi          = {10.1145/3052973.3053029},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenAGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangAELNCSC17,
  author       = {Ruowen Wang and
                  Ahmed M. Azab and
                  William Enck and
                  Ninghui Li and
                  Peng Ning and
                  Xun Chen and
                  Wenbo Shen and
                  Yueqiang Cheng},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {{SPOKE:} Scalable Knowledge Collection and Attack Surface Analysis
                  of Access Control Policy for Security Enhanced Android},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {612--624},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052991},
  doi          = {10.1145/3052973.3052991},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangAELNCSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/JinHDDN17,
  author       = {Richeng Jin and
                  Xiaofan He and
                  Huaiyu Dai and
                  Rudra Dutta and
                  Peng Ning},
  title        = {Towards Privacy-Aware Collaborative Security: {A} Game-Theoretic Approach},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {72--83},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.32},
  doi          = {10.1109/PAC.2017.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/JinHDDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17,
  author       = {Massimiliano Albanese and
                  Nancy J. Cooke and
                  Gonz{\'{a}}lez Coty and
                  David Hall and
                  Christopher G. Healey and
                  Sushil Jajodia and
                  Peng Liu and
                  Michael D. McNeese and
                  Peng Ning and
                  Douglas S. Reeves and
                  V. S. Subrahmanian and
                  Cliff Wang and
                  John Yen},
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Computer-Aided Human Centric Cyber Situation Awareness},
  booktitle    = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5\_1},
  doi          = {10.1007/978-3-319-61152-5\_1},
  timestamp    = {Mon, 03 Jan 2022 21:52:37 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/HeDND16,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning and
                  Rudra Dutta},
  title        = {Zero-determinant Strategies for Multi-player Multi-action Iterated
                  Games},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {23},
  number       = {3},
  pages        = {311--315},
  year         = {2016},
  url          = {https://doi.org/10.1109/LSP.2016.2517640},
  doi          = {10.1109/LSP.2016.2517640},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/HeDND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FangLN16,
  author       = {Song Fang and
                  Yao Liu and
                  Peng Ning},
  title        = {Wireless Communications under Broadband Reactive Jamming Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {394--408},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2399304},
  doi          = {10.1109/TDSC.2015.2399304},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FangLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangLN16,
  author       = {Song Fang and
                  Yao Liu and
                  Peng Ning},
  title        = {Mimicry Attacks Against Wireless Link Signature and New Defense Using
                  Time-Synched Link Signature},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {7},
  pages        = {1515--1527},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2541307},
  doi          = {10.1109/TIFS.2016.2541307},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FangLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/HeDN16,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Faster Learning and Adaptation in Security Games by Exploiting Information
                  Asymmetry},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {64},
  number       = {13},
  pages        = {3429--3443},
  year         = {2016},
  url          = {https://doi.org/10.1109/TSP.2016.2548987},
  doi          = {10.1109/TSP.2016.2548987},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/HeDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangRNH16,
  author       = {Qian Wang and
                  Kui Ren and
                  Peng Ning and
                  Shengshan Hu},
  title        = {Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access
                  in Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {65},
  number       = {10},
  pages        = {8331--8344},
  year         = {2016},
  url          = {https://doi.org/10.1109/TVT.2015.2511071},
  doi          = {10.1109/TVT.2015.2511071},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WangRNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeDSND16,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Wenbo Shen and
                  Peng Ning and
                  Rudra Dutta},
  title        = {Toward Proper Guard Zones for Link Signature},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {15},
  number       = {3},
  pages        = {2104--2117},
  year         = {2016},
  url          = {https://doi.org/10.1109/TWC.2015.2498621},
  doi          = {10.1109/TWC.2015.2498621},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/HeDSND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HeDND16,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning and
                  Rudra Dutta},
  title        = {A multi-player Markov stopping game for delay-tolerant and opportunistic
                  resource sharing networks},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524350},
  doi          = {10.1109/INFOCOM.2016.7524350},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HeDND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AzabSBMSWN16,
  author       = {Ahmed M. Azab and
                  Kirk Swidowski and
                  Rohan Bhutkar and
                  Jia Ma and
                  Wenbo Shen and
                  Ruowen Wang and
                  Peng Ning},
  title        = {{SKEE:} {A} lightweight Secure Kernel-level Execution Environment
                  for {ARM}},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/skee-lightweight-secure-kernel-level-execution-environment-for-arm.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AzabSBMSWN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GiontaEN15,
  author       = {Jason Gionta and
                  William Enck and
                  Peng Ning},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {HideM: Protecting the Contents of Userspace Memory in the Face of
                  Disclosure Vulnerabilities},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {325--336},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699107},
  doi          = {10.1145/2699026.2699107},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GiontaEN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HeDND15,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning and
                  Rudra Dutta},
  title        = {Dynamic {IDS} Configuration in the Presence of Intruder Type Uncertainty},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417158},
  doi          = {10.1109/GLOCOM.2014.7417158},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HeDND15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HeDND15,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning and
                  Rudra Dutta},
  title        = {A stochastic multi-channel spectrum access game with incomplete information},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {4799--4804},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249082},
  doi          = {10.1109/ICC.2015.7249082},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HeDND15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HeDN15,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Improving learning and adaptation in security games by exploiting
                  information asymmetry},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {1787--1795},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218560},
  doi          = {10.1109/INFOCOM.2015.7218560},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HeDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ShenLHDN15,
  author       = {Wenbo Shen and
                  Yao Liu and
                  Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {No time to demodulate - fast physical layer verification of friendly
                  jamming},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {653--658},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357518},
  doi          = {10.1109/MILCOM.2015.7357518},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/ShenLHDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/XiongN15,
  author       = {Kaiqi Xiong and
                  Peng Ning},
  editor       = {Roger L. Wainwright and
                  Juan Manuel Corchado and
                  Alessio Bechini and
                  Jiman Hong},
  title        = {Cost-efficient and attack-resilient approaches for state estimation
                  in power grids},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
                  Salamanca, Spain, April 13-17, 2015},
  pages        = {2192--2197},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2695664.2695937},
  doi          = {10.1145/2695664.2695937},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/XiongN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangERZNXZA15,
  author       = {Ruowen Wang and
                  William Enck and
                  Douglas S. Reeves and
                  Xinwen Zhang and
                  Peng Ning and
                  Dingbang Xu and
                  Wu Zhou and
                  Ahmed M. Azab},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {EASEAndroid: Automatic Policy Analysis and Refinement for Security
                  Enhanced Android via Large-Scale Semi-Supervised Learning},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {351--366},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangERZNXZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RenSGNL14,
  author       = {Kui Ren and
                  Pierangela Samarati and
                  Marco Gruteser and
                  Peng Ning and
                  Yunhao Liu},
  title        = {Guest Editorial Special Issue on Security for IoT: The State of the
                  Art},
  journal      = {{IEEE} Internet Things J.},
  volume       = {1},
  number       = {5},
  pages        = {369--371},
  year         = {2014},
  url          = {https://doi.org/10.1109/JIOT.2014.2361608},
  doi          = {10.1109/JIOT.2014.2361608},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/RenSGNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangYYGNZ14,
