Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Peng Ning
@article{DBLP:journals/access/YangZN23, author = {Jie Yang and Hongchang Zhang and Peng Ning}, title = {Path Planning and Trajectory Optimization Based on Improved {APF} and Multi-Target}, journal = {{IEEE} Access}, volume = {11}, pages = {139121--139132}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3338683}, doi = {10.1109/ACCESS.2023.3338683}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YangZN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhouZSLJAWNR23, author = {Jinmeng Zhou and Tong Zhang and Wenbo Shen and Dongyoon Lee and Changhee Jung and Ahmed M. Azab and Ruowen Wang and Peng Ning and Kui Ren}, title = {Automatic Permission Check Analysis for Linux Kernel}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {1849--1866}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3165368}, doi = {10.1109/TDSC.2022.3165368}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhouZSLJAWNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/QiaoNXYLC22, author = {Guangda Qiao and Peng Ning and Xiao Xia and Yang Yu and Xiaohui Lu and Tinghai Cheng}, title = {Achieving Smooth Motion for Piezoelectric Stick-Slip Actuator With the Inertial Block Structure}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {69}, number = {4}, pages = {3948--3958}, year = {2022}, url = {https://doi.org/10.1109/TIE.2021.3073314}, doi = {10.1109/TIE.2021.3073314}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tie/QiaoNXYLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/FengZZMWYJWAN19, author = {Qian Feng and Rundong Zhou and Yanhui Zhao and Jia Ma and Yifei Wang and Na Yu and Xudong Jin and Jian Wang and Ahmed M. Azab and Peng Ning}, title = {Learning Binary Representation for Automatic Patch Detection}, booktitle = {16th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2019, Las Vegas, NV, USA, January 11-14, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCNC.2019.8651721}, doi = {10.1109/CCNC.2019.8651721}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/FengZZMWYJWAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HyunSN17, author = {Sangwon Hyun and Kun Sun and Peng Ning}, title = {FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes}, journal = {Comput. Commun.}, volume = {104}, pages = {191--203}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.01.005}, doi = {10.1016/J.COMCOM.2017.01.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HyunSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HeDND17, author = {Xiaofan He and Huaiyu Dai and Peng Ning and Rudra Dutta}, title = {A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {35}, number = {3}, pages = {615--627}, year = {2017}, url = {https://doi.org/10.1109/JSAC.2017.2659581}, doi = {10.1109/JSAC.2017.2659581}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/HeDND17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenAGN17, author = {Quan Chen and Ahmed M. Azab and Guruprasad Ganesh and Peng Ning}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {167--178}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053029}, doi = {10.1145/3052973.3053029}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenAGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangAELNCSC17, author = {Ruowen Wang and Ahmed M. Azab and William Enck and Ninghui Li and Peng Ning and Xun Chen and Wenbo Shen and Yueqiang Cheng}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {{SPOKE:} Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {612--624}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052991}, doi = {10.1145/3052973.3052991}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangAELNCSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/JinHDDN17, author = {Richeng Jin and Xiaofan He and Huaiyu Dai and Rudra Dutta and Peng Ning}, title = {Towards Privacy-Aware Collaborative Security: {A} Game-Theoretic Approach}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {72--83}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.32}, doi = {10.1109/PAC.2017.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/JinHDDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17, author = {Massimiliano Albanese and Nancy J. Cooke and Gonz{\'{a}}lez Coty and David Hall and Christopher G. Healey and Sushil Jajodia and Peng Liu and Michael D. McNeese and Peng Ning and Douglas S. Reeves and V. S. Subrahmanian and Cliff Wang and John Yen}, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {Computer-Aided Human Centric Cyber Situation Awareness}, booktitle = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, pages = {3--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5\_1}, doi = {10.1007/978-3-319-61152-5\_1}, timestamp = {Mon, 03 Jan 2022 21:52:37 +0100}, biburl = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/HeDND16, author = {Xiaofan He and Huaiyu Dai and Peng Ning and Rudra Dutta}, title = {Zero-determinant Strategies for Multi-player Multi-action Iterated Games}, journal = {{IEEE} Signal Process. Lett.}, volume = {23}, number = {3}, pages = {311--315}, year = {2016}, url = {https://doi.org/10.1109/LSP.2016.2517640}, doi = {10.1109/LSP.2016.2517640}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/HeDND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FangLN16, author = {Song Fang and Yao Liu and Peng Ning}, title = {Wireless Communications under Broadband Reactive Jamming Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {394--408}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2399304}, doi = {10.1109/TDSC.2015.2399304}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FangLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangLN16, author = {Song Fang and Yao Liu and Peng Ning}, title = {Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {7}, pages = {1515--1527}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2541307}, doi = {10.1109/TIFS.2016.2541307}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FangLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/HeDN16, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry}, journal = {{IEEE} Trans. Signal Process.}, volume = {64}, number = {13}, pages = {3429--3443}, year = {2016}, url = {https://doi.org/10.1109/TSP.2016.2548987}, doi = {10.1109/TSP.2016.2548987}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/HeDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangRNH16, author = {Qian Wang and Kui Ren and Peng Ning and Shengshan Hu}, title = {Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {65}, number = {10}, pages = {8331--8344}, year = {2016}, url = {https://doi.org/10.1109/TVT.2015.2511071}, doi = {10.1109/TVT.2015.2511071}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WangRNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeDSND16, author = {Xiaofan He and Huaiyu Dai and Wenbo Shen and Peng Ning and Rudra Dutta}, title = {Toward Proper Guard Zones for Link Signature}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {15}, number = {3}, pages = {2104--2117}, year = {2016}, url = {https://doi.org/10.1109/TWC.2015.2498621}, doi = {10.1109/TWC.2015.2498621}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/HeDSND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeDND16, author = {Xiaofan He and Huaiyu Dai and Peng Ning and Rudra Dutta}, title = {A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524350}, doi = {10.1109/INFOCOM.2016.7524350}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HeDND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AzabSBMSWN16, author = {Ahmed M. Azab and Kirk Swidowski and Rohan Bhutkar and Jia Ma and Wenbo Shen and Ruowen Wang and Peng Ning}, title = {{SKEE:} {A} lightweight Secure Kernel-level Execution Environment for {ARM}}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/skee-lightweight-secure-kernel-level-execution-environment-for-arm.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AzabSBMSWN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GiontaEN15, author = {Jason Gionta and William Enck and Peng Ning}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {325--336}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699107}, doi = {10.1145/2699026.2699107}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GiontaEN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HeDND15, author = {Xiaofan He and Huaiyu Dai and Peng Ning and Rudra Dutta}, title = {Dynamic {IDS} Configuration in the Presence of Intruder Type Uncertainty}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417158}, doi = {10.1109/GLOCOM.2014.7417158}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HeDND15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HeDND15, author = {Xiaofan He and Huaiyu Dai and Peng Ning and Rudra Dutta}, title = {A stochastic multi-channel spectrum access game with incomplete information}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {4799--4804}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249082}, doi = {10.1109/ICC.2015.7249082}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/HeDND15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeDN15, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {Improving learning and adaptation in security games by exploiting information asymmetry}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {1787--1795}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218560}, doi = {10.1109/INFOCOM.2015.7218560}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HeDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ShenLHDN15, author = {Wenbo Shen and Yao Liu and Xiaofan He and Huaiyu Dai and Peng Ning}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {No time to demodulate - fast physical layer verification of friendly jamming}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {653--658}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357518}, doi = {10.1109/MILCOM.2015.7357518}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/ShenLHDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/XiongN15, author = {Kaiqi Xiong and Peng Ning}, editor = {Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong}, title = {Cost-efficient and attack-resilient approaches for state estimation in power grids}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015}, pages = {2192--2197}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2695664.2695937}, doi = {10.1145/2695664.2695937}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/XiongN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangERZNXZA15, author = {Ruowen Wang and William Enck and Douglas S. Reeves and Xinwen Zhang and Peng Ning and Dingbang Xu and Wu Zhou and Ahmed M. Azab}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {351--366}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangERZNXZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RenSGNL14, author = {Kui Ren and Pierangela Samarati and Marco Gruteser and Peng Ning and Yunhao Liu}, title = {Guest Editorial Special Issue on Security for IoT: The State of the Art}, journal = {{IEEE} Internet Things J.}, volume = {1}, number = {5}, pages = {369--371}, year = {2014}, url = {https://doi.org/10.1109/JIOT.2014.2361608}, doi = {10.1109/JIOT.2014.2361608}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/RenSGNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYYGNZ14, author = {Yuan Zhang and Min Yang and Zhemin Yang and Guofei Gu and Peng Ning and Binyu Zang}, title = {Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {11}, pages = {1828--1842}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2347206}, doi = {10.1109/TIFS.2014.2347206}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYYGNZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeDN14, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {Dynamic Adaptive Anti-Jamming via Controlled Mobility}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {13}, number = {8}, pages = {4374--4388}, year = {2014}, url = {https://doi.org/10.1109/TWC.2014.2320973}, doi = {10.1109/TWC.2014.2320973}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GiontaAENZ14, author = {Jason Gionta and Ahmed M. Azab and William Enck and Peng Ning and Xiaolan Zhang}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{SEER:} practical memory virus scanning as a service}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {186--195}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664271}, doi = {10.1145/2664243.2664271}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GiontaAENZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ning14, author = {Peng Ning}, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Samsung {KNOX} and Enterprise Mobile Security}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666620.2666632}, doi = {10.1145/2666620.2666632}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ning14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AzabNSCBGMS14, author = {Ahmed M. Azab and Peng Ning and Jitesh Shah and Quan Chen and Rohan Bhutkar and Guruprasad Ganesh and Jia Ma and Wenbo Shen}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Hypervision Across Worlds: Real-time Kernel Protection from the {ARM} TrustZone Secure World}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {90--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660350}, doi = {10.1145/2660267.2660350}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AzabNSCBGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeDHWSN14, author = {Xiaofan He and Huaiyu Dai and Yufan Huang and Dong Wang and Wenbo Shen and Peng Ning}, title = {The security of link signature: {A} view from channel models}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {103--108}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997473}, doi = {10.1109/CNS.2014.6997473}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeDHWSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ShenNHDL14, author = {Wenbo Shen and Peng Ning and Xiaofan He and Huaiyu Dai and Yao Liu}, title = {{MCR} Decoding: {A} {MIMO} approach for defending against wireless jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {133--138}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997478}, doi = {10.1109/CNS.2014.6997478}, timestamp = {Sat, 24 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ShenNHDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HeDSN14, author = {Xiaofan He and Huaiyu Dai and Wenbo Shen and Peng Ning}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Channel correlation modeling for link signature security assessment}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600201}, doi = {10.1145/2600176.2600201}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/HeDSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/YuNV14, author = {Xianqing Yu and Peng Ning and Mladen A. Vouk}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Securing Hadoop in cloud}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {26}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600202}, doi = {10.1145/2600176.2600202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/YuNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GiontaAENZ14, author = {Jason Gionta and Ahmed M. Azab and William Enck and Peng Ning and Xiaolan Zhang}, editor = {Chris Kanich and Patrick Lardieri}, title = {{DACSA:} {A} Decoupled Architecture for Cloud Security Analysis}, booktitle = {7th Workshop on Cyber Security Experimentation and Test, {CSET} '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/cset14/workshop-program/gionta}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/GiontaAENZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HeDN13, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {11}, pages = {2196--2208}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.131119}, doi = {10.1109/JSAC.2013.131119}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HeDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/DongLN13, author = {Qi Dong and Donggang Liu and Peng Ning}, title = {Providing DoS resistance for signature-based broadcast authentication in sensor networks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {12}, number = {3}, pages = {73:1--73:26}, year = {2013}, url = {https://doi.org/10.1145/2442116.2442123}, doi = {10.1145/2442116.2442123}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/DongLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeDN13, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {12}, number = {5}, pages = {2512--2523}, year = {2013}, url = {https://doi.org/10.1109/TWC.2013.031313.121551}, doi = {10.1109/TWC.2013.031313.121551}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYXYGNWZ13, author = {Yuan Zhang and Min Yang and Bingquan Xu and Zhemin Yang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang and Binyu Zang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Vetting undesirable behaviors in android apps with permission use analysis}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {611--622}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516689}, doi = {10.1145/2508859.2516689}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYXYGNWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYZGNW13, author = {Zhemin Yang and Min Yang and Yuan Zhang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {AppIntent: analyzing sensitive data transmission in android for privacy leakage detection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1043--1054}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516676}, doi = {10.1145/2508859.2516676}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangYZGNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HeDN13, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {Dynamic adaptive anti-jamming via controlled mobility}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682686}, doi = {10.1109/CNS.2013.6682686}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/HeDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeDSN13, author = {Xiaofan He and Huaiyu Dai and Wenbo Shen and Peng Ning}, title = {Is link signature dependable for wireless security?}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {200--204}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566763}, doi = {10.1109/INFCOM.2013.6566763}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HeDSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Ning13, author = {Peng Ning}, title = {Program Chair's Message}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/ndss-2013-program-chairs-message}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Ning13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShenNHD13, author = {Wenbo Shen and Peng Ning and Xiaofan He and Huaiyu Dai}, title = {Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {174--188}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.22}, doi = {10.1109/SP.2013.