Peng Ning
Title
Cited by
Cited by
Year
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li
ACM Transactions on Information and System Security (TISSEC) 8 (1), 41-77, 2005
24552005
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
22102011
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
A Liu, P Ning
2008 International Conference on Information Processing in Sensor Networks …, 2008
10572008
Location-based pairwise key establishments for static sensor networks
D Liu, P Ning
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
7662003
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
7652004
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
7652002
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
7142012
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D Liu, P Ning
ACM Transactions on Embedded Computing Systems (TECS) 3 (4), 800-836, 2004
5062004
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4232013
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
3742004
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008
3722008
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
3612005
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3612003
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3512013
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3492010
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
P Ning, K Sun
Ad Hoc Networks 3 (6), 795-819, 2005
3272005
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
3262009
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
D Liu, P Ning
North Carolina State University. Dept. of Computer Science, 2002
3252002
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
C Kil, J Jun, C Bookholt, J Xu, P Ning
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 339-348, 2006
3022006
Lad: Localization anomaly detection for wireless sensor networks
W Du, L Fang, P Ningi
19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005
2812005
The system can't perform the operation now. Try again later.
Articles 1–20