  author       = {Yuan Zhang and
                  Min Yang and
                  Zhemin Yang and
                  Guofei Gu and
                  Peng Ning and
                  Binyu Zang},
  title        = {Permission Use Analysis for Vetting Undesirable Behaviors in Android
                  Apps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {11},
  pages        = {1828--1842},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2347206},
  doi          = {10.1109/TIFS.2014.2347206},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangYYGNZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeDN14,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Dynamic Adaptive Anti-Jamming via Controlled Mobility},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {13},
  number       = {8},
  pages        = {4374--4388},
  year         = {2014},
  url          = {https://doi.org/10.1109/TWC.2014.2320973},
  doi          = {10.1109/TWC.2014.2320973},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GiontaAENZ14,
  author       = {Jason Gionta and
                  Ahmed M. Azab and
                  William Enck and
                  Peng Ning and
                  Xiaolan Zhang},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{SEER:} practical memory virus scanning as a service},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {186--195},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664271},
  doi          = {10.1145/2664243.2664271},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GiontaAENZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ning14,
  author       = {Peng Ning},
  editor       = {Cliff Wang and
                  Dijiang Huang and
                  Kapil Singh and
                  Zhenkai Liang},
  title        = {Samsung {KNOX} and Enterprise Mobile Security},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones
                  {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November
                  03 - 07, 2014},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666620.2666632},
  doi          = {10.1145/2666620.2666632},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Ning14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AzabNSCBGMS14,
  author       = {Ahmed M. Azab and
                  Peng Ning and
                  Jitesh Shah and
                  Quan Chen and
                  Rohan Bhutkar and
                  Guruprasad Ganesh and
                  Jia Ma and
                  Wenbo Shen},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Hypervision Across Worlds: Real-time Kernel Protection from the {ARM}
                  TrustZone Secure World},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {90--102},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660350},
  doi          = {10.1145/2660267.2660350},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AzabNSCBGMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeDHWSN14,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Yufan Huang and
                  Dong Wang and
                  Wenbo Shen and
                  Peng Ning},
  title        = {The security of link signature: {A} view from channel models},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997473},
  doi          = {10.1109/CNS.2014.6997473},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeDHWSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ShenNHDL14,
  author       = {Wenbo Shen and
                  Peng Ning and
                  Xiaofan He and
                  Huaiyu Dai and
                  Yao Liu},
  title        = {{MCR} Decoding: {A} {MIMO} approach for defending against wireless
                  jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997478},
  doi          = {10.1109/CNS.2014.6997478},
  timestamp    = {Sat, 24 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ShenNHDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/HeDSN14,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Wenbo Shen and
                  Peng Ning},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Channel correlation modeling for link signature security assessment},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600201},
  doi          = {10.1145/2600176.2600201},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/HeDSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/YuNV14,
  author       = {Xianqing Yu and
                  Peng Ning and
                  Mladen A. Vouk},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Securing Hadoop in cloud},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {26},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600202},
  doi          = {10.1145/2600176.2600202},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/YuNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GiontaAENZ14,
  author       = {Jason Gionta and
                  Ahmed M. Azab and
                  William Enck and
                  Peng Ning and
                  Xiaolan Zhang},
  editor       = {Chris Kanich and
                  Patrick Lardieri},
  title        = {{DACSA:} {A} Decoupled Architecture for Cloud Security Analysis},
  booktitle    = {7th Workshop on Cyber Security Experimentation and Test, {CSET} '14,
                  San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/cset14/workshop-program/gionta},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GiontaAENZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HeDN13,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {HMM-Based Malicious User Detection for Robust Collaborative Spectrum
                  Sensing},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {31},
  number       = {11},
  pages        = {2196--2208},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSAC.2013.131119},
  doi          = {10.1109/JSAC.2013.131119},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/HeDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/DongLN13,
  author       = {Qi Dong and
                  Donggang Liu and
                  Peng Ning},
  title        = {Providing DoS resistance for signature-based broadcast authentication
                  in sensor networks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {73:1--73:26},
  year         = {2013},
  url          = {https://doi.org/10.1145/2442116.2442123},
  doi          = {10.1145/2442116.2442123},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/DongLN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeDN13,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional
                  Frequency Check},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {12},
  number       = {5},
  pages        = {2512--2523},
  year         = {2013},
  url          = {https://doi.org/10.1109/TWC.2013.031313.121551},
  doi          = {10.1109/TWC.2013.031313.121551},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangYXYGNWZ13,
  author       = {Yuan Zhang and
                  Min Yang and
                  Bingquan Xu and
                  Zhemin Yang and
                  Guofei Gu and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Binyu Zang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Vetting undesirable behaviors in android apps with permission use
                  analysis},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {611--622},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516689},
  doi          = {10.1145/2508859.2516689},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangYXYGNWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangYZGNW13,
  author       = {Zhemin Yang and
                  Min Yang and
                  Yuan Zhang and
                  Guofei Gu and
                  Peng Ning and
                  Xiaoyang Sean Wang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {AppIntent: analyzing sensitive data transmission in android for privacy
                  leakage detection},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1043--1054},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516676},
  doi          = {10.1145/2508859.2516676},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangYZGNW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HeDN13,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Dynamic adaptive anti-jamming via controlled mobility},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682686},
  doi          = {10.1109/CNS.2013.6682686},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HeDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HeDSN13,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Wenbo Shen and
                  Peng Ning},
  title        = {Is link signature dependable for wireless security?},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {200--204},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566763},
  doi          = {10.1109/INFCOM.2013.6566763},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HeDSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Ning13,
  author       = {Peng Ning},
  title        = {Program Chair's Message},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/ndss-2013-program-chairs-message},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Ning13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShenNHD13,
  author       = {Wenbo Shen and
                  Peng Ning and
                  Xiaofan He and
                  Huaiyu Dai},
  title        = {Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own
                  Wireless Connectivity at the Same Time},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {174--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.22},
  doi          = {10.1109/SP.2013.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ShenNHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangNXC13,
  author       = {Ruowen Wang and
                  Peng Ning and
                  Tao Xie and
                  Quan Chen},
  editor       = {Samuel T. King},
  title        = {MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced
                  Symbolic Analysis},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {65--80},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/papers/wang},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangNXC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/KimIN12,
  author       = {Mihui Kim and
                  Varagur Karthik Sriram Iyer and
                  Peng Ning},
  title        = {MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {3},
  pages        = {299--316},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2011.07.001},
  doi          = {10.1016/J.ADHOC.2011.07.001},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/KimIN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/YavuzN12,
  author       = {Attila Altay Yavuz and