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ShenNHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangNXC13, author = {Ruowen Wang and Peng Ning and Tao Xie and Quan Chen}, editor = {Samuel T. King}, title = {MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {65--80}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/papers/wang}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangNXC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/KimIN12, author = {Mihui Kim and Varagur Karthik Sriram Iyer and Peng Ning}, title = {MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks}, journal = {Ad Hoc Networks}, volume = {10}, number = {3}, pages = {299--316}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2011.07.001}, doi = {10.1016/J.ADHOC.2011.07.001}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/KimIN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/YavuzN12, author = {Attila Altay Yavuz and Peng Ning}, title = {Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks}, journal = {Ad Hoc Networks}, volume = {10}, number = {7}, pages = {1204--1220}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2012.03.006}, doi = {10.1016/J.ADHOC.2012.03.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/YavuzN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PyunPRWN12, author = {Young June Pyun and Young Hee Park and Douglas S. Reeves and Xinyuan Wang and Peng Ning}, title = {Interval-based flow watermarking for tracing interactive traffic}, journal = {Comput. Networks}, volume = {56}, number = {5}, pages = {1646--1665}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.01.017}, doi = {10.1016/J.COMNET.2012.01.017}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PyunPRWN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaoDN12, author = {Liang Xiao and Huaiyu Dai and Peng Ning}, title = {Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {1}, pages = {297--309}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2165948}, doi = {10.1109/TIFS.2011.2165948}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaoDN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YavuzNR12, author = {Attila Altay Yavuz and Peng Ning and Michael K. Reiter}, title = {{BAF} and {FI-BAF:} Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {9:1--9:28}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240280}, doi = {10.1145/2240276.2240280}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YavuzNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/XiongWDN12, author = {Kaiqi Xiong and Ronghua Wang and Wenliang Du and Peng Ning}, title = {Containing bogus packet insertion attacks for broadcast authentication in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {8}, number = {3}, pages = {20:1--20:30}, year = {2012}, url = {https://doi.org/10.1145/2240092.2240094}, doi = {10.1145/2240092.2240094}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/XiongWDN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/LiDXN12, author = {Chengzhi Li and Huaiyu Dai and Liang Xiao and Peng Ning}, title = {Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks}, journal = {{IEEE} Trans. Signal Process.}, volume = {60}, number = {10}, pages = {5281--5292}, year = {2012}, url = {https://doi.org/10.1109/TSP.2012.2206589}, doi = {10.1109/TSP.2012.2206589}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsp/LiDXN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/XiaoDN12, author = {Liang Xiao and Huaiyu Dai and Peng Ning}, title = {{MAC} Design of Uncoordinated FH-Based Collaborative Broadcast}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {1}, number = {3}, pages = {261--264}, year = {2012}, url = {https://doi.org/10.1109/WCL.2012.041012.120162}, doi = {10.1109/WCL.2012.041012.120162}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/XiaoDN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GiontaNZ12, author = {Jason Gionta and Peng Ning and Xiaolan Zhang}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {iHTTP: Efficient Authentication of Non-confidential {HTTP} Traffic}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {381--399}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_23}, doi = {10.1007/978-3-642-31284-7\_23}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/GiontaNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhouZJN12, author = {Wu Zhou and Yajin Zhou and Xuxian Jiang and Peng Ning}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Detecting repackaged smartphone applications in third-party android marketplaces}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {317--326}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133640}, doi = {10.1145/2133601.2133640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhouZJN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YavuzNR12, author = {Attila Altay Yavuz and Peng Ning and Michael K. Reiter}, editor = {Angelos D. Keromytis}, title = {Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {148--163}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_12}, doi = {10.1007/978-3-642-32946-3\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/YavuzNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuN12, author = {Yao Liu and Peng Ning}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {BitTrickle: Defending against broadband and high-power reactive jamming attacks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {909--917}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195840}, doi = {10.1109/INFCOM.2012.6195840}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/NatarajanNLJH12, author = {Arun Natarajan and Peng Ning and Yao Liu and Sushil Jajodia and Steve E. Hutchinson}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {NSDMiner: Automated discovery of Network Service Dependencies}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2507--2515}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195642}, doi = {10.1109/INFCOM.2012.6195642}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/NatarajanNLJH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuN12a, author = {Yao Liu and Peng Ning}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Enhanced wireless channel authentication using time-synched link signature}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2636--2640}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195669}, doi = {10.1109/INFCOM.2012.6195669}, timestamp = {Sat, 24 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiuN12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isie/ZengCN12, author = {Wente Zeng and Mo{-}Yuen Chow and Peng Ning}, title = {Secure distributed control in unreliable {D-NCS}}, booktitle = {21st {IEEE} International Symposium on Industrial Electronics, {ISIE} 2012, Hangzhou, China, 28-31 May, 2012}, pages = {1858--1863}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIE.2012.6237375}, doi = {10.1109/ISIE.2012.6237375}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/isie/ZengCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HeDN12, author = {Xiaofan He and Huaiyu Dai and Peng Ning}, title = {A Byzantine attack defender: The Conditional Frequency Check}, booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012}, pages = {975--979}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIT.2012.6284709}, doi = {10.1109/ISIT.2012.6284709}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/HeDN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/PeddycordNJ12, author = {Barry W. Peddycord III and Peng Ning and Sushil Jajodia}, editor = {Carolyn Rowland}, title = {On the Accurate Identification of Network Service Dependencies in Distributed Systems}, booktitle = {Strategies, Tools , and Techniques: Proceedings of the 26th Large Installation System Administration Conference, {LISA} 2012, San Diego, CA, USA, December 9-14, 2012}, pages = {181--194}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/lisa12/technical-sessions/presentation/peddycord}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/PeddycordNJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KimN11, author = {Mihui Kim and Peng Ning}, title = {SeCA: {A} framework for Secure Channel Assignment in wireless mesh networks}, journal = {Comput. Commun.}, volume = {34}, number = {4}, pages = {567--576}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.05.008}, doi = {10.1016/J.COMCOM.2010.05.