Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Peng Ning
2010 – today
- 2013
[j34]Qi Dong, Donggang Liu, Peng Ning: Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Trans. Embedded Comput. Syst. 12(3): 73 (2013)
[j33]Xiaofan He, Huaiyu Dai, Peng Ning: A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check. IEEE Transactions on Wireless Communications 12(5): 2512-2523 (2013)
[c82]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning: Is link signature dependable for wireless security? INFOCOM 2013: 200-204
[c81]
[c80]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai: Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. IEEE Symposium on Security and Privacy 2013: 174-188- 2012
[j32]Mihui Kim, Varagur Karthik Sriram Iyer, Peng Ning: MrFair: Misbehavior-resistant fair scheduling in wireless mesh networks. Ad Hoc Networks 10(3): 299-316 (2012)
[j31]Attila Altay Yavuz, Peng Ning: Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks. Ad Hoc Networks 10(7): 1204-1220 (2012)
[j30]Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning: Interval-based flow watermarking for tracing interactive traffic. Computer Networks 56(5): 1646-1665 (2012)
[j29]Liang Xiao, Huaiyu Dai, Peng Ning: Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping. IEEE Transactions on Information Forensics and Security 7(1): 297-309 (2012)
[j28]Attila Altay Yavuz, Peng Ning, Michael K. Reiter: BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9 (2012)
[j27]Kaiqi Xiong, Ronghua Wang, Wenliang Du, Peng Ning: Containing bogus packet insertion attacks for broadcast authentication in sensor networks. TOSN 8(3): 20 (2012)
[j26]Chengzhi Li, Huaiyu Dai, Liang Xiao, Peng Ning: Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks. IEEE Transactions on Signal Processing 60(10): 5281-5292 (2012)
[c79]Jason Gionta, Peng Ning, Xiaolan Zhang: iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. ACNS 2012: 381-399
[c78]Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning: Detecting repackaged smartphone applications in third-party android marketplaces. CODASPY 2012: 317-326
[c77]Attila Altay Yavuz, Peng Ning, Michael K. Reiter: Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163
[c76]Yao Liu, Peng Ning: BitTrickle: Defending against broadband and high-power reactive jamming attacks. INFOCOM 2012: 909-917
[c75]Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson: NSDMiner: Automated discovery of Network Service Dependencies. INFOCOM 2012: 2507-2515
[c74]Yao Liu, Peng Ning: Enhanced wireless channel authentication using time-synched link signature. INFOCOM 2012: 2636-2640
[c73]Xiaofan He, Huaiyu Dai, Peng Ning: A Byzantine attack defender: The Conditional Frequency Check. ISIT 2012: 975-979- 2011
[j25]Mihui Kim, Peng Ning: SeCA: A framework for Secure Channel Assignment in wireless mesh networks. Computer Communications 34(4): 567-576 (2011)
[j24]Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty: P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 29(3): 582-594 (2011)
[j23]Yao Liu, Peng Ning, Michael K. Reiter: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13 (2011)
[j22]Hairong Qi, Xiaorui Wang, Leon M. Tolbert, Fangxing Li, Fang Z. Peng, Peng Ning, Massoud Amin: A Resilient Real-Time System Design for a Secure and Reconfigurable Power Grid. IEEE Trans. Smart Grid 2(4): 770-781 (2011)
[c72]Ahmed M. Azab, Peng Ning, Xiaolan Zhang: SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. ACM Conference on Computer and Communications Security 2011: 375-388
[c71]Yao Liu, Peng Ning: Poster: mimicry attacks against wireless link signature. ACM Conference on Computer and Communications Security 2011: 801-804
[c70]Liang Xiao, Huaiyu Dai, Peng Ning: Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks. GLOBECOM 2011: 1-6
[c69]Liang Xiao, Huaiyu Dai, Peng Ning: Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks. GLOBECOM 2011: 1-6
[c68]Sangwon Hyun, Peng Ning, An Liu: Mitigating Wireless Jamming Attacks via Channel Migration. ICDCS Workshops 2011: 313-322
[c67]
[c66]Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning: On the Expressiveness of Return-into-libc Attacks. RAID 2011: 121-141
[r2]Sangwon Hyun, Peng Ning: Secure Code Dissemination in Wireless Sensor Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1099-1102
[r1]Kun Sun, Peng Ning: Secure Time Synchronization. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1139-1140- 2010
[c65]An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang: Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ACSAC 2010: 367-376
[c64]Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, Ruowen Wang, Vasanth Bala: Always up-to-date: scalable offline patching of VM images in a compute cloud. ACSAC 2010: 377-386
[c63]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky: HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. ACM Conference on Computer and Communications Security 2010: 38-49
[c62]Yao Liu, Peng Ning, Huaiyu Dai, An Liu: Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. INFOCOM 2010: 695-703
[c61]An Liu, Peng Ning, Huaiyu Dai, Yao Liu: USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure. MASS 2010: 41-50
[c60]Yao Liu, Peng Ning, Huaiyu Dai: Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. IEEE Symposium on Security and Privacy 2010: 286-301
[p5]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen: Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13
[p4]Emre Can Sezer, Chongkyung Kil, Peng Ning: Automated Software Vulnerability Analysis. Cyber Situational Awareness 2010: 201-223
2000 – 2009
- 2009
[j21]Ronghua Wang, Wenliang Du, Xiaogang Liu, Peng Ning: ShortPK: A short-term public key scheme for broadcast authentication in sensor networks. TOSN 6(1) (2009)
[c59]Attila Altay Yavuz, Peng Ning: BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. ACSAC 2009: 219-228
[c58]Ahmed M. Azab, Peng Ning, Emre Can Sezer, Xiaolan Zhang: HIMA: A Hypervisor-Based Integrity Measurement Agent. ACSAC 2009: 461-470
[c57]Yao Liu, Michael K. Reiter, Peng Ning: False data injection attacks against state estimation in electric power grids. ACM Conference on Computer and Communications Security 2009: 21-32
[c56]Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning: Managing security of virtual machine images in a cloud environment. CCSW 2009: 91-96
[c55]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning: Countering kernel rootkits with lightweight hook protection. ACM Conference on Computer and Communications Security 2009: 545-554
[c54]Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang: Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. DSN 2009: 115-124
[c53]An Liu, Peng Ning, Chun Wang: Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250
[c52]Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan: Securing network access in wireless sensor networks. WISEC 2009: 261-268
[e10]Michael Backes, Peng Ning (Eds.): Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings. Lecture Notes in Computer Science 5789, Springer 2009, ISBN 978-3-642-04443-4- 2008