                  Peng Ning},
  title        = {Self-sustaining, efficient and forward-secure cryptographic constructions
                  for Unattended Wireless Sensor Networks},
  journal      = {Ad Hoc Networks},
  volume       = {10},
  number       = {7},
  pages        = {1204--1220},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.adhoc.2012.03.006},
  doi          = {10.1016/J.ADHOC.2012.03.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/YavuzN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PyunPRWN12,
  author       = {Young June Pyun and
                  Young Hee Park and
                  Douglas S. Reeves and
                  Xinyuan Wang and
                  Peng Ning},
  title        = {Interval-based flow watermarking for tracing interactive traffic},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {5},
  pages        = {1646--1665},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.01.017},
  doi          = {10.1016/J.COMNET.2012.01.017},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PyunPRWN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaoDN12,
  author       = {Liang Xiao and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency
                  Hopping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {1},
  pages        = {297--309},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2165948},
  doi          = {10.1109/TIFS.2011.2165948},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaoDN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YavuzNR12,
  author       = {Attila Altay Yavuz and
                  Peng Ning and
                  Michael K. Reiter},
  title        = {{BAF} and {FI-BAF:} Efficient and Publicly Verifiable Cryptographic
                  Schemes for Secure Logging in Resource-Constrained Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {9:1--9:28},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240280},
  doi          = {10.1145/2240276.2240280},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YavuzNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/XiongWDN12,
  author       = {Kaiqi Xiong and
                  Ronghua Wang and
                  Wenliang Du and
                  Peng Ning},
  title        = {Containing bogus packet insertion attacks for broadcast authentication
                  in sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {8},
  number       = {3},
  pages        = {20:1--20:30},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240092.2240094},
  doi          = {10.1145/2240092.2240094},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/XiongWDN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/LiDXN12,
  author       = {Chengzhi Li and
                  Huaiyu Dai and
                  Liang Xiao and
                  Peng Ning},
  title        = {Communication Efficiency of Anti-Jamming Broadcast in Large-Scale
                  Multi-Channel Wireless Networks},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {60},
  number       = {10},
  pages        = {5281--5292},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSP.2012.2206589},
  doi          = {10.1109/TSP.2012.2206589},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/LiDXN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/XiaoDN12,
  author       = {Liang Xiao and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {{MAC} Design of Uncoordinated FH-Based Collaborative Broadcast},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {1},
  number       = {3},
  pages        = {261--264},
  year         = {2012},
  url          = {https://doi.org/10.1109/WCL.2012.041012.120162},
  doi          = {10.1109/WCL.2012.041012.120162},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/XiaoDN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GiontaNZ12,
  author       = {Jason Gionta and
                  Peng Ning and
                  Xiaolan Zhang},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {iHTTP: Efficient Authentication of Non-confidential {HTTP} Traffic},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_23},
  doi          = {10.1007/978-3-642-31284-7\_23},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GiontaNZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhouZJN12,
  author       = {Wu Zhou and
                  Yajin Zhou and
                  Xuxian Jiang and
                  Peng Ning},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Detecting repackaged smartphone applications in third-party android
                  marketplaces},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {317--326},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133640},
  doi          = {10.1145/2133601.2133640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YavuzNR12,
  author       = {Attila Altay Yavuz and
                  Peng Ning and
                  Michael K. Reiter},
  editor       = {Angelos D. Keromytis},
  title        = {Efficient, Compromise Resilient and Append-Only Cryptographic Schemes
                  for Secure Audit Logging},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {148--163},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_12},
  doi          = {10.1007/978-3-642-32946-3\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/YavuzNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuN12,
  author       = {Yao Liu and
                  Peng Ning},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {BitTrickle: Defending against broadband and high-power reactive jamming
                  attacks},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {909--917},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195840},
  doi          = {10.1109/INFCOM.2012.6195840},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/NatarajanNLJH12,
  author       = {Arun Natarajan and
                  Peng Ning and
                  Yao Liu and
                  Sushil Jajodia and
                  Steve E. Hutchinson},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {NSDMiner: Automated discovery of Network Service Dependencies},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2507--2515},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195642},
  doi          = {10.1109/INFCOM.2012.6195642},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/NatarajanNLJH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuN12a,
  author       = {Yao Liu and
                  Peng Ning},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Enhanced wireless channel authentication using time-synched link signature},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2636--2640},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195669},
  doi          = {10.1109/INFCOM.2012.6195669},
  timestamp    = {Sat, 24 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuN12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isie/ZengCN12,
  author       = {Wente Zeng and
                  Mo{-}Yuen Chow and
                  Peng Ning},
  title        = {Secure distributed control in unreliable {D-NCS}},
  booktitle    = {21st {IEEE} International Symposium on Industrial Electronics, {ISIE}
                  2012, Hangzhou, China, 28-31 May, 2012},
  pages        = {1858--1863},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIE.2012.6237375},
  doi          = {10.1109/ISIE.2012.6237375},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/isie/ZengCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HeDN12,
  author       = {Xiaofan He and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {A Byzantine attack defender: The Conditional Frequency Check},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {975--979},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6284709},
  doi          = {10.1109/ISIT.2012.6284709},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HeDN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/PeddycordNJ12,
  author       = {Barry W. Peddycord III and
                  Peng Ning and
                  Sushil Jajodia},
  editor       = {Carolyn Rowland},
  title        = {On the Accurate Identification of Network Service Dependencies in
                  Distributed Systems},
  booktitle    = {Strategies, Tools , and Techniques: Proceedings of the 26th Large
                  Installation System Administration Conference, {LISA} 2012, San Diego,
                  CA, USA, December 9-14, 2012},
  pages        = {181--194},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/lisa12/technical-sessions/presentation/peddycord},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/PeddycordNJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KimN11,
  author       = {Mihui Kim and
                  Peng Ning},
  title        = {SeCA: {A} framework for Secure Channel Assignment in wireless mesh
                  networks},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {4},
  pages        = {567--576},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.05.008},
  doi          = {10.1016/J.COMCOM.2010.05.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KimN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZhouCNC11,
  author       = {Tong Zhou and
                  Romit Roy Choudhury and
                  Peng Ning and
                  Krishnendu Chakrabarty},
  title        = {{P2DAP} - Sybil Attacks Detection in Vehicular Ad Hoc Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {29},
  number       = {3},
  pages        = {582--594},
  year         = {2011},
  url          = {https://doi.org/10.1109/JSAC.2011.110308},
  doi          = {10.1109/JSAC.2011.110308},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ZhouCNC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNR11,
  author       = {Yao Liu and
                  Peng Ning and
                  Michael K. Reiter},
  title        = {False data injection attacks against state estimation in electric
                  power grids},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {13:1--13:33},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952995},
  doi          = {10.1145/1952982.1952995},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/QiWTLPNA11,
  author       = {Hairong Qi and
                  Xiaorui Wang and
                  Leon M. Tolbert and
                  Fangxing Li and
                  Fang Zheng Peng and
                  Peng Ning and
                  Massoud Amin},
  title        = {A Resilient Real-Time System Design for a Secure and Reconfigurable
                  Power Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {2},
  number       = {4},
  pages        = {770--781},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSG.2011.2159819},
  doi          = {10.1109/TSG.2011.2159819},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/QiWTLPNA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AzabNZ11,
  author       = {Ahmed M. Azab and