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KimN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhouCNC11, author = {Tong Zhou and Romit Roy Choudhury and Peng Ning and Krishnendu Chakrabarty}, title = {{P2DAP} - Sybil Attacks Detection in Vehicular Ad Hoc Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {29}, number = {3}, pages = {582--594}, year = {2011}, url = {https://doi.org/10.1109/JSAC.2011.110308}, doi = {10.1109/JSAC.2011.110308}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ZhouCNC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNR11, author = {Yao Liu and Peng Ning and Michael K. Reiter}, title = {False data injection attacks against state estimation in electric power grids}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {13:1--13:33}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952995}, doi = {10.1145/1952982.1952995}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/QiWTLPNA11, author = {Hairong Qi and Xiaorui Wang and Leon M. Tolbert and Fangxing Li and Fang Zheng Peng and Peng Ning and Massoud Amin}, title = {A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {2}, number = {4}, pages = {770--781}, year = {2011}, url = {https://doi.org/10.1109/TSG.2011.2159819}, doi = {10.1109/TSG.2011.2159819}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/QiWTLPNA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AzabNZ11, author = {Ahmed M. Azab and Peng Ning and Xiaolan Zhang}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {{SICE:} a hardware-level strongly isolated computing environment for x86 multi-core platforms}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {375--388}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046752}, doi = {10.1145/2046707.2046752}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AzabNZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuN11, author = {Yao Liu and Peng Ning}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: mimicry attacks against wireless link signature}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {801--804}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093497}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/XiaoDN11, author = {Liang Xiao and Huaiyu Dai and Peng Ning}, title = {Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part {II:} Multihop Networks}, booktitle = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOM.2011.6133541}, doi = {10.1109/GLOCOM.2011.6133541}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/XiaoDN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/XiaoDN11a, author = {Liang Xiao and Huaiyu Dai and Peng Ning}, title = {Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part {I:} Single-Hop Networks}, booktitle = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOM.2011.6133542}, doi = {10.1109/GLOCOM.2011.6133542}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/XiaoDN11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/HyunNL11, author = {Sangwon Hyun and Peng Ning and An Liu}, title = {Mitigating Wireless Jamming Attacks via Channel Migration}, booktitle = {31st {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, {USA}}, pages = {313--322}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDCSW.2011.32}, doi = {10.1109/ICDCSW.2011.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/HyunNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/WangRN11, author = {Qian Wang and Kui Ren and Peng Ning}, title = {Anti-jamming communication in cognitive radio networks with unknown channel statistics}, booktitle = {Proceedings of the 19th annual {IEEE} International Conference on Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20, 2011}, pages = {393--402}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICNP.2011.6089079}, doi = {10.1109/ICNP.2011.6089079}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/WangRN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TranEBJFN11, author = {Minh Tran and Mark Etheridge and Tyler K. Bletsch and Xuxian Jiang and Vincent W. Freeh and Peng Ning}, editor = {Robin Sommer and Davide Balzarotti and Gregor Maier}, title = {On the Expressiveness of Return-into-libc Attacks}, booktitle = {Recent Advances in Intrusion Detection - 14th International Symposium, {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6961}, pages = {121--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23644-0\_7}, doi = {10.1007/978-3-642-23644-0\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/TranEBJFN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/HyunN11, author = {Sangwon Hyun and Peng Ning}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Secure Code Dissemination in Wireless Sensor Networks}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1099--1102}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_637}, doi = {10.1007/978-1-4419-5906-5\_637}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/HyunN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/SunN11, author = {Kun Sun and Peng Ning}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Secure Time Synchronization}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1139--1140}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_642}, doi = {10.1007/978-1-4419-5906-5\_642}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/SunN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuNDLW10, author = {An Liu and Peng Ning and Huaiyu Dai and Yao Liu and Cliff Wang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {367--376}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920315}, doi = {10.1145/1920261.1920315}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiuNDLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhouNZAWB10, author = {Wu Zhou and Peng Ning and Xiaolan Zhang and Glenn Ammons and Ruowen Wang and Vasanth Bala}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Always up-to-date: scalable offline patching of {VM} images in a compute cloud}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {377--386}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920317}, doi = {10.1145/1920261.1920317}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhouNZAWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AzabNWJZS10, author = {Ahmed M. Azab and Peng Ning and Zhi Wang and Xuxian Jiang and Xiaolan Zhang and Nathan C. Skalsky}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {HyperSentry: enabling stealthy in-context measurement of hypervisor integrity}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {38--49}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866313}, doi = {10.1145/1866307.1866313}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AzabNWJZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuNDL10, author = {Yao Liu and Peng Ning and Huaiyu Dai and An Liu}, title = {Randomized Differential {DSSS:} Jamming-Resistant Wireless Broadcast Communication}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {695--703}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462156}, doi = {10.1109/INFCOM.2010.5462156}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuNDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/LiuNDL10, author = {An Liu and Peng Ning and Huaiyu Dai and Yao Liu}, title = {{USD-FH:} Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure}, booktitle = {{IEEE} 7th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2010, 8-12 November 2010, San Francisco, CA, {USA}}, pages = {41--50}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MASS.2010.5663968}, doi = {10.1109/MASS.2010.5663968}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/LiuNDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuND10, author = {Yao Liu and Peng Ning and Huaiyu Dai}, title = {Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {286--301}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.24}, doi = {10.1109/SP.2010.24}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiuND10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10, author = {Paul Barford and Marc Dacier and Thomas G. Dietterich and Matt Fredrikson and Jonathon T. Giffin and Sushil Jajodia and Somesh Jha and Jason H. Li and Peng Liu and Peng Ning and Xinming Ou and Dawn Song and Laura Strater and Vipin Swarup and George P. Tadda and C. Wang and John Yen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber {SA:} Situational Awareness for Cyber Defense}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {3--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_1}, doi = {10.1007/978-1-4419-0140-8\_1}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SezerKN10, author = {Emre Can Sezer and Chongkyung Kil and Peng Ning}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Automated Software Vulnerability Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {201--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_10}, doi = {10.1007/978-1-4419-0140-8\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/SezerKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/WangDLN09, author = {Ronghua Wang and Wenliang Du and Xiaogang Liu and Peng Ning}, title = {ShortPK: {A} short-term public key scheme for broadcast authentication in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {6}, number = {1}, pages = {9:1--9:29}, year = {2009}, url = {https://doi.org/10.1145/1653760.1653769}, doi = {10.1145/1653760.1653769}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/WangDLN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YavuzN09, author = {Attila Altay Yavuz and Peng Ning}, title = {{BAF:} An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {219--228}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.28}, doi = {10.1109/ACSAC.2009.28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/YavuzN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AzabNSZ09, author = {Ahmed M. Azab and Peng Ning and Emre Can Sezer and Xiaolan Zhang}, title = {{HIMA:} {A} Hypervisor-Based Integrity Measurement Agent}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {461--470}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.50}, doi = {10.1109/ACSAC.2009.