The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peng Ning: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dingbang Xu, Peng Ning
    Alert Correlation through Triggering Events and Common Resources. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:360-369 [Conf]
  2. Dingbang Xu, Peng Ning
    Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:537-546 [Conf]
  3. Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves
    Reasoning About Complementary Intrusion Evidence. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:39-48 [Conf]
  4. Donggang Liu, Peng Ning
    Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:52-61 [Conf]
  5. Donggang Liu, Peng Ning, Kun Sun
    Efficient self-healing group key distribution with revocation capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:231-240 [Conf]
  6. Peng Ning, Yun Cui, Douglas S. Reeves
    Constructing attack scenarios through correlation of intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:245-254 [Conf]
  7. Peng Ning, Dingbang Xu
    Learning attack strategies from intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:200-209 [Conf]
  8. Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt
    Automatic diagnosis and response to memory corruption vulnerabilities. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:223-234 [Conf]
  9. Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer
    Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:4-12 [Conf]
  10. Kun Sun, Peng Ning, Cliff Wang
    TinySeRSync: secure and resilient time synchronization in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:264-277 [Conf]
  11. Pan Wang, Peng Ning, Douglas S. Reeves
    A k-anonymous communication protocol for overlay networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:45-56 [Conf]
  12. Qinglin Jiang, Douglas S. Reeves, Peng Ning
    Improving Robustness of PGP Keyrings by Conflict Detection. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:194-207 [Conf]
  13. Peng Ning, Dingbang Xu
    Adapting Query Optimization Techniques for Efficient Alert Correlation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:75-88 [Conf]
  14. Peng Liu, Peng Ning, Sushil Jajodia
    Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:631-640 [Conf]
  15. Peng Ning, Kun Sun
    How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:60-67 [Conf]
  16. Donggang Liu, Peng Ning, Wenliang Du
    Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:609-619 [Conf]
  17. Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang
    Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:107-113 [Conf]
  18. Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning
    Defending against Sybil Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:185-191 [Conf]
  19. Pan Wang, Peng Ning, Douglas S. Reeves
    Network Access Control for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:350-362 [Conf]
  20. Peng Ning, Yiqun Lisa Yin
    Efficient Software Implementation for Finite Field Multiplication in Normal Basis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:177-188 [Conf]
  21. Lei Fang, Wenliang Du, Peng Ning
    A beacon-less location discovery scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:161-171 [Conf]
  22. Wenliang Du, Lei Fang, Peng Ning
    LAD: Localization Anomaly Detection forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  23. Donggang Liu, Peng Ning, Wenliang Du
    Attack-resistant location estimation in sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:99-106 [Conf]
  24. Yan Zhai, Peng Ning, Jun Xu
    Integrating IDS Alert Correlation and OS-Level Dependency Tracking. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:272-284 [Conf]
  25. Qinglin Jiang, Douglas S. Reeves, Peng Ning
    Certificate Recommendations to Improve the Robustness of Web of Trust. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:292-303 [Conf]
  26. Pan Wang, Peng Ning, Douglas S. Reeves
    Storage-Efficient Stateless Group Key Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:25-38 [Conf]
  27. Wenliang Du, Ronghua Wang, Peng Ning
    An efficient scheme for authenticating public keys in sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:58-67 [Conf]
  28. Pan Wang, Douglas S. Reeves, Peng Ning
    Secure Address Auto-con.guration for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:519-522 [Conf]
  29. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia
    Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:118-132 [Conf]
  30. Donggang Liu, Peng Ning
    Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  31. Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant
    Building Attack Scenarios through Integration of Complementary Alert Correlation Method. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  32. Peng Ning, Yun Cui, Douglas S. Reeves
    Analyzing Intensive Intrusion Alerts via Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:74-94 [Conf]
  33. Donggang Liu, Peng Ning
    Location-based pairwise key establishments for static sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:72-82 [Conf]
  34. Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    CARDS: A Distributed System for Detecting Coordinated Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:171-180 [Conf]
  35. Pai Peng, Peng Ning, Douglas S. Reeves
    On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:334-349 [Conf]
  36. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf]
  37. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering Calendar-based Temporal Association Rules. [Citation Graph (0, 0)][DBLP]
    TIME, 2001, pp:111-118 [Conf]
  38. Peng Ning, Kun Sun
    How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2005, v:3, n:6, pp:795-819 [Journal]
  39. Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    An Algebraic Representation of Calendars. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2002, v:36, n:1-2, pp:5-38 [Journal]
  40. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
    Design and implementation of a decentralized prototype system for detecting distributed attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1374-1391 [Journal]
  41. Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Modeling requests among cooperating intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1702-1715 [Journal]
  42. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering calendar-based temporal association rules. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2003, v:44, n:2, pp:193-218 [Journal]
  43. Peng Liu, Peng Ning, Sushil Jajodia
    Avoiding loss of fairness owing to failures in fair data exchange systems. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2001, v:31, n:3, pp:337-350 [Journal]
  44. Wenliang Du, Lei Fang, Peng Ning
    LAD: Localization anomaly detection for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:7, pp:874-886 [Journal]
  45. Kun Sun, Peng Ning, Cliff Wang
    Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:177-189 [Journal]
  46. Donggang Liu, Peng Ning
    Multilevel µTESLA: Broadcast authentication for distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:4, pp:800-836 [Journal]
  47. Donggang Liu, Peng Ning, Rongfang Li
    Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:41-77 [Journal]
  48. Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu
    Techniques and tools for analyzing intrusion alerts. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:274-318 [Journal]
  49. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
    Abstraction-based intrusion detection in distributed environments. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:407-452 [Journal]
  50. Peng Ning, Dingbang Xu
    Hypothesizing and reasoning about attacks missed by intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:591-627 [Journal]
  51. Donggang Liu, Peng Ning
    Improving key predistribution with deployment knowledge in static sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2005, v:1, n:2, pp:204-239 [Journal]
  52. Kun Sun, Pai Peng, Peng Ning, Cliff Wang
    Secure Distributed Cluster Formation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:131-140 [Conf]
  53. Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning
    Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:339-348 [Conf]
  54. Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning
    Tracing Traffic through Intermediate Hosts that Repacketize Flows. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:634-642 [Conf]
  55. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2007, v:3, n:3, pp:- [Journal]

  56. Automated Security Debugging Using Program Structural Constraints. [Citation Graph (, )][DBLP]


  57. BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. [Citation Graph (, )][DBLP]


  58. HIMA: A Hypervisor-Based Integrity Measurement Agent. [Citation Graph (, )][DBLP]


  59. Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP]


  60. Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]


  61. False data injection attacks against state estimation in electric power grids. [Citation Graph (, )][DBLP]


  62. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. [Citation Graph (, )][DBLP]


  63. Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  64. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. [Citation Graph (, )][DBLP]


  65. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  66. Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. [Citation Graph (, )][DBLP]


  67. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  68. Containing denial-of-service attacks in broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]


  69. Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  70. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. [Citation Graph (, )][DBLP]


  71. Group-based key pre-distribution in wireless sensor networks. [Citation Graph (, )][DBLP]


  72. Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]


  73. Securing network access in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.060secs, Finished in 0.065secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002