                  Peng Ning and
                  Xiaolan Zhang},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {{SICE:} a hardware-level strongly isolated computing environment for
                  x86 multi-core platforms},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {375--388},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046752},
  doi          = {10.1145/2046707.2046752},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AzabNZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuN11,
  author       = {Yao Liu and
                  Peng Ning},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: mimicry attacks against wireless link signature},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {801--804},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093497},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XiaoDN11,
  author       = {Liang Xiao and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part
                  {II:} Multihop Networks},
  booktitle    = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011,
                  5-9 December 2011, Houston, Texas, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOM.2011.6133541},
  doi          = {10.1109/GLOCOM.2011.6133541},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/XiaoDN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XiaoDN11a,
  author       = {Liang Xiao and
                  Huaiyu Dai and
                  Peng Ning},
  title        = {Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part
                  {I:} Single-Hop Networks},
  booktitle    = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011,
                  5-9 December 2011, Houston, Texas, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOM.2011.6133542},
  doi          = {10.1109/GLOCOM.2011.6133542},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/XiaoDN11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/HyunNL11,
  author       = {Sangwon Hyun and
                  Peng Ning and
                  An Liu},
  title        = {Mitigating Wireless Jamming Attacks via Channel Migration},
  booktitle    = {31st {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2011 Workshops), 20-24 June 2011, Minneapolis,
                  Minnesota, {USA}},
  pages        = {313--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDCSW.2011.32},
  doi          = {10.1109/ICDCSW.2011.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/HyunNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/WangRN11,
  author       = {Qian Wang and
                  Kui Ren and
                  Peng Ning},
  title        = {Anti-jamming communication in cognitive radio networks with unknown
                  channel statistics},
  booktitle    = {Proceedings of the 19th annual {IEEE} International Conference on
                  Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20,
                  2011},
  pages        = {393--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNP.2011.6089079},
  doi          = {10.1109/ICNP.2011.6089079},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/WangRN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TranEBJFN11,
  author       = {Minh Tran and
                  Mark Etheridge and
                  Tyler K. Bletsch and
                  Xuxian Jiang and
                  Vincent W. Freeh and
                  Peng Ning},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {On the Expressiveness of Return-into-libc Attacks},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {121--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_7},
  doi          = {10.1007/978-3-642-23644-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TranEBJFN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/HyunN11,
  author       = {Sangwon Hyun and
                  Peng Ning},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Secure Code Dissemination in Wireless Sensor Networks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1099--1102},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_637},
  doi          = {10.1007/978-1-4419-5906-5\_637},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/HyunN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/SunN11,
  author       = {Kun Sun and
                  Peng Ning},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Secure Time Synchronization},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1139--1140},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_642},
  doi          = {10.1007/978-1-4419-5906-5\_642},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/SunN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuNDLW10,
  author       = {An Liu and
                  Peng Ning and
                  Huaiyu Dai and
                  Yao Liu and
                  Cliff Wang},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Defending DSSS-based broadcast communication against insider jammers
                  via delayed seed-disclosure},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {367--376},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920315},
  doi          = {10.1145/1920261.1920315},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuNDLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhouNZAWB10,
  author       = {Wu Zhou and
                  Peng Ning and
                  Xiaolan Zhang and
                  Glenn Ammons and
                  Ruowen Wang and
                  Vasanth Bala},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Always up-to-date: scalable offline patching of {VM} images in a compute
                  cloud},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {377--386},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920317},
  doi          = {10.1145/1920261.1920317},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhouNZAWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AzabNWJZS10,
  author       = {Ahmed M. Azab and
                  Peng Ning and
                  Zhi Wang and
                  Xuxian Jiang and
                  Xiaolan Zhang and
                  Nathan C. Skalsky},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {HyperSentry: enabling stealthy in-context measurement of hypervisor
                  integrity},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {38--49},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866313},
  doi          = {10.1145/1866307.1866313},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AzabNWJZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuNDL10,
  author       = {Yao Liu and
                  Peng Ning and
                  Huaiyu Dai and
                  An Liu},
  title        = {Randomized Differential {DSSS:} Jamming-Resistant Wireless Broadcast
                  Communication},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {695--703},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462156},
  doi          = {10.1109/INFCOM.2010.5462156},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuNDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/LiuNDL10,
  author       = {An Liu and
                  Peng Ning and
                  Huaiyu Dai and
                  Yao Liu},
  title        = {{USD-FH:} Jamming-resistant wireless communication using Frequency
                  Hopping with Uncoordinated Seed Disclosure},
  booktitle    = {{IEEE} 7th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2010, 8-12 November 2010, San Francisco, CA, {USA}},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MASS.2010.5663968},
  doi          = {10.1109/MASS.2010.5663968},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/LiuNDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuND10,
  author       = {Yao Liu and
                  Peng Ning and
                  Huaiyu Dai},
  title        = {Authenticating Primary Users' Signals in Cognitive Radio Networks
                  via Integrated Cryptographic and Wireless Link Signatures},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {286--301},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.24},
  doi          = {10.1109/SP.2010.24},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiuND10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10,
  author       = {Paul Barford and
                  Marc Dacier and
                  Thomas G. Dietterich and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Sushil Jajodia and
                  Somesh Jha and
                  Jason H. Li and
                  Peng Liu and
                  Peng Ning and
                  Xinming Ou and
                  Dawn Song and
                  Laura Strater and
                  Vipin Swarup and
                  George P. Tadda and
                  C. Wang and
                  John Yen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber {SA:} Situational Awareness for Cyber Defense},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_1},
  doi          = {10.1007/978-1-4419-0140-8\_1},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SezerKN10,
  author       = {Emre Can Sezer and
                  Chongkyung Kil and
                  Peng Ning},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Automated Software Vulnerability Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {201--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_10},
  doi          = {10.1007/978-1-4419-0140-8\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/SezerKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/WangDLN09,
  author       = {Ronghua Wang and
                  Wenliang Du and
                  Xiaogang Liu and
                  Peng Ning},
  title        = {ShortPK: {A} short-term public key scheme for broadcast authentication
                  in sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {6},
  number       = {1},
  pages        = {9:1--9:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653760.1653769},
  doi          = {10.1145/1653760.1653769},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/WangDLN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YavuzN09,
  author       = {Attila Altay Yavuz and
                  Peng Ning},
  title        = {{BAF:} An Efficient Publicly Verifiable Secure Audit Logging Scheme
                  for Distributed Systems},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {219--228},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.28},
  doi          = {10.1109/ACSAC.2009.28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YavuzN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AzabNSZ09,
  author       = {Ahmed M. Azab and
                  Peng Ning and
                  Emre Can Sezer and
                  Xiaolan Zhang},
  title        = {{HIMA:} {A} Hypervisor-Based Integrity Measurement Agent},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {461--470},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.50},