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AzabNSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuRN09, author = {Yao Liu and Michael K. Reiter and Peng Ning}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {False data injection attacks against state estimation in electric power grids}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {21--32}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653666}, doi = {10.1145/1653662.1653666}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuRN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeiZABN09, author = {Jinpeng Wei and Xiaolan Zhang and Glenn Ammons and Vasanth Bala and Peng Ning}, editor = {Radu Sion and Dawn Song}, title = {Managing security of virtual machine images in a cloud environment}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {91--96}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655021}, doi = {10.1145/1655008.1655021}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeiZABN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangJCN09, author = {Zhi Wang and Xuxian Jiang and Weidong Cui and Peng Ning}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Countering kernel rootkits with lightweight hook protection}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {545--554}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653728}, doi = {10.1145/1653662.1653728}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangJCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/KilSANZ09, author = {Chongkyung Kil and Emre Can Sezer and Ahmed M. Azab and Peng Ning and Xiaolan Zhang}, title = {Remote attestation to dynamic system properties: Towards providing complete system integrity evidence}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {115--124}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270348}, doi = {10.1109/DSN.2009.5270348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/KilSANZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuNW09, author = {An Liu and Peng Ning and Chun Wang}, title = {Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {1242--1250}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062038}, doi = {10.1109/INFCOM.2009.5062038}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/YavuzN09, author = {Attila Altay Yavuz and Peng Ning}, editor = {Archan Misra and Eyal de Lara}, title = {Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks}, booktitle = {6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, {MOBIQUITOUS} 2009, Toronto, Canada, July 13-16, 2009}, pages = {1--10}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6824}, doi = {10.4108/ICST.MOBIQUITOUS2009.6824}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/YavuzN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SunLXNM09, author = {Kun Sun and An Liu and Roger Xu and Peng Ning and W. Douglas Maughan}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {Securing network access in wireless sensor networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {261--268}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514310}, doi = {10.1145/1514274.1514310}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SunLXNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2009, editor = {Michael Backes and Peng Ning}, title = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1}, doi = {10.1007/978-3-642-04444-1}, isbn = {978-3-642-04443-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangYN08, author = {Qing Zhang and Ting Yu and Peng Ning}, title = {A Framework for Identifying Compromised Nodes in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {3}, pages = {12:1--12:37}, year = {2008}, url = {https://doi.org/10.1145/1341731.1341733}, doi = {10.1145/1341731.1341733}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhangYN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNLWD08, author = {Donggang Liu and Peng Ning and An Liu and Cliff Wang and Wenliang Du}, title = {Attack-Resistant Location Estimation in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {22:1--22:39}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380570}, doi = {10.1145/1380564.1380570}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/NingLD08, author = {Peng Ning and An Liu and Wenliang Du}, title = {Mitigating DoS attacks against broadcast authentication in wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {4}, number = {1}, pages = {1:1--1:35}, year = {2008}, url = {https://doi.org/10.1145/1325651.1325652}, doi = {10.1145/1325651.1325652}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/NingLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LiuND08, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Group-based key predistribution for wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {4}, number = {2}, pages = {11:1--11:30}, year = {2008}, url = {https://doi.org/10.1145/1340771.1340777}, doi = {10.1145/1340771.1340777}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LiuND08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/LiuN08, author = {An Liu and Peng Ning}, title = {TinyECC: {A} Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Information Processing in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24, 2008}, pages = {245--256}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IPSN.2008.47}, doi = {10.1109/IPSN.2008.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipsn/LiuN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/HyunNLD08, author = {Sangwon Hyun and Peng Ning and An Liu and Wenliang Du}, title = {Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Information Processing in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24, 2008}, pages = {445--456}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IPSN.2008.12}, doi = {10.1109/IPSN.2008.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipsn/HyunNLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/LiuON08, author = {An Liu and Young{-}Hyun Oh and Peng Ning}, title = {Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge}, booktitle = {Proceedings of the 7th International Conference on Information Processing in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24, 2008}, pages = {561--562}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IPSN.2008.13}, doi = {10.1109/IPSN.2008.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipsn/LiuON08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DongLN08, author = {Qi Dong and Donggang Liu and Peng Ning}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {2--12}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352536}, doi = {10.1145/1352533.1352536}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DongLN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-59593-810-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LiuN07, author = {Donggang Liu and Peng Ning}, title = {Security for Wireless Sensor Networks}, series = {Advances in Information Security}, volume = {28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46781-8}, doi = {10.1007/978-0-387-46781-8}, isbn = {978-0-387-32723-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LiuN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuSJN07, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia and Peng Ning}, title = {Interleaved hop-by-hop authentication against false data injection attacks in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {3}, number = {3}, pages = {14}, year = {2007}, url = {https://doi.org/10.1145/1267060.1267062}, doi = {10.1145/1267060.1267062}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ZhuSJN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KilSNZ07, author = {Chongkyung Kil and Emre Can Sezer and Peng Ning and Xiaolan Zhang}, title = {Automated Security Debugging Using Program Structural Constraints}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {453--462}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.19}, doi = {10.1109/ACSAC.2007.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KilSNZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangRNI07, author = {Qinghua Zhang and Douglas S. Reeves and Peng Ning and S. Purushothaman Iyer}, editor = {Feng Bao and Steven Miller}, title = {Analyzing network traffic to detect self-decrypting exploit code}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {4--12}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229291}, doi = {10.1145/1229285.1229291}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangRNI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangNR07, author = {Pan Wang and Peng Ning and Douglas S. Reeves}, editor = {Feng Bao and Steven Miller}, title = {A \emph{k}-anonymous communication protocol for overlay networks}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {45--56}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229296}, doi = {10.1145/1229285.1229296}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangNR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SezerNKX07, author = {Emre Can Sezer and Peng Ning and Chongkyung Kil and Jun Xu}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Memsherlock: an automated debugger for unknown memory corruption vulnerabilities}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {562--572}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315314}, doi = {10.1145/1315245.1315314}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SezerNKX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PyunPWRN07, author = {Young June Pyun and Young Hee Park and Xinyuan Wang and Douglas S. Reeves and Peng Ning}, title = {Tracing