[j20]Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3) (2008)
[j19]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4) (2008)
[j18]Peng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1) (2008)
[j17]Donggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2) (2008)
[c51]
[c50]Sangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456
[c49]An Liu, Young-Hyun Oh, Peng Ning: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562
[c48]Qi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12
[e9]Peng Ning, Paul F. Syverson, Somesh Jha (Eds.): Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. ACM 2008, ISBN 978-1-59593-810-7- 2007
[b2]Donggang Liu, Peng Ning: Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209
[j16]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3) (2007)
[c47]Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462
[c46]Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12
[c45]Pan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56
[c44]Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572
[c43]Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642
[c42]Ronghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79
[c41]Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty: Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8
[p3]Lei Fang, Wenliang Du, Peng Ning: A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 33-55
[p2]Peng Ning, Donggang Liu, Wenliang Du: Secure and Resilient Localization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 161-184
[p1]Kun Sun, Peng Ning, Cliff Wang: Secure and Resilient Time Synchronization in Wireless Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 347-367
[e8]Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson (Eds.): Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM 2007, ISBN 978-1-59593-703-2
[e7]Peng Ning, Vijay Atluri (Eds.): Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-890-9
[e6]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel (Eds.): Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9
[e5]Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung (Eds.): Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-888-6
[e4]Peng Ning, Ernesto Damiani, Seth Proctor (Eds.): Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-892-3
[e3]- 2006
[j15]Wenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006)
[j14]Kun Sun, Peng Ning, Cliff Wang: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 395-408 (2006)
[c40]Kun Sun, Pai Peng, Peng Ning, Cliff Wang: Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140
[c39]Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348
[c38]Kun Sun, Peng Ning, Cliff Wang: TinySeRSync: secure and resilient time synchronization in wireless sensor networks. ACM Conference on Computer and Communications Security 2006: 264-277
[c37]
[c36]Dingbang Xu, Peng Ning: A Flexible Approach to Intrusion Alert Anonymization and Correlation. SecureComm 2006: 1-10
[c35]Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Sensor Networks. SecureComm 2006: 1-10
[c34]Pai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349
[e2]Peng Ning, Sihan Qing, Ninghui Li (Eds.): Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings. Lecture Notes in Computer Science 4307, Springer 2006, ISBN 3-540-49496-0- 2005
[j13]Peng Ning, Kun Sun: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005)
[j12]Kun Sun, Peng Ning, Cliff Wang: Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 177-189 (2005)
[j11]Donggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005)
[j10]Donggang Liu, Peng Ning: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 1(2): 204-239 (2005)
[c33]Dingbang Xu, Peng Ning: Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ACSAC 2005: 537-546
[c32]Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234
[c31]Donggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619
[c30]Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113
[c29]Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191
[c28]Pan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362
[c27]Lei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171
[c26]Wenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005
[c25]Donggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106
[c24]Wenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67
[c23]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
[c22]Pan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522
[c21]Donggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20
[e1]Vijay Atluri, Peng Ning, Wenliang Du (Eds.): Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-227-5- 2004
[j9]Donggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004)
[j8]Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004)
[j7]Peng Ning, Dingbang Xu: Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004)
[c20]Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48
[c19]Dingbang Xu, Peng Ning: Alert Correlation through Triggering Events and Common Resources. ACSAC 2004: 360-369
[c18]Qinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207
[c17]Pan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38
[c16]Qinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303
[c15]Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant: Building Attack Scenarios through Integration of Complementary Alert Correlation Method. NDSS 2004
[c14]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271- 2003
[b1]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112
[j6]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
[c13]Donggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61
[c12]Peng Ning, Dingbang Xu: Learning attack strategies from intrusion alerts. ACM Conference on Computer and Communications Security 2003: 200-209
[c11]Donggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240
[c10]Peng Ning, Dingbang Xu: Adapting Query Optimization Techniques for Efficient Alert Correlation. DBSec 2003: 75-88
[c9]
[c8]Donggang Liu, Peng Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003
[c7]Donggang Liu, Peng Ning: Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82- 2002
[j5]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002)
[j4]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002)
[c6]Peng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254
[c5]Peng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94- 2001
[j3]Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
[j2]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001)
[c4]Peng Ning, Yiqun Lisa Yin: Efficient Software Implementation for Finite Field Multiplication in Normal Basis. ICICS 2001: 177-188
[c3]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118- 2000
[j1]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000)
[c2]Peng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
[c1]Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:21 CEST by the dblp team



