The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Peng Ning" ( http://dblp.L3S.de/Authors/Peng_Ning )

  Author page on DBLP  Author page in RDF  Community of Peng Ning in ASPL-2

Publication years (Num. hits)
2000-2003 (20) 2004-2005 (28) 2006-2007 (28) 2008-2009 (20) 2010-2011 (21) 2012 (17) 2013-2014 (21) 2015-2016 (15) 2017-2019 (7)
Publication types (Num. hits)
article(47) book(2) incollection(8) inproceedings(110) proceedings(10)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 100 occurrences of 51 keywords

Results
Found 178 publication records. Showing 177 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Qian Feng, Rundong Zhou, Yanhui Zhao, Jia Ma, Yifei Wang, Na Yu, Xudong Jin, Jian Wang, Ahmed M. Azab, Peng Ning Learning Binary Representation for Automatic Patch Detection. Search on Bibsonomy CCNC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sangwon Hyun, Kun Sun 0001, Peng Ning FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes. Search on Bibsonomy Computer Communications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks. Search on Bibsonomy IEEE Journal on Selected Areas in Communications The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richeng Jin, Xiaofan He, Huaiyu Dai, Rudra Dutta, Peng Ning Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach. Search on Bibsonomy PAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall 0005, Christopher G. Healey, Sushil Jajodia, Peng Liu 0005, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen Computer-Aided Human Centric Cyber Situation Awareness. Search on Bibsonomy Theory and Models for Cyber Situation Awareness The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Song Fang, Yao Liu 0007, Peng Ning Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Song Fang, Yao Liu 0007, Peng Ning Wireless Communications under Broadband Reactive Jamming Attacks. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning, Rudra Dutta Toward Proper Guard Zones for Link Signature. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry. Search on Bibsonomy IEEE Trans. Signal Processing The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qian Wang 0002, Kui Ren 0001, Peng Ning, Shengshan Hu Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. Search on Bibsonomy IEEE Trans. Vehicular Technology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta Zero-determinant Strategies for Multi-player Multi-action Iterated Games. Search on Bibsonomy IEEE Signal Process. Lett. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed M. Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, Peng Ning SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks. Search on Bibsonomy INFOCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty. Search on Bibsonomy GLOBECOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Gionta, William Enck, Peng Ning HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. Search on Bibsonomy CODASPY The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning Improving learning and adaptation in security games by exploiting information asymmetry. Search on Bibsonomy INFOCOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaiqi Xiong, Peng Ning Cost-efficient and attack-resilient approaches for state estimation in power grids. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta A stochastic multi-channel spectrum access game with incomplete information. Search on Bibsonomy ICC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou 0001, Ahmed M. Azab EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
1Wenbo Shen, Yao Liu 0007, Xiaofan He, Huaiyu Dai, Peng Ning No time to demodulate - fast physical layer verification of friendly jamming. Search on Bibsonomy MILCOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuan Zhang 0009, Min Yang 0002, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning Dynamic Adaptive Anti-Jamming via Controlled Mobility. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kui Ren 0001, Pierangela Samarati, Marco Gruteser, Peng Ning, Yunhao Liu Guest Editorial Special Issue on Security for IoT: The State of the Art. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peng Ning Samsung KNOX and Enterprise Mobile Security. Search on Bibsonomy SPSM@CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu 0007 MCR Decoding: A MIMO approach for defending against wireless jamming attacks. Search on Bibsonomy CNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning The security of link signature: A view from channel models. Search on Bibsonomy CNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang 0001 SEER: practical memory virus scanning as a service. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang 0001 DACSA: A Decoupled Architecture for Cloud Security Analysis. Search on Bibsonomy CSET The full citation details ... 2014 DBLP  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning Channel correlation modeling for link signature security assessment. Search on Bibsonomy HotSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xianqing Yu, Peng Ning, Mladen A. Vouk Securing Hadoop in cloud. Search on Bibsonomy HotSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing. Search on Bibsonomy IEEE Journal on Selected Areas in Communications The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qi Dong 0001, Donggang Liu, Peng Ning Providing DoS resistance for signature-based broadcast authentication in sensor networks. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peng Ning Program Chair's Message. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Zhemin Yang, Min Yang 0002, Yuan Zhang 0009, Guofei Gu, Peng Ning, Xiaoyang Sean Wang AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuan Zhang 0009, Min Yang 0002, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang Vetting undesirable behaviors in android apps with permission use analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning Dynamic adaptive anti-jamming via controlled mobility. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning Is link signature dependable for wireless security? Search on Bibsonomy INFOCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ruowen Wang, Peng Ning, Tao Xie, Quan Chen MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2013 DBLP  BibTeX  RDF