Traffic through Intermediate Hosts that Repacketize Flows}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {634--642}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.80}, doi = {10.1109/INFCOM.2007.80}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PyunPWRN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/WangDN07, author = {Ronghua Wang and Wenliang Du and Peng Ning}, editor = {Evangelos Kranakis and Elizabeth M. Belding and Eytan H. Modiano}, title = {Containing denial-of-service attacks in broadcast authentication in sensor networks}, booktitle = {Proceedings of the 8th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007}, pages = {71--79}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288107.1288118}, doi = {10.1145/1288107.1288118}, timestamp = {Mon, 22 Feb 2021 15:13:40 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/WangDN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/ZhouCNC07, author = {Tong Zhou and Romit Roy Choudhury and Peng Ning and Krishnendu Chakrabarty}, title = {Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks}, booktitle = {4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MOBIQ.2007.4451013}, doi = {10.1109/MOBIQ.2007.4451013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/ZhouCNC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FangDN07, author = {Lei Fang and Wenliang Du and Peng Ning}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {33--55}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_2}, doi = {10.1007/978-0-387-46276-9\_2}, timestamp = {Mon, 15 Jun 2020 07:44:16 +0200}, biburl = {https://dblp.org/rec/series/ais/FangDN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/NingLD07, author = {Peng Ning and Donggang Liu and Wenliang Du}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure and Resilient Localization in Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {161--184}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_7}, doi = {10.1007/978-0-387-46276-9\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/NingLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SunNW07, author = {Kun Sun and Peng Ning and Cliff Wang}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure and Resilient Time Synchronization in Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {347--367}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_15}, doi = {10.1007/978-0-387-46276-9\_15}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SunNW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-703-2}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007csaw, editor = {Peng Ning and Vijay Atluri}, title = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture, {CSAW} 2007, Fairfax, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-890-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007csaw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007fmse, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-887-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007stc, editor = {Peng Ning and Vijay Atluri and Shouhuai Xu and Moti Yung}, title = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing, {STC} 2007, Alexandria, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-888-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007stc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sws/2007, editor = {Peng Ning and Ernesto Damiani and Seth Proctor}, title = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS} 2007, Fairfax, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-892-3}, timestamp = {Tue, 22 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sws/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2007, editor = {Peng Ning and Ting Yu}, title = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-883-1}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/DuFP06, author = {Wenliang Du and Lei Fang and Peng Ning}, title = {{LAD:} Localization anomaly detection for wireless sensor networks}, journal = {J. Parallel Distributed Comput.}, volume = {66}, number = {7}, pages = {874--886}, year = {2006}, url = {https://doi.org/10.1016/j.jpdc.2005.12.011}, doi = {10.1016/J.JPDC.2005.12.011}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/DuFP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/SunNW06, author = {Kun Sun and Peng Ning and Cliff Wang}, title = {Secure and resilient clock synchronization in wireless sensor networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {2}, pages = {395--408}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2005.861396}, doi = {10.1109/JSAC.2005.861396}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/SunNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunPNW06, author = {Kun Sun and Pai Peng and Peng Ning and Cliff Wang}, title = {Secure Distributed Cluster Formation in Wireless Sensor Networks}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {131--140}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.46}, doi = {10.1109/ACSAC.2006.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunPNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KilJBXN06, author = {Chongkyung Kil and Jinsuk Jun and Christopher Bookholt and Jun Xu and Peng Ning}, title = {Address Space Layout Permutation {(ASLP):} Towards Fine-Grained Randomization of Commodity Software}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.9}, doi = {10.1109/ACSAC.2006.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KilJBXN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunNW06, author = {Kun Sun and Peng Ning and Cliff Wang}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {TinySeRSync: secure and resilient time synchronization in wireless sensor networks}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {264--277}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180439}, doi = {10.1145/1180405.1180439}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhaiNX06, author = {Yan Zhai and Peng Ning and Jun Xu}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {Integrating {IDS} Alert Correlation and OS-Level Dependency Tracking}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {272--284}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_24}, doi = {10.1007/11760146\_24}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhaiNX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XuN06, author = {Dingbang Xu and Peng Ning}, title = {A Flexible Approach to Intrusion Alert Anonymization and Correlation}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359544}, doi = {10.1109/SECCOMW.2006.359544}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XuN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhangYN06, author = {Qing Zhang and Ting Yu and Peng Ning}, title = {A Framework for Identifying Compromised Nodes in Sensor Networks}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359546}, doi = {10.1109/SECCOMW.2006.359546}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ZhangYN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PengNR06, author = {Pai Peng and Peng Ning and Douglas S. Reeves}, title = {On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {334--349}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.28}, doi = {10.1109/SP.2006.28}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/PengNR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2006, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308}, doi = {10.1007/11935308}, isbn = {3-540-49496-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/NingS05, author = {Peng Ning and Kun Sun}, title = {How to misuse {AODV:} a case study of insider attacks against mobile ad-hoc routing protocols}, journal = {Ad Hoc Networks}, volume = {3}, number = {6}, pages = {795--819}, year = {2005}, url = {https://doi.org/10.1016/j.adhoc.2004.04.001}, doi = {10.1016/J.ADHOC.2004.04.001}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/NingS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunNW05, author = {Kun Sun and Peng Ning and Cliff Wang}, title = {Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {177--189}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.36}, doi = {10.1109/TDSC.2005.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunNW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNL05, author = {Donggang Liu and Peng Ning and Rongfang Li}, title = {Establishing pairwise keys in distributed sensor networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {41--77}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053287}, doi = {10.1145/1053283.1053287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/LiuN05, author = {Donggang Liu and Peng Ning}, title = {Improving key predistribution with deployment knowledge in static sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {1}, number = {2}, pages = {204--239}, year = {2005}, url = {https://doi.org/10.1145/1105688.1105691}, doi = {10.1145/1105688.1105691}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/LiuN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuN05, author = {Dingbang Xu and Peng Ning}, title = {Privacy-Preserving Alert Correlation: {A} Concept Hierarchy Based Approach}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {537--546}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.45}, doi = {10.1109/CSAC.2005.