Search the dblp DataBase
Peng Ning :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dingbang Xu , Peng Ning Alert Correlation through Triggering Events and Common Resources. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:360-369 [Conf ] Dingbang Xu , Peng Ning Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:537-546 [Conf ] Yan Zhai , Peng Ning , Purush Iyer , Douglas S. Reeves Reasoning About Complementary Intrusion Evidence. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:39-48 [Conf ] Donggang Liu , Peng Ning Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:52-61 [Conf ] Donggang Liu , Peng Ning , Kun Sun Efficient self-healing group key distribution with revocation capability. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:231-240 [Conf ] Peng Ning , Yun Cui , Douglas S. Reeves Constructing attack scenarios through correlation of intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:245-254 [Conf ] Peng Ning , Dingbang Xu Learning attack strategies from intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:200-209 [Conf ] Jun Xu , Peng Ning , Chongkyung Kil , Yan Zhai , Christopher Bookholt Automatic diagnosis and response to memory corruption vulnerabilities. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:223-234 [Conf ] Qinghua Zhang , Douglas S. Reeves , Peng Ning , S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:4-12 [Conf ] Kun Sun , Peng Ning , Cliff Wang TinySeRSync: secure and resilient time synchronization in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:264-277 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves A k -anonymous communication protocol for overlay networks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:45-56 [Conf ] Qinglin Jiang , Douglas S. Reeves , Peng Ning Improving Robustness of PGP Keyrings by Conflict Detection. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:194-207 [Conf ] Peng Ning , Dingbang Xu Adapting Query Optimization Techniques for Efficient Alert Correlation. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:75-88 [Conf ] Peng Liu , Peng Ning , Sushil Jajodia Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:631-640 [Conf ] Peng Ning , Kun Sun How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:60-67 [Conf ] Donggang Liu , Peng Ning , Wenliang Du Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2005, pp:609-619 [Conf ] Pai Peng , Peng Ning , Douglas S. Reeves , Xinyuan Wang Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:107-113 [Conf ] Qinghua Zhang , Pan Wang , Douglas S. Reeves , Peng Ning Defending against Sybil Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:185-191 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves Network Access Control for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:350-362 [Conf ] Peng Ning , Yiqun Lisa Yin Efficient Software Implementation for Finite Field Multiplication in Normal Basis. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:177-188 [Conf ] Lei Fang , Wenliang Du , Peng Ning A beacon-less location discovery scheme for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:161-171 [Conf ] Wenliang Du , Lei Fang , Peng Ning LAD: Localization Anomaly Detection forWireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Donggang Liu , Peng Ning , Wenliang Du Attack-resistant location estimation in sensor networks. [Citation Graph (0, 0)][DBLP ] IPSN, 2005, pp:99-106 [Conf ] Yan Zhai , Peng Ning , Jun Xu Integrating IDS Alert Correlation and OS-Level Dependency Tracking. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:272-284 [Conf ] Qinglin Jiang , Douglas S. Reeves , Peng Ning Certificate Recommendations to Improve the Robustness of Web of Trust. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:292-303 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves Storage-Efficient Stateless Group Key Revocation. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:25-38 [Conf ] Wenliang Du , Ronghua Wang , Peng Ning An efficient scheme for authenticating public keys in sensor networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2005, pp:58-67 [Conf ] Pan Wang , Douglas S. Reeves , Peng Ning Secure Address Auto-con.guration for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:519-522 [Conf ] Donggang Liu , Peng Ning , Sencun Zhu , Sushil Jajodia Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:118-132 [Conf ] Donggang Liu , Peng Ning Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Peng Ning , Dingbang Xu , Christopher G. Healey , Robert St. Amant Building Attack Scenarios through Integration of Complementary Alert Correlation Method. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Peng Ning , Yun Cui , Douglas S. Reeves Analyzing Intensive Intrusion Alerts via Correlation. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:74-94 [Conf ] Donggang Liu , Peng Ning Location-based pairwise key establishments for static sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:72-82 [Conf ] Jiahai Yang , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia CARDS: A Distributed System for Detecting Coordinated Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:171-180 [Conf ] Pai Peng , Peng Ning , Douglas S. Reeves On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:334-349 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf ] Yingjiu Li , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Discovering Calendar-based Temporal Association Rules. [Citation Graph (0, 0)][DBLP ] TIME, 2001, pp:111-118 [Conf ] Peng Ning , Kun Sun How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2005, v:3, n:6, pp:795-819 [Journal ] Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia An Algebraic Representation of Calendars. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2002, v:36, n:1-2, pp:5-38 [Journal ] Peng Ning , Sushil Jajodia , Xiaoyang Sean Wang Design and implementation of a decentralized prototype system for detecting distributed attacks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2002, v:25, n:15, pp:1374-1391 [Journal ] Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Modeling requests among cooperating intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1702-1715 [Journal ] Yingjiu Li , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Discovering calendar-based temporal association rules. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2003, v:44, n:2, pp:193-218 [Journal ] Peng Liu , Peng Ning , Sushil Jajodia Avoiding loss of fairness owing to failures in fair data exchange systems. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2001, v:31, n:3, pp:337-350 [Journal ] Wenliang Du , Lei Fang , Peng Ning LAD: Localization anomaly detection for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2006, v:66, n:7, pp:874-886 [Journal ] Kun Sun , Peng Ning , Cliff Wang Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:177-189 [Journal ] Donggang Liu , Peng Ning Multilevel µTESLA: Broadcast authentication for distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:4, pp:800-836 [Journal ] Donggang Liu , Peng Ning , Rongfang Li Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:41-77 [Journal ] Peng Ning , Yun Cui , Douglas S. Reeves , Dingbang Xu Techniques and tools for analyzing intrusion alerts. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:274-318 [Journal ] Peng Ning , Sushil Jajodia , Xiaoyang Sean Wang Abstraction-based intrusion detection in distributed environments. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:407-452 [Journal ] Peng Ning , Dingbang Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:591-627 [Journal ] Donggang Liu , Peng Ning Improving key predistribution with deployment knowledge in static sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2005, v:1, n:2, pp:204-239 [Journal ] Kun Sun , Pai Peng , Peng Ning , Cliff Wang Secure Distributed Cluster Formation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:131-140 [Conf ] Chongkyung Kil , Jinsuk Jun , Christopher Bookholt , Jun Xu , Peng Ning Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:339-348 [Conf ] Young June Pyun , Young Hee Park , Xinyuan Wang , Douglas S. Reeves , Peng Ning Tracing Traffic through Intermediate Hosts that Repacketize Flows. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:634-642 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2007, v:3, n:3, pp:- [Journal ] Automated Security Debugging Using Program Structural Constraints. [Citation Graph (, )][DBLP ] BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. [Citation Graph (, )][DBLP ] HIMA: A Hypervisor-Based Integrity Measurement Agent. [Citation Graph (, )][DBLP ] Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. [Citation Graph (, )][DBLP ] Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP ] False data injection attacks against state estimation in electric power grids. [Citation Graph (, )][DBLP ] Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. [Citation Graph (, )][DBLP ] Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. [Citation Graph (, )][DBLP ] TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. [Citation Graph (, )][DBLP ] Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Containing denial-of-service attacks in broadcast authentication in sensor networks. [Citation Graph (, )][DBLP ] Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP ] Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. [Citation Graph (, )][DBLP ] Group-based key pre-distribution in wireless sensor networks. [Citation Graph (, )][DBLP ] Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. [Citation Graph (, )][DBLP ] Securing network access in wireless sensor networks. [Citation Graph (, )][DBLP ] Search in 0.121secs, Finished in 0.124secs