  doi          = {10.1109/ACSAC.2009.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AzabNSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuRN09,
  author       = {Yao Liu and
                  Michael K. Reiter and
                  Peng Ning},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {False data injection attacks against state estimation in electric
                  power grids},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653666},
  doi          = {10.1145/1653662.1653666},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuRN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeiZABN09,
  author       = {Jinpeng Wei and
                  Xiaolan Zhang and
                  Glenn Ammons and
                  Vasanth Bala and
                  Peng Ning},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Managing security of virtual machine images in a cloud environment},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655021},
  doi          = {10.1145/1655008.1655021},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WeiZABN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangJCN09,
  author       = {Zhi Wang and
                  Xuxian Jiang and
                  Weidong Cui and
                  Peng Ning},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Countering kernel rootkits with lightweight hook protection},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {545--554},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653728},
  doi          = {10.1145/1653662.1653728},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangJCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/KilSANZ09,
  author       = {Chongkyung Kil and
                  Emre Can Sezer and
                  Ahmed M. Azab and
                  Peng Ning and
                  Xiaolan Zhang},
  title        = {Remote attestation to dynamic system properties: Towards providing
                  complete system integrity evidence},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {115--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270348},
  doi          = {10.1109/DSN.2009.5270348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/KilSANZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuNW09,
  author       = {An Liu and
                  Peng Ning and
                  Chun Wang},
  title        = {Lightweight Remote Image Management for Secure Code Dissemination
                  in Wireless Sensor Networks},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {1242--1250},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062038},
  doi          = {10.1109/INFCOM.2009.5062038},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/YavuzN09,
  author       = {Attila Altay Yavuz and
                  Peng Ning},
  editor       = {Archan Misra and
                  Eyal de Lara},
  title        = {Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended
                  Wireless Sensor Networks},
  booktitle    = {6th Annual International Conference on Mobile and Ubiquitous Systems:
                  Computing, Networking and Services, {MOBIQUITOUS} 2009, Toronto, Canada,
                  July 13-16, 2009},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6824},
  doi          = {10.4108/ICST.MOBIQUITOUS2009.6824},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/YavuzN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SunLXNM09,
  author       = {Kun Sun and
                  An Liu and
                  Roger Xu and
                  Peng Ning and
                  W. Douglas Maughan},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Securing network access in wireless sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {261--268},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514310},
  doi          = {10.1145/1514274.1514310},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SunLXNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2009,
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1},
  doi          = {10.1007/978-3-642-04444-1},
  isbn         = {978-3-642-04443-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangYN08,
  author       = {Qing Zhang and
                  Ting Yu and
                  Peng Ning},
  title        = {A Framework for Identifying Compromised Nodes in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {12:1--12:37},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341733},
  doi          = {10.1145/1341731.1341733},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangYN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNLWD08,
  author       = {Donggang Liu and
                  Peng Ning and
                  An Liu and
                  Cliff Wang and
                  Wenliang Du},
  title        = {Attack-Resistant Location Estimation in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {22:1--22:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380570},
  doi          = {10.1145/1380564.1380570},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/NingLD08,
  author       = {Peng Ning and
                  An Liu and
                  Wenliang Du},
  title        = {Mitigating DoS attacks against broadcast authentication in wireless
                  sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {4},
  number       = {1},
  pages        = {1:1--1:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1325651.1325652},
  doi          = {10.1145/1325651.1325652},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/NingLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LiuND08,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  title        = {Group-based key predistribution for wireless sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {4},
  number       = {2},
  pages        = {11:1--11:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1340771.1340777},
  doi          = {10.1145/1340771.1340777},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LiuND08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/LiuN08,
  author       = {An Liu and
                  Peng Ning},
  title        = {TinyECC: {A} Configurable Library for Elliptic Curve Cryptography
                  in Wireless Sensor Networks},
  booktitle    = {Proceedings of the 7th International Conference on Information Processing
                  in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24,
                  2008},
  pages        = {245--256},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPSN.2008.47},
  doi          = {10.1109/IPSN.2008.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipsn/LiuN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/HyunNLD08,
  author       = {Sangwon Hyun and
                  Peng Ning and
                  An Liu and
                  Wenliang Du},
  title        = {Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor
                  Networks},
  booktitle    = {Proceedings of the 7th International Conference on Information Processing
                  in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24,
                  2008},
  pages        = {445--456},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPSN.2008.12},
  doi          = {10.1109/IPSN.2008.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipsn/HyunNLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/LiuON08,
  author       = {An Liu and
                  Young{-}Hyun Oh and
                  Peng Ning},
  title        = {Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
                  Using Seluge},
  booktitle    = {Proceedings of the 7th International Conference on Information Processing
                  in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24,
                  2008},
  pages        = {561--562},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPSN.2008.13},
  doi          = {10.1109/IPSN.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipsn/LiuON08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongLN08,
  author       = {Qi Dong and
                  Donggang Liu and
                  Peng Ning},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Pre-authentication filters: providing dos resistance for signature-based
                  broadcast authentication in sensor networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {2--12},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352536},
  doi          = {10.1145/1352533.1352536},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DongLN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-59593-810-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LiuN07,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Security for Wireless Sensor Networks},
  series       = {Advances in Information Security},
  volume       = {28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46781-8},
  doi          = {10.1007/978-0-387-46781-8},
  isbn         = {978-0-387-32723-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LiuN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuSJN07,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Peng Ning},
  title        = {Interleaved hop-by-hop authentication against false data injection
                  attacks in sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {3},
  number       = {3},
  pages        = {14},
  year         = {2007},
  url          = {https://doi.org/10.1145/1267060.1267062},
  doi          = {10.1145/1267060.1267062},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuSJN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KilSNZ07,
  author       = {Chongkyung Kil and
                  Emre Can Sezer and
                  Peng Ning and
                  Xiaolan Zhang},
  title        = {Automated Security Debugging Using Program Structural Constraints},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {453--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.19},
  doi          = {10.1109/ACSAC.2007.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KilSNZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangRNI07,
  author       = {Qinghua Zhang and
                  Douglas S. Reeves and
                  Peng Ning and
                  S. Purushothaman Iyer},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Analyzing network traffic to detect self-decrypting exploit code},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {4--12},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229291},
  doi          = {10.1145/1229285.1229291},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangRNI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangNR07,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {A \emph{k}-anonymous communication protocol for overlay networks},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229296},
