dblp.uni-trier.dewww.uni-trier.de

Peng Ning

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
79EEKun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan: Securing network access in wireless sensor networks. WISEC 2009: 261-268
2008
78 Peng Ning, Paul F. Syverson, Somesh Jha: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 ACM 2008
77EEAn Liu, Peng Ning: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256
76EESangwon Hyun, Peng Ning, An Liu, Wenliang Du: Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456
75EEAn Liu, Young-Hyun Oh, Peng Ning: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562
74EEQi Dong, Donggang Liu, Peng Ning: Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. WISEC 2008: 2-12
73EEQing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
72EEDonggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du: Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008)
71EEPeng Ning, An Liu, Wenliang Du: Mitigating DoS attacks against broadcast authentication in wireless sensor networks. TOSN 4(1): (2008)
70EEDonggang Liu, Peng Ning, Wenliang Du: Group-based key predistribution for wireless sensor networks. TOSN 4(2): (2008)
2007
69 Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 ACM 2007
68 Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007
67 Peng Ning, Vijay Atluri: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
66 Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
65 Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007
64 Peng Ning, Ernesto Damiani, Seth Proctor: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
63EEEmre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu: Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2007: 562-572
62EEChongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang: Automated Security Debugging Using Program Structural Constraints. ACSAC 2007: 453-462
61EEQinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12
60EEPan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56
59EEYoung June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642
58EERonghua Wang, Wenliang Du, Peng Ning: Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc 2007: 71-79
57EETong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty: Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. MobiQuitous 2007: 1-8
56EESencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007)
2006
55 Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006
54EEKun Sun, Peng Ning, Cliff Wang: TinySeRSync: secure and resilient time synchronization in wireless sensor networks. ACM Conference on Computer and Communications Security 2006: 264-277
53EEKun Sun, Pai Peng, Peng Ning, Cliff Wang: Secure Distributed Cluster Formation in Wireless Sensor Networks. ACSAC 2006: 131-140
52EEChongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning: Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. ACSAC 2006: 339-348
51EEPai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349
50EEYan Zhai, Peng Ning, Jun Xu: Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284
49EEKun Sun, Peng Ning, Cliff Wang: Secure and resilient clock synchronization in wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2): 395-408 (2006)
48EEWenliang Du, Lei Fang, Peng Ning: LAD: Localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. 66(7): 874-886 (2006)
2005
47 Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005
46EEJun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt: Automatic diagnosis and response to memory corruption vulnerabilities. ACM Conference on Computer and Communications Security 2005: 223-234
45EEDingbang Xu, Peng Ning: Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. ACSAC 2005: 537-546
44EEDonggang Liu, Peng Ning, Wenliang Du: Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. ICDCS 2005: 609-619
43EEPai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113
42EEQinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191
41EEPan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362
40EELei Fang, Wenliang Du, Peng Ning: A beacon-less location discovery scheme for wireless sensor networks. INFOCOM 2005: 161-171
39EEWenliang Du, Lei Fang, Peng Ning: LAD: Localization Anomaly Detection forWireless Sensor Networks. IPDPS 2005
38EEDonggang Liu, Peng Ning, Wenliang Du: Attack-resistant location estimation in sensor networks. IPSN 2005: 99-106
37EEWenliang Du, Ronghua Wang, Peng Ning: An efficient scheme for authenticating public keys in sensor networks. MobiHoc 2005: 58-67
36EEDonggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
35EEPan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522
34EEDonggang Liu, Peng Ning, Wenliang Du: Group-based key pre-distribution in wireless sensor networks. Workshop on Wireless Security 2005: 11-20
33EEDonggang Liu, Peng Ning, Rongfang Li: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005)
32EEPeng Ning, Kun Sun: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks 3(6): 795-819 (2005)
31EEKun Sun, Peng Ning, Cliff Wang: Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. IEEE Trans. Dependable Sec. Comput. 2(3): 177-189 (2005)
30EEDonggang Liu, Peng Ning: Improving key predistribution with deployment knowledge in static sensor networks. TOSN 1(2): 204-239 (2005)
2004
29EEDingbang Xu, Peng Ning: Alert Correlation through Triggering Events and Common Resources. ACSAC 2004: 360-369
28EEYan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48
27EEQinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207
26EESencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271
25EEPan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38
24EEQinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303
23EEPeng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant: Building Attack Scenarios through Integration of Complementary Alert Correlation Method. NDSS 2004
22EEDonggang Liu, Peng Ning: Multilevel µTESLA: Broadcast authentication for distributed sensor networks. ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004)
21EEPeng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004)
20EEPeng Ning, Dingbang Xu: Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004)
2003
19EEPeng Ning, Dingbang Xu: Learning attack strategies from intrusion alerts. ACM Conference on Computer and Communications Security 2003: 200-209
18EEDonggang Liu, Peng Ning, Kun Sun: Efficient self-healing group key distribution with revocation capability. ACM Conference on Computer and Communications Security 2003: 231-240
17EEDonggang Liu, Peng Ning: Establishing pairwise keys in distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 52-61
16 Peng Ning, Dingbang Xu: Adapting Query Optimization Techniques for Efficient Alert Correlation. DBSec 2003: 75-88
15 Peng Ning, Kun Sun: How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols. IAW 2003: 60-67
14EEDonggang Liu, Peng Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. NDSS 2003
13EEDonggang Liu, Peng Ning: Location-based pairwise key establishments for static sensor networks. SASN 2003: 72-82
12 Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
2002
11EEPeng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254
10EEPeng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94
9 Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002)
8EEPeng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002)
2001
7EEPeng Ning, Yiqun Lisa Yin: Efficient Software Implementation for Finite Field Multiplication in Normal Basis. ICICS 2001: 177-188
6EEYingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118
5EEPeng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001)
4EEPeng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
2000
3EEPeng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
2 Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
1EEPeng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000)