1Liang Xiao 0003, Huaiyu Dai, Peng Ning Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz, Peng Ning, Michael K. Reiter BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chengzhi Li, Huaiyu Dai, Liang Xiao 0003, Peng Ning Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks. Search on Bibsonomy IEEE Trans. Signal Processing The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Liang Xiao 0003, Huaiyu Dai, Peng Ning MAC Design of Uncoordinated FH-Based Collaborative Broadcast. Search on Bibsonomy IEEE Wireless Commun. Letters The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz, Peng Ning Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mihui Kim, Varagur Karthik Sriram Iyer, Peng Ning MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning Interval-based flow watermarking for tracing interactive traffic. Search on Bibsonomy Computer Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning Containing bogus packet insertion attacks for broadcast authentication in sensor networks. Search on Bibsonomy TOSN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Barry W. Peddycord III, Peng Ning, Sushil Jajodia On the Accurate Identification of Network Service Dependencies in Distributed Systems. Search on Bibsonomy LISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Wente Zeng, Mo-Yuen Chow, Peng Ning Secure distributed control in unreliable D-NCS. Search on Bibsonomy ISIE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Yajin Zhou, Xuxian Jiang, Peng Ning Detecting repackaged smartphone applications in third-party android marketplaces. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Peng Ning Enhanced wireless channel authentication using time-synched link signature. Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Peng Ning BitTrickle: Defending against broadband and high-power reactive jamming attacks. Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arun Natarajan, Peng Ning, Yao Liu 0007, Sushil Jajodia, Steve E. Hutchinson NSDMiner: Automated discovery of Network Service Dependencies. Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz, Peng Ning, Michael K. Reiter Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Search on Bibsonomy Financial Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jason Gionta, Peng Ning, Xiaolan Zhang 0001 iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaofan He, Huaiyu Dai, Peng Ning A Byzantine attack defender: The Conditional Frequency Check. Search on Bibsonomy ISIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Peng Ning, Michael K. Reiter False data injection attacks against state estimation in electric power grids. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing Li, Fang Zheng Peng, Peng Ning, Massoud Amin A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mihui Kim, Peng Ning SeCA: A framework for Secure Channel Assignment in wireless mesh networks. Search on Bibsonomy Computer Communications The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. Search on Bibsonomy IEEE Journal on Selected Areas in Communications The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sangwon Hyun, Peng Ning Secure Code Dissemination in Wireless Sensor Networks. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kun Sun 0001, Peng Ning Secure Time Synchronization. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liang Xiao 0003, Huaiyu Dai, Peng Ning Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liang Xiao 0003, Huaiyu Dai, Peng Ning Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmed M. Azab, Peng Ning, Xiaolan Zhang 0001 SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Peng Ning Poster: mimicry attacks against wireless link signature. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2011 DBLP  BibTeX  RDF
1Sangwon Hyun, Peng Ning, An Liu Mitigating Wireless Jamming Attacks via Channel Migration. Search on Bibsonomy ICDCS Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning On the Expressiveness of Return-into-libc Attacks. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qian Wang 0002, Kui Ren 0001, Peng Ning Anti-jamming communication in cognitive radio networks with unknown channel statistics. Search on Bibsonomy ICNP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmed M. Azab, Peng Ning, Zhi Wang 0004, Xuxian Jiang, Xiaolan Zhang 0001, Nathan C. Skalsky HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Peng Ning, Huaiyu Dai, An Liu Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. Search on Bibsonomy INFOCOM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1An Liu, Peng Ning, Huaiyu Dai, Yao Liu 0007, Cliff Wang Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Peng Ning, Xiaolan Zhang 0001, Glenn Ammons, Ruowen Wang, Vasanth Bala Always up-to-date: scalable offline patching of VM images in a compute cloud. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Peng Ning, Huaiyu Dai Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF primary user detection, link signatures, cognitive radio networks
1An Liu, Peng Ning, Huaiyu Dai, Yao Liu 0007 USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure. Search on Bibsonomy MASS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Emre Can Sezer, Chongkyung Kil, Peng Ning Automated Software Vulnerability Analysis. Search on Bibsonomy Cyber Situational Awareness The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu 0005, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen Cyber SA: Situational Awareness for Cyber Defense. Search on Bibsonomy Cyber Situational Awareness The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. Search on Bibsonomy TOSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang 0001 Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jinpeng Wei, Xiaolan Zhang 0001, Glenn Ammons, Vasanth Bala, Peng Ning Managing security of virtual machine images in a cloud environment. Search on Bibsonomy CCSW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Peng Ning Countering kernel rootkits with lightweight hook protection. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yao Liu 0007, Michael K. Reiter, Peng Ning False data injection attacks against state estimation in electric power grids. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack, power grids, state estimation
1An Liu, Peng Ning, Chun Wang Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Peng Ning (eds.) Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang 0001 HIMA: A Hypervisor-Based Integrity Measurement Agent. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz, Peng Ning BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz, Peng Ning Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kun Sun 0001, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan Securing network access in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, sensor networks, elliptic curve cryptography
1Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du Attack-Resistant Location Estimation in Wireless Sensor Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, localization
1Qing Zhang, Ting Yu, Peng Ning A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sensor networks, intrusion detection
1Donggang Liu, Peng Ning, Wenliang Du Group-based key predistribution for wireless sensor networks. Search on Bibsonomy TOSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF group-based deployment, pairwise key establishment, security, Sensor networks, key predistribution
1Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy TOSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
1Sangwon Hyun, Peng Ning, An Liu, Wenliang Du Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure remote programming, Wireless sensor network security, DoS attacks
1An Liu, Young-Hyun Oh, Peng Ning Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Seluge, secure and DoS-resistant code dissemination, WiSeNeT, demo
1An Liu, Peng Ning TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TinyECC, ECC, public key cryptography, Wireless sensor network security
1Peng Ning, Paul F. Syverson, Somesh Jha (eds.) Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 177 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license