  doi          = {10.1145/1229285.1229296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangNR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SezerNKX07,
  author       = {Emre Can Sezer and
                  Peng Ning and
                  Chongkyung Kil and
                  Jun Xu},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Memsherlock: an automated debugger for unknown memory corruption vulnerabilities},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {562--572},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315314},
  doi          = {10.1145/1315245.1315314},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SezerNKX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PyunPWRN07,
  author       = {Young June Pyun and
                  Young Hee Park and
                  Xinyuan Wang and
                  Douglas S. Reeves and
                  Peng Ning},
  title        = {Tracing Traffic through Intermediate Hosts that Repacketize Flows},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {634--642},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.80},
  doi          = {10.1109/INFCOM.2007.80},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PyunPWRN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/WangDN07,
  author       = {Ronghua Wang and
                  Wenliang Du and
                  Peng Ning},
  editor       = {Evangelos Kranakis and
                  Elizabeth M. Belding and
                  Eytan H. Modiano},
  title        = {Containing denial-of-service attacks in broadcast authentication in
                  sensor networks},
  booktitle    = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada,
                  September 9-14, 2007},
  pages        = {71--79},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288107.1288118},
  doi          = {10.1145/1288107.1288118},
  timestamp    = {Mon, 22 Feb 2021 15:13:40 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/WangDN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZhouCNC07,
  author       = {Tong Zhou and
                  Romit Roy Choudhury and
                  Peng Ning and
                  Krishnendu Chakrabarty},
  title        = {Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc
                  Networks},
  booktitle    = {4th Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MOBIQ.2007.4451013},
  doi          = {10.1109/MOBIQ.2007.4451013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/ZhouCNC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FangDN07,
  author       = {Lei Fang and
                  Wenliang Du and
                  Peng Ning},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {33--55},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_2},
  doi          = {10.1007/978-0-387-46276-9\_2},
  timestamp    = {Mon, 15 Jun 2020 07:44:16 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FangDN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/NingLD07,
  author       = {Peng Ning and
                  Donggang Liu and
                  Wenliang Du},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure and Resilient Localization in Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {161--184},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_7},
  doi          = {10.1007/978-0-387-46276-9\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/NingLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SunNW07,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure and Resilient Time Synchronization in Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {347--367},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_15},
  doi          = {10.1007/978-0-387-46276-9\_15},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SunNW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007,
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-703-2},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007csaw,
  editor       = {Peng Ning and
                  Vijay Atluri},
  title        = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture,
                  {CSAW} 2007, Fairfax, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-890-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007csaw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007fmse,
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-887-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007stc,
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-888-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007stc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2007,
  editor       = {Peng Ning and
                  Ernesto Damiani and
                  Seth Proctor},
  title        = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
                  2007, Fairfax, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-892-3},
  timestamp    = {Tue, 22 Apr 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sws/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2007,
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-883-1},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/DuFP06,
  author       = {Wenliang Du and
                  Lei Fang and
                  Peng Ning},
  title        = {{LAD:} Localization anomaly detection for wireless sensor networks},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {66},
  number       = {7},
  pages        = {874--886},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jpdc.2005.12.011},
  doi          = {10.1016/J.JPDC.2005.12.011},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/DuFP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SunNW06,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  title        = {Secure and resilient clock synchronization in wireless sensor networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {2},
  pages        = {395--408},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2005.861396},
  doi          = {10.1109/JSAC.2005.861396},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/SunNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SunPNW06,
  author       = {Kun Sun and
                  Pai Peng and
                  Peng Ning and
                  Cliff Wang},
  title        = {Secure Distributed Cluster Formation in Wireless Sensor Networks},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.46},
  doi          = {10.1109/ACSAC.2006.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SunPNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KilJBXN06,
  author       = {Chongkyung Kil and
                  Jinsuk Jun and
                  Christopher Bookholt and
                  Jun Xu and
                  Peng Ning},
  title        = {Address Space Layout Permutation {(ASLP):} Towards Fine-Grained Randomization
                  of Commodity Software},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {339--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.9},
  doi          = {10.1109/ACSAC.2006.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KilJBXN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunNW06,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {TinySeRSync: secure and resilient time synchronization in wireless
                  sensor networks},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {264--277},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180439},
  doi          = {10.1145/1180405.1180439},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunNW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhaiNX06,
  author       = {Yan Zhai and
                  Peng Ning and
                  Jun Xu},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {Integrating {IDS} Alert Correlation and OS-Level Dependency Tracking},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {272--284},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_24},
  doi          = {10.1007/11760146\_24},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhaiNX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XuN06,
  author       = {Dingbang Xu and
                  Peng Ning},
  title        = {A Flexible Approach to Intrusion Alert Anonymization and Correlation},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359544},
  doi          = {10.1109/SECCOMW.2006.359544},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XuN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangYN06,
  author       = {Qing Zhang and
                  Ting Yu and
                  Peng Ning},
  title        = {A Framework for Identifying Compromised Nodes in Sensor Networks},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359546},
  doi          = {10.1109/SECCOMW.2006.359546},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangYN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PengNR06,
  author       = {Pai Peng and
                  Peng Ning and
                  Douglas S. Reeves},
  title        = {On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {334--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.28},
  doi          = {10.1109/SP.2006.28},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PengNR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2006,
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308},
  doi          = {10.1007/11935308},
  isbn         = {3-540-49496-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/NingS05,
  author       = {Peng Ning and
                  Kun Sun},
  title        = {How to misuse {AODV:} a case study of insider attacks against mobile
                  ad-hoc routing protocols},
  journal      = {Ad Hoc Networks},
  volume       = {3},
  number       = {6},
  pages        = {795--819},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.adhoc.2004.04.001},
  doi          = {10.1016/J.ADHOC.2004.04.001},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/NingS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SunNW05,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  title        = {Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor
                  Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {3},
  pages        = {177--189},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.36},
  doi          = {10.1109/TDSC.2005.36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SunNW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNL05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Rongfang Li},
  title        = {Establishing pairwise keys in distributed sensor networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {41--77},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053287},
  doi          = {10.1145/1053283.1053287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/LiuN05,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Improving key predistribution with deployment knowledge in static
                  sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {1},
  number       = {2},
  pages        = {204--239},