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuNKZB05, author = {Jun Xu and Peng Ning and Chongkyung Kil and Yan Zhai and Christopher Bookholt}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Automatic diagnosis and response to memory corruption vulnerabilities}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {223--234}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102151}, doi = {10.1145/1102120.1102151}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuNKZB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiuND05, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks}, booktitle = {25th International Conference on Distributed Computing Systems {(ICDCS} 2005), 6-10 June 2005, Columbus, OH, {USA}}, pages = {609--619}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCS.2005.21}, doi = {10.1109/ICDCS.2005.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiuND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/PengNRW05, author = {Pai Peng and Peng Ning and Douglas S. Reeves and Xinyuan Wang}, title = {Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {107--113}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.30}, doi = {10.1109/ICDCSW.2005.30}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcsw/PengNRW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhangWRN05, author = {Qinghua Zhang and Pan Wang and Douglas S. Reeves and Peng Ning}, title = {Defending against Sybil Attacks in Sensor Networks}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {185--191}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.57}, doi = {10.1109/ICDCSW.2005.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhangWRN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangNR05, author = {Pan Wang and Peng Ning and Douglas S. Reeves}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Network Access Control for Mobile Ad-Hoc Networks}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {350--362}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_30}, doi = {10.1007/11602897\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangNR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FangDN05, author = {Lei Fang and Wenliang Du and Peng Ning}, title = {A beacon-less location discovery scheme for wireless sensor networks}, booktitle = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer and Communications Societies, 13-17 March 2005, Miami, FL, {USA}}, pages = {161--171}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INFCOM.2005.1497888}, doi = {10.1109/INFCOM.2005.1497888}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/FangDN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/DuFN05, author = {Wenliang Du and Lei Fang and Peng Ning}, title = {{LAD:} Localization Anomaly Detection forWireless Sensor Networks}, booktitle = {19th International Parallel and Distributed Processing Symposium {(IPDPS} 2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IPDPS.2005.267}, doi = {10.1109/IPDPS.2005.267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/DuFN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipsn/LiuND05, author = {Donggang Liu and Peng Ning and Wenliang Du}, title = {Attack-resistant location estimation in sensor networks}, booktitle = {Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, {IPSN} 2005, April 25-27, 2005, UCLA, Los Angeles, California, {USA}}, pages = {99--106}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/IPSN.2005.1440904}, doi = {10.1109/IPSN.2005.1440904}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ipsn/LiuND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/DuWN05, author = {Wenliang Du and Ronghua Wang and Peng Ning}, editor = {P. R. Kumar and Andrew T. Campbell and Roger Wattenhofer}, title = {An efficient scheme for authenticating public keys in sensor networks}, booktitle = {Proceedings of the 6th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, 2005}, pages = {58--67}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1062689.1062698}, doi = {10.1145/1062689.1062698}, timestamp = {Thu, 08 Apr 2021 08:40:43 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/DuWN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05, author = {Donggang Liu and Peng Ning and Sencun Zhu and Sushil Jajodia}, title = {Practical Broadcast Authentication in Sensor Networks}, booktitle = {2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}}, pages = {118--132}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MOBIQUITOUS.2005.49}, doi = {10.1109/MOBIQUITOUS.2005.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/WangRN05, author = {Pan Wang and Douglas S. Reeves and Peng Ning}, title = {Secure Address Auto-con.guration for Mobile Ad Hoc Networks}, booktitle = {2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}}, pages = {519--522}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MOBIQUITOUS.2005.52}, doi = {10.1109/MOBIQUITOUS.2005.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/WangRN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/LiuND05, author = {Donggang Liu and Peng Ning and Wenliang Du}, editor = {Markus Jakobsson and Radha Poovendran}, title = {Group-based key pre-distribution in wireless sensor networks}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne, Germany, September 2, 2005}, pages = {11--20}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1080793.1080798}, doi = {10.1145/1080793.1080798}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/LiuND05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/wi/05/NingL05, author = {Peng Ning and Donggang Liu}, editor = {Ivan Stojmenovic}, title = {Broadcast Authentication and Key Management for Secure Sensor Networks}, booktitle = {Handbook of Sensor Networks: Algorithms and Architectures}, series = {Wiley series on parallel and distributed computing}, pages = {141--172}, publisher = {Wiley}, year = {2005}, url = {https://doi.org/10.1002/047174414x.ch5}, doi = {10.1002/047174414X.CH5}, timestamp = {Tue, 16 Jul 2019 13:42:29 +0200}, biburl = {https://dblp.org/rec/books/wi/05/NingL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sasn/2005, editor = {Vijay Atluri and Peng Ning and Wenliang Du}, title = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-227-5}, timestamp = {Fri, 13 Jan 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/LiuN04, author = {Donggang Liu and Peng Ning}, title = {Multilevel {\(\mathrm{\mu}\)}TESLA: Broadcast authentication for distributed sensor networks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {3}, number = {4}, pages = {800--836}, year = {2004}, url = {https://doi.org/10.1145/1027794.1027800}, doi = {10.1145/1027794.1027800}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/LiuN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingCRX04, author = {Peng Ning and Yun Cui and Douglas S. Reeves and Dingbang Xu}, title = {Techniques and tools for analyzing intrusion alerts}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {274--318}, year = {2004}, url = {https://doi.org/10.1145/996943.996947}, doi = {10.1145/996943.996947}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingCRX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingX04, author = {Peng Ning and Dingbang Xu}, title = {Hypothesizing and reasoning about attacks missed by intrusion detection systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {591--627}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042036}, doi = {10.1145/1042031.1042036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhaiNIR04, author = {Yan Zhai and Peng Ning and Purush Iyer and Douglas S. Reeves}, title = {Reasoning About Complementary Intrusion Evidence}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {39--48}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.29}, doi = {10.1109/CSAC.2004.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhaiNIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuN04, author = {Dingbang Xu and Peng Ning}, title = {Alert Correlation through Triggering Events and Common Resources}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {360--369}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.5}, doi = {10.1109/CSAC.2004.