Folgen
Peng Ning
Titel
Zitiert von
Zitiert von
Jahr
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
35742011
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li
ACM Transactions on Information and System Security (TISSEC) 8 (1), 41-77, 2005
26422005
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
A Liu, P Ning
2008 International Conference on Information Processing in Sensor Networks …, 2008
12002008
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
8832012
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
8632002
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
8392004
Location-based pairwise key establishments for static sensor networks
D Liu, P Ning
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
8222003
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D Liu, P Ning
ACM Transactions on Embedded Computing Systems (TECS) 3 (4), 800-836, 2004
5572004
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5522013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4512013
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
4262004
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4102010
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008
4052008
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3972003
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
C Kil, J Jun, C Bookholt, J Xu, P Ning
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 339-348, 2006
3912006
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
3912005
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
3842009
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3592014
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
D Liu, P Ning
North Carolina State University. Dept. of Computer Science, 2002
3572002
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
P Ning, K Sun
Ad Hoc Networks 3 (6), 795-819, 2005
3462005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20