  year         = {2005},
  url          = {https://doi.org/10.1145/1105688.1105691},
  doi          = {10.1145/1105688.1105691},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/LiuN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuN05,
  author       = {Dingbang Xu and
                  Peng Ning},
  title        = {Privacy-Preserving Alert Correlation: {A} Concept Hierarchy Based
                  Approach},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {537--546},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.45},
  doi          = {10.1109/CSAC.2005.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuNKZB05,
  author       = {Jun Xu and
                  Peng Ning and
                  Chongkyung Kil and
                  Yan Zhai and
                  Christopher Bookholt},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Automatic diagnosis and response to memory corruption vulnerabilities},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {223--234},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102151},
  doi          = {10.1145/1102120.1102151},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuNKZB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiuND05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  title        = {Detecting Malicious Beacon Nodes for Secure Location Discovery in
                  Wireless Sensor Networks},
  booktitle    = {25th International Conference on Distributed Computing Systems {(ICDCS}
                  2005), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {609--619},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCS.2005.21},
  doi          = {10.1109/ICDCS.2005.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiuND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/PengNRW05,
  author       = {Pai Peng and
                  Peng Ning and
                  Douglas S. Reeves and
                  Xinyuan Wang},
  title        = {Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff
                  Packets},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {107--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.30},
  doi          = {10.1109/ICDCSW.2005.30},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcsw/PengNRW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhangWRN05,
  author       = {Qinghua Zhang and
                  Pan Wang and
                  Douglas S. Reeves and
                  Peng Ning},
  title        = {Defending against Sybil Attacks in Sensor Networks},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {185--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.57},
  doi          = {10.1109/ICDCSW.2005.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhangWRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangNR05,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Network Access Control for Mobile Ad-Hoc Networks},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {350--362},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_30},
  doi          = {10.1007/11602897\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangNR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FangDN05,
  author       = {Lei Fang and
                  Wenliang Du and
                  Peng Ning},
  title        = {A beacon-less location discovery scheme for wireless sensor networks},
  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer
                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},
  pages        = {161--171},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INFCOM.2005.1497888},
  doi          = {10.1109/INFCOM.2005.1497888},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/FangDN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/DuFN05,
  author       = {Wenliang Du and
                  Lei Fang and
                  Peng Ning},
  title        = {{LAD:} Localization Anomaly Detection forWireless Sensor Networks},
  booktitle    = {19th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IPDPS.2005.267},
  doi          = {10.1109/IPDPS.2005.267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/DuFN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/LiuND05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  title        = {Attack-resistant location estimation in sensor networks},
  booktitle    = {Proceedings of the Fourth International Symposium on Information Processing
                  in Sensor Networks, {IPSN} 2005, April 25-27, 2005, UCLA, Los Angeles,
                  California, {USA}},
  pages        = {99--106},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/IPSN.2005.1440904},
  doi          = {10.1109/IPSN.2005.1440904},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ipsn/LiuND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/DuWN05,
  author       = {Wenliang Du and
                  Ronghua Wang and
                  Peng Ning},
  editor       = {P. R. Kumar and
                  Andrew T. Campbell and
                  Roger Wattenhofer},
  title        = {An efficient scheme for authenticating public keys in sensor networks},
  booktitle    = {Proceedings of the 6th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA,
                  May 25-27, 2005},
  pages        = {58--67},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1062689.1062698},
  doi          = {10.1145/1062689.1062698},
  timestamp    = {Thu, 08 Apr 2021 08:40:43 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/DuWN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Practical Broadcast Authentication in Sensor Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {118--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.49},
  doi          = {10.1109/MOBIQUITOUS.2005.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/WangRN05,
  author       = {Pan Wang and
                  Douglas S. Reeves and
                  Peng Ning},
  title        = {Secure Address Auto-con.guration for Mobile Ad Hoc Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {519--522},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.52},
  doi          = {10.1109/MOBIQUITOUS.2005.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/WangRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/LiuND05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Wenliang Du},
  editor       = {Markus Jakobsson and
                  Radha Poovendran},
  title        = {Group-based key pre-distribution in wireless sensor networks},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne,
                  Germany, September 2, 2005},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1080793.1080798},
  doi          = {10.1145/1080793.1080798},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/LiuND05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/wi/05/NingL05,
  author       = {Peng Ning and
                  Donggang Liu},
  editor       = {Ivan Stojmenovic},
  title        = {Broadcast Authentication and Key Management for Secure Sensor Networks},
  booktitle    = {Handbook of Sensor Networks: Algorithms and Architectures},
  series       = {Wiley series on parallel and distributed computing},
  pages        = {141--172},
  publisher    = {Wiley},
  year         = {2005},
  url          = {https://doi.org/10.1002/047174414x.ch5},
  doi          = {10.1002/047174414X.CH5},
  timestamp    = {Tue, 16 Jul 2019 13:42:29 +0200},
  biburl       = {https://dblp.org/rec/books/wi/05/NingL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sasn/2005,
  editor       = {Vijay Atluri and
                  Peng Ning and
                  Wenliang Du},
  title        = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-227-5},
  timestamp    = {Fri, 13 Jan 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/LiuN04,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Multilevel {\(\mathrm{\mu}\)}TESLA: Broadcast authentication for distributed
                  sensor networks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {800--836},
  year         = {2004},
  url          = {https://doi.org/10.1145/1027794.1027800},
  doi          = {10.1145/1027794.1027800},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/LiuN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingCRX04,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves and
                  Dingbang Xu},
  title        = {Techniques and tools for analyzing intrusion alerts},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {274--318},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996947},
  doi          = {10.1145/996943.996947},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingCRX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingX04,
  author       = {Peng Ning and
                  Dingbang Xu},
  title        = {Hypothesizing and reasoning about attacks missed by intrusion detection
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {591--627},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042036},
  doi          = {10.1145/1042031.1042036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaiNIR04,
  author       = {Yan Zhai and
                  Peng Ning and
                  Purush Iyer and
                  Douglas S. Reeves},
  title        = {Reasoning About Complementary Intrusion Evidence},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {39--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.29},
  doi          = {10.1109/CSAC.2004.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhaiNIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XuN04,
  author       = {Dingbang Xu and
                  Peng Ning},
  title        = {Alert Correlation through Triggering Events and Common Resources},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {360--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.5},
  doi          = {10.1109/CSAC.2004.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XuN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JiangRN04,
  author       = {Qinglin Jiang and
                  Douglas S. Reeves and
                  Peng Ning},
  editor       = {Tatsuaki Okamoto},
  title        = {Improving Robustness of {PGP} Keyrings by Conflict Detection},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_16},
  doi          = {10.1007/978-3-540-24660-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JiangRN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangNR04,
  author       = {Pan Wang and
                  Peng Ning and
                  Douglas S. Reeves},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Storage-Efficient Stateless Group Key Revocation},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {25--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_3},
  doi          = {10.1007/978-3-540-30144-8\_3},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WangNR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/JiangRN04,
  author       = {Qinglin Jiang and