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JiangRN04, author = {Qinglin Jiang and Douglas S. Reeves and Peng Ning}, editor = {Tatsuaki Okamoto}, title = {Improving Robustness of {PGP} Keyrings by Conflict Detection}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {194--207}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_16}, doi = {10.1007/978-3-540-24660-2\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JiangRN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangNR04, author = {Pan Wang and Peng Ning and Douglas S. Reeves}, editor = {Kan Zhang and Yuliang Zheng}, title = {Storage-Efficient Stateless Group Key Revocation}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {25--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_3}, doi = {10.1007/978-3-540-30144-8\_3}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/WangNR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/JiangRN04, author = {Qinglin Jiang and Douglas S. Reeves and Peng Ning}, editor = {Kan Zhang and Yuliang Zheng}, title = {Certificate Recommendations to Improve the Robustness of Web of Trust}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {292--303}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_25}, doi = {10.1007/978-3-540-30144-8\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/JiangRN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NingXHA04, author = {Peng Ning and Dingbang Xu and Christopher G. Healey and Robert St. Amant}, title = {Building Attack Scenarios through Integration of Complementary Alert Correlation Method}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/building-attack-scenarios-through-integration-complementary-alert-correlation-method/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NingXHA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhuSJN04, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia and Peng Ning}, title = {An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {259--271}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301328}, doi = {10.1109/SECPRI.2004.1301328}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhuSJN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/NingJW03, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Intrusion Detection in Distributed Systems - An Abstraction-Based Approach}, series = {Advances in Information Security}, volume = {9}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0467-2}, doi = {10.1007/978-1-4615-0467-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/NingJW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/LiNWJ03, author = {Yingjiu Li and Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Discovering calendar-based temporal association rules}, journal = {Data Knowl. Eng.}, volume = {44}, number = {2}, pages = {193--218}, year = {2003}, timestamp = {Thu, 27 Nov 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/LiNWJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuN03, author = {Donggang Liu and Peng Ning}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Establishing pairwise keys in distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {52--61}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948119}, doi = {10.1145/948109.948119}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NingX03, author = {Peng Ning and Dingbang Xu}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Learning attack strategies from intrusion alerts}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {200--209}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948137}, doi = {10.1145/948109.948137}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NingX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuNS03, author = {Donggang Liu and Peng Ning and Kun Sun}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Efficient self-healing group key distribution with revocation capability}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {231--240}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948141}, doi = {10.1145/948109.948141}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuNS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/NingX03, author = {Peng Ning and Dingbang Xu}, editor = {Sabrina De Capitani di Vimercati and Indrakshi Ray and Indrajit Ray}, title = {Adapting Query Optimization Techniques for Efficient Alert Correlation}, booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP} {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, {USA}}, series = {{IFIP}}, volume = {142}, pages = {75--88}, publisher = {Kluwer/Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-8070-0\_6}, doi = {10.1007/1-4020-8070-0\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/NingX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/NingS03, author = {Peng Ning and Kun Sun}, title = {How to Misuse {AODV:} {A} Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {60--67}, publisher = {{IEEE}}, year = {2003}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/NingS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuN03, author = {Donggang Liu and Peng Ning}, title = {Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/efficient-distribution-key-chain-commitments-broadcast-authentication-distributed-sensor/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/LiuN03, author = {Donggang Liu and Peng Ning}, editor = {Sanjeev Setia and Vipin Swarup}, title = {Location-based pairwise key establishments for static sensor networks}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003}, pages = {72--82}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/986858.986869}, doi = {10.1145/986858.986869}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/LiuN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/NingWJ02, author = {Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {An Algebraic Representation of Calendars}, journal = {Ann. Math. Artif. Intell.}, volume = {36}, number = {1-2}, pages = {5--38}, year = {2002}, url = {https://doi.org/10.1023/A:1015835418881}, doi = {10.1023/A:1015835418881}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/NingWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NingJW02, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Design and implementation of a decentralized prototype system for detecting distributed attacks}, journal = {Comput. Commun.}, volume = {25}, number = {15}, pages = {1374--1391}, year = {2002}, url = {https://doi.org/10.1016/S0140-3664(02)00039-7}, doi = {10.1016/S0140-3664(02)00039-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NingJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NingCR02, author = {Peng Ning and Yun Cui and Douglas S. Reeves}, editor = {Vijayalakshmi Atluri}, title = {Constructing attack scenarios through correlation of intrusion alerts}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {245--254}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586144}, doi = {10.1145/586110.586144}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NingCR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NingCR02, author = {Peng Ning and Yun Cui and Douglas S. Reeves}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Analyzing Intensive Intrusion Alerts via Correlation}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {74--94}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_5}, doi = {10.1007/3-540-36084-0\_5}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/raid/NingCR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LiuNJ01, author = {Peng Liu and Peng Ning and Sushil Jajodia}, title = {Avoiding loss of fairness owing to failures in fair data exchange systems}, journal = {Decis. Support Syst.}, volume = {31}, number = {3}, pages = {337--350}, year = {2001}, url = {https://doi.org/10.1016/S0167-9236(00)00141-X}, doi = {10.1016/S0167-9236(00)00141-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LiuNJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingJW01, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Abstraction-based intrusion detection in distributed environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {407--452}, year = {2001}, url = {https://doi.org/10.1145/503339.503342}, doi = {10.1145/503339.503342}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingJW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NingY01, author = {Peng Ning and Yiqun Lisa Yin}, editor = {Sihan Qing and Tatsuaki Okamoto and Jianying Zhou}, title = {Efficient Software Implementation for Finite Field Multiplication in Normal Basis}, booktitle = {Information and Communications Security, Third International Conference, {ICICS} 2001, Xian, China, November 13-16, 2001}, series = {Lecture Notes in Computer Science}, volume = {2229}, pages = {177--188}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45600-7\_21}, doi = {10.1007/3-540-45600-7\_21}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/NingY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/LiNWJ01, author = {Yingjiu Li and Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Discovering Calendar-based Temporal Association Rules}, booktitle = {Eigth International Symposium on Temporal Representation and Reasoning, TIME-01, Civdale del Friuli, Italy, June 14-16, 2001}, pages = {111--118}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/TIME.2001.930706}, doi = {10.1109/TIME.2001.930706}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/LiNWJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NingWJ00, author = {Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Modeling requests among cooperating intrusion detection systems}, journal = {Comput. Commun.}, volume = {23}, number = {17}, pages = {1702--1715}, year = {2000}, url = {https://doi.org/10.1016/S0140-3664(00)00256-5}, doi = {10.1016/S0140-3664(00)00256-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NingWJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuNJ00, author = {Peng Liu and Peng Ning and Sushil Jajodia}, title = {Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols}, booktitle = {2000 International Conference on Dependable Systems and Networks {(DSN} 2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York, NY, {USA}}, pages = {631--640}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICDSN.2000.857600}, doi = {10.1109/ICDSN.2000.857600}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiuNJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/YangNWJ00, author = {Jiahai Yang and Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {{CARDS:} {A} Distributed System for Detecting Coordinated Attacks}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {171--180}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/YangNWJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.