Coauthor Index

1Robert St. Amant [23]
2Vijayalakshmi Atluri (Vijay Atluri) [47] [65] [66] [67]
3Christopher Bookholt [46] [52]
4Krishnendu Chakrabarty [57]
5Romit Roy Choudhury [57]
6Yun Cui [10] [11] [21]
7Ernesto Damiani [64]
8Qi Dong [74]
9Wenliang Du [34] [37] [38] [39] [40] [44] [47] [48] [58] [70] [71] [72] [76]
10Lei Fang [39] [40] [48]
11Virgil D. Gligor [66]
12Christopher G. Healey [23]
13Sangwon Hyun [76]
14Purush Iyer [28]
15S. Purushothaman Iyer (S. Purushothaman) [61]
16Sushil Jajodia [1] [2] [3] [4] [5] [6] [8] [9] [12] [26] [36] [56]
17Somesh Jha [78]
18Qinglin Jiang [24] [27]
19Jinsuk Jun [52]
20Chongkyung Kil [46] [52] [62] [63]
21Ninghui Li [55]
22Rongfang Li [33]
23Yingjiu Li [6] [12]
24An Liu [71] [72] [75] [76] [77] [79]
25Donggang Liu [13] [14] [17] [18] [22] [30] [33] [34] [36] [38] [44] [70] [72] [74]
26Peng Liu [3] [4]
27Heiko Mantel [66]
28W. Douglas Maughan [79]
29Young-Hyun Oh [75]
30Young Hee Park [59]
31Pai Peng [43] [51] [53]
32Seth Proctor [64]
33Young June Pyun [59]
34Sihan Qing [55]
35Douglas S. Reeves [10] [11] [21] [24] [25] [27] [28] [35] [41] [42] [43] [51] [59] [60] [61]
36Sanjeev Setia [26] [56]
37Emre Can Sezer [62] [63]
38Kun Sun [15] [18] [31] [32] [49] [53] [54] [79]
39Paul F. Syverson [69] [78]
40Sabrina De Capitani di Vimercati [69]
41Cliff Wang [31] [49] [53] [54] [72]
42Pan Wang [25] [35] [41] [42] [60]
43Ronghua Wang [37] [58]
44Xiaoyang Sean Wang [1] [2] [5] [6] [8] [9] [12]
45Xinyuan Wang [43] [59]
46Dingbang Xu [16] [19] [20] [21] [23] [29] [45]
47Jun Xu [46] [50] [52] [63]
48Roger Xu [79]
49Shouhuai Xu [65]
50Jiahai Yang [2]
51Yiqun Lisa Yin [7]
52Ting Yu [68] [73]
53Moti Yung (Mordechai M. Yung) [65]
54Yan Zhai [28] [46] [50]
55Qing Zhang [73]
56Qinghua Zhang [42] [61]
57Xiaolan Zhang (Xiaolan (Catherine) Zhang) [62]
58Tong Zhou [57]
59Sencun Zhu [26] [36] [56]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)