                  Douglas S. Reeves and
                  Peng Ning},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Certificate Recommendations to Improve the Robustness of Web of Trust},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {292--303},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_25},
  doi          = {10.1007/978-3-540-30144-8\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/JiangRN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NingXHA04,
  author       = {Peng Ning and
                  Dingbang Xu and
                  Christopher G. Healey and
                  Robert St. Amant},
  title        = {Building Attack Scenarios through Integration of Complementary Alert
                  Correlation Method},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/building-attack-scenarios-through-integration-complementary-alert-correlation-method/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NingXHA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhuSJN04,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Peng Ning},
  title        = {An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected
                  False Data in Sensor Networks},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {259--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301328},
  doi          = {10.1109/SECPRI.2004.1301328},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhuSJN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/NingJW03,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Intrusion Detection in Distributed Systems - An Abstraction-Based
                  Approach},
  series       = {Advances in Information Security},
  volume       = {9},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0467-2},
  doi          = {10.1007/978-1-4615-0467-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/NingJW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/LiNWJ03,
  author       = {Yingjiu Li and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Discovering calendar-based temporal association rules},
  journal      = {Data Knowl. Eng.},
  volume       = {44},
  number       = {2},
  pages        = {193--218},
  year         = {2003},
  timestamp    = {Thu, 27 Nov 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/LiNWJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuN03,
  author       = {Donggang Liu and
                  Peng Ning},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Establishing pairwise keys in distributed sensor networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {52--61},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948119},
  doi          = {10.1145/948109.948119},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingX03,
  author       = {Peng Ning and
                  Dingbang Xu},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Learning attack strategies from intrusion alerts},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {200--209},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948137},
  doi          = {10.1145/948109.948137},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NingX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuNS03,
  author       = {Donggang Liu and
                  Peng Ning and
                  Kun Sun},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Efficient self-healing group key distribution with revocation capability},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948141},
  doi          = {10.1145/948109.948141},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuNS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NingX03,
  author       = {Peng Ning and
                  Dingbang Xu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {Adapting Query Optimization Techniques for Efficient Alert Correlation},
  booktitle    = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  pages        = {75--88},
  publisher    = {Kluwer/Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-8070-0\_6},
  doi          = {10.1007/1-4020-8070-0\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/NingX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/NingS03,
  author       = {Peng Ning and
                  Kun Sun},
  title        = {How to Misuse {AODV:} {A} Case Study of Insiider Attacks against Mobile
                  Ad-hoc Routing Protocols},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {60--67},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/NingS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuN03,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Efficient Distribution of Key Chain Commitments for Broadcast Authentication
                  in Distributed Sensor Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/efficient-distribution-key-chain-commitments-broadcast-authentication-distributed-sensor/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/LiuN03,
  author       = {Donggang Liu and
                  Peng Ning},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Location-based pairwise key establishments for static sensor networks},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003},
  pages        = {72--82},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986858.986869},
  doi          = {10.1145/986858.986869},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/LiuN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/NingWJ02,
  author       = {Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {An Algebraic Representation of Calendars},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {36},
  number       = {1-2},
  pages        = {5--38},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1015835418881},
  doi          = {10.1023/A:1015835418881},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/NingWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NingJW02,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Design and implementation of a decentralized prototype system for
                  detecting distributed attacks},
  journal      = {Comput. Commun.},
  volume       = {25},
  number       = {15},
  pages        = {1374--1391},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0140-3664(02)00039-7},
  doi          = {10.1016/S0140-3664(02)00039-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NingJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingCR02,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves},
  editor       = {Vijayalakshmi Atluri},
  title        = {Constructing attack scenarios through correlation of intrusion alerts},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586144},
  doi          = {10.1145/586110.586144},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NingCR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NingCR02,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Analyzing Intensive Intrusion Alerts via Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {74--94},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_5},
  doi          = {10.1007/3-540-36084-0\_5},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NingCR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LiuNJ01,
  author       = {Peng Liu and
                  Peng Ning and
                  Sushil Jajodia},
  title        = {Avoiding loss of fairness owing to failures in fair data exchange
                  systems},
  journal      = {Decis. Support Syst.},
  volume       = {31},
  number       = {3},
  pages        = {337--350},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-9236(00)00141-X},
  doi          = {10.1016/S0167-9236(00)00141-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LiuNJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingJW01,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Abstraction-based intrusion detection in distributed environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {407--452},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503342},
  doi          = {10.1145/503339.503342},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingJW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NingY01,
  author       = {Peng Ning and
                  Yiqun Lisa Yin},
  editor       = {Sihan Qing and
                  Tatsuaki Okamoto and
                  Jianying Zhou},
  title        = {Efficient Software Implementation for Finite Field Multiplication
                  in Normal Basis},
  booktitle    = {Information and Communications Security, Third International Conference,
                  {ICICS} 2001, Xian, China, November 13-16, 2001},
  series       = {Lecture Notes in Computer Science},
  volume       = {2229},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45600-7\_21},
  doi          = {10.1007/3-540-45600-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NingY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/LiNWJ01,
  author       = {Yingjiu Li and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Discovering Calendar-based Temporal Association Rules},
  booktitle    = {Eigth International Symposium on Temporal Representation and Reasoning,
                  TIME-01, Civdale del Friuli, Italy, June 14-16, 2001},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/TIME.2001.930706},
  doi          = {10.1109/TIME.2001.930706},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/LiNWJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NingWJ00,
  author       = {Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Modeling requests among cooperating intrusion detection systems},
  journal      = {Comput. Commun.},
  volume       = {23},
  number       = {17},
  pages        = {1702--1715},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0140-3664(00)00256-5},
  doi          = {10.1016/S0140-3664(00)00256-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NingWJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuNJ00,
  author       = {Peng Liu and
                  Peng Ning and
                  Sushil Jajodia},
  title        = {Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange
                  Protocols},
  booktitle    = {2000 International Conference on Dependable Systems and Networks {(DSN}
                  2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York,
                  NY, {USA}},
  pages        = {631--640},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICDSN.2000.857600},
  doi          = {10.1109/ICDSN.2000.857600},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuNJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YangNWJ00,
  author       = {Jiahai Yang and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {{CARDS:} {A} Distributed System for Detecting Coordinated Attacks},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {171--180},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/YangNWJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics