2009 |
79 | EE | Kun Sun,
An Liu,
Roger Xu,
Peng Ning,
W. Douglas Maughan:
Securing network access in wireless sensor networks.
WISEC 2009: 261-268 |
2008 |
78 | | Peng Ning,
Paul F. Syverson,
Somesh Jha:
Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008
ACM 2008 |
77 | EE | An Liu,
Peng Ning:
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks.
IPSN 2008: 245-256 |
76 | EE | Sangwon Hyun,
Peng Ning,
An Liu,
Wenliang Du:
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks.
IPSN 2008: 445-456 |
75 | EE | An Liu,
Young-Hyun Oh,
Peng Ning:
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge.
IPSN 2008: 561-562 |
74 | EE | Qi Dong,
Donggang Liu,
Peng Ning:
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks.
WISEC 2008: 2-12 |
73 | EE | Qing Zhang,
Ting Yu,
Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
72 | EE | Donggang Liu,
Peng Ning,
An Liu,
Cliff Wang,
Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur. 11(4): (2008) |
71 | EE | Peng Ning,
An Liu,
Wenliang Du:
Mitigating DoS attacks against broadcast authentication in wireless sensor networks.
TOSN 4(1): (2008) |
70 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Group-based key predistribution for wireless sensor networks.
TOSN 4(2): (2008) |
2007 |
69 | | Peng Ning,
Sabrina De Capitani di Vimercati,
Paul F. Syverson:
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007
ACM 2007 |
68 | | Peng Ning,
Ting Yu:
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007
ACM 2007 |
67 | | Peng Ning,
Vijay Atluri:
Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007
ACM 2007 |
66 | | Peng Ning,
Vijay Atluri,
Virgil D. Gligor,
Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007
ACM 2007 |
65 | | Peng Ning,
Vijay Atluri,
Shouhuai Xu,
Moti Yung:
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007
ACM 2007 |
64 | | Peng Ning,
Ernesto Damiani,
Seth Proctor:
Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007
ACM 2007 |
63 | EE | Emre Can Sezer,
Peng Ning,
Chongkyung Kil,
Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
ACM Conference on Computer and Communications Security 2007: 562-572 |
62 | EE | Chongkyung Kil,
Emre Can Sezer,
Peng Ning,
Xiaolan Zhang:
Automated Security Debugging Using Program Structural Constraints.
ACSAC 2007: 453-462 |
61 | EE | Qinghua Zhang,
Douglas S. Reeves,
Peng Ning,
S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code.
ASIACCS 2007: 4-12 |
60 | EE | Pan Wang,
Peng Ning,
Douglas S. Reeves:
A k-anonymous communication protocol for overlay networks.
ASIACCS 2007: 45-56 |
59 | EE | Young June Pyun,
Young Hee Park,
Xinyuan Wang,
Douglas S. Reeves,
Peng Ning:
Tracing Traffic through Intermediate Hosts that Repacketize Flows.
INFOCOM 2007: 634-642 |
58 | EE | Ronghua Wang,
Wenliang Du,
Peng Ning:
Containing denial-of-service attacks in broadcast authentication in sensor networks.
MobiHoc 2007: 71-79 |
57 | EE | Tong Zhou,
Romit Roy Choudhury,
Peng Ning,
Krishnendu Chakrabarty:
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks.
MobiQuitous 2007: 1-8 |
56 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia,
Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
TOSN 3(3): (2007) |
2006 |
55 | | Peng Ning,
Sihan Qing,
Ninghui Li:
Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Springer 2006 |
54 | EE | Kun Sun,
Peng Ning,
Cliff Wang:
TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
ACM Conference on Computer and Communications Security 2006: 264-277 |
53 | EE | Kun Sun,
Pai Peng,
Peng Ning,
Cliff Wang:
Secure Distributed Cluster Formation in Wireless Sensor Networks.
ACSAC 2006: 131-140 |
52 | EE | Chongkyung Kil,
Jinsuk Jun,
Christopher Bookholt,
Jun Xu,
Peng Ning:
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
ACSAC 2006: 339-348 |
51 | EE | Pai Peng,
Peng Ning,
Douglas S. Reeves:
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
IEEE Symposium on Security and Privacy 2006: 334-349 |
50 | EE | Yan Zhai,
Peng Ning,
Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
ISI 2006: 272-284 |
49 | EE | Kun Sun,
Peng Ning,
Cliff Wang:
Secure and resilient clock synchronization in wireless sensor networks.
IEEE Journal on Selected Areas in Communications 24(2): 395-408 (2006) |
48 | EE | Wenliang Du,
Lei Fang,
Peng Ning:
LAD: Localization anomaly detection for wireless sensor networks.
J. Parallel Distrib. Comput. 66(7): 874-886 (2006) |
2005 |
47 | | Vijay Atluri,
Peng Ning,
Wenliang Du:
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005
ACM 2005 |
46 | EE | Jun Xu,
Peng Ning,
Chongkyung Kil,
Yan Zhai,
Christopher Bookholt:
Automatic diagnosis and response to memory corruption vulnerabilities.
ACM Conference on Computer and Communications Security 2005: 223-234 |
45 | EE | Dingbang Xu,
Peng Ning:
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach.
ACSAC 2005: 537-546 |
44 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks.
ICDCS 2005: 609-619 |
43 | EE | Pai Peng,
Peng Ning,
Douglas S. Reeves,
Xinyuan Wang:
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets.
ICDCS Workshops 2005: 107-113 |
42 | EE | Qinghua Zhang,
Pan Wang,
Douglas S. Reeves,
Peng Ning:
Defending against Sybil Attacks in Sensor Networks.
ICDCS Workshops 2005: 185-191 |
41 | EE | Pan Wang,
Peng Ning,
Douglas S. Reeves:
Network Access Control for Mobile Ad-Hoc Networks.
ICICS 2005: 350-362 |
40 | EE | Lei Fang,
Wenliang Du,
Peng Ning:
A beacon-less location discovery scheme for wireless sensor networks.
INFOCOM 2005: 161-171 |
39 | EE | Wenliang Du,
Lei Fang,
Peng Ning:
LAD: Localization Anomaly Detection forWireless Sensor Networks.
IPDPS 2005 |
38 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Attack-resistant location estimation in sensor networks.
IPSN 2005: 99-106 |
37 | EE | Wenliang Du,
Ronghua Wang,
Peng Ning:
An efficient scheme for authenticating public keys in sensor networks.
MobiHoc 2005: 58-67 |
36 | EE | Donggang Liu,
Peng Ning,
Sencun Zhu,
Sushil Jajodia:
Practical Broadcast Authentication in Sensor Networks.
MobiQuitous 2005: 118-132 |
35 | EE | Pan Wang,
Douglas S. Reeves,
Peng Ning:
Secure Address Auto-con.guration for Mobile Ad Hoc Networks.
MobiQuitous 2005: 519-522 |
34 | EE | Donggang Liu,
Peng Ning,
Wenliang Du:
Group-based key pre-distribution in wireless sensor networks.
Workshop on Wireless Security 2005: 11-20 |
33 | EE | Donggang Liu,
Peng Ning,
Rongfang Li:
Establishing pairwise keys in distributed sensor networks.
ACM Trans. Inf. Syst. Secur. 8(1): 41-77 (2005) |
32 | EE | Peng Ning,
Kun Sun:
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols.
Ad Hoc Networks 3(6): 795-819 (2005) |
31 | EE | Kun Sun,
Peng Ning,
Cliff Wang:
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput. 2(3): 177-189 (2005) |
30 | EE | Donggang Liu,
Peng Ning:
Improving key predistribution with deployment knowledge in static sensor networks.
TOSN 1(2): 204-239 (2005) |
2004 |
29 | EE | Dingbang Xu,
Peng Ning:
Alert Correlation through Triggering Events and Common Resources.
ACSAC 2004: 360-369 |
28 | EE | Yan Zhai,
Peng Ning,
Purush Iyer,
Douglas S. Reeves:
Reasoning About Complementary Intrusion Evidence.
ACSAC 2004: 39-48 |
27 | EE | Qinglin Jiang,
Douglas S. Reeves,
Peng Ning:
Improving Robustness of PGP Keyrings by Conflict Detection.
CT-RSA 2004: 194-207 |
26 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia,
Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
IEEE Symposium on Security and Privacy 2004: 259-271 |
25 | EE | Pan Wang,
Peng Ning,
Douglas S. Reeves:
Storage-Efficient Stateless Group Key Revocation.
ISC 2004: 25-38 |
24 | EE | Qinglin Jiang,
Douglas S. Reeves,
Peng Ning:
Certificate Recommendations to Improve the Robustness of Web of Trust.
ISC 2004: 292-303 |
23 | EE | Peng Ning,
Dingbang Xu,
Christopher G. Healey,
Robert St. Amant:
Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
NDSS 2004 |
22 | EE | Donggang Liu,
Peng Ning:
Multilevel µTESLA: Broadcast authentication for distributed sensor networks.
ACM Trans. Embedded Comput. Syst. 3(4): 800-836 (2004) |
21 | EE | Peng Ning,
Yun Cui,
Douglas S. Reeves,
Dingbang Xu:
Techniques and tools for analyzing intrusion alerts.
ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) |
20 | EE | Peng Ning,
Dingbang Xu:
Hypothesizing and reasoning about attacks missed by intrusion detection systems.
ACM Trans. Inf. Syst. Secur. 7(4): 591-627 (2004) |
2003 |
19 | EE | Peng Ning,
Dingbang Xu:
Learning attack strategies from intrusion alerts.
ACM Conference on Computer and Communications Security 2003: 200-209 |
18 | EE | Donggang Liu,
Peng Ning,
Kun Sun:
Efficient self-healing group key distribution with revocation capability.
ACM Conference on Computer and Communications Security 2003: 231-240 |
17 | EE | Donggang Liu,
Peng Ning:
Establishing pairwise keys in distributed sensor networks.
ACM Conference on Computer and Communications Security 2003: 52-61 |
16 | | Peng Ning,
Dingbang Xu:
Adapting Query Optimization Techniques for Efficient Alert Correlation.
DBSec 2003: 75-88 |
15 | | Peng Ning,
Kun Sun:
How to Misuse AODV: A Case Study of Insiider Attacks against Mobile Ad-hoc Routing Protocols.
IAW 2003: 60-67 |
14 | EE | Donggang Liu,
Peng Ning:
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
NDSS 2003 |
13 | EE | Donggang Liu,
Peng Ning:
Location-based pairwise key establishments for static sensor networks.
SASN 2003: 72-82 |
12 | | Yingjiu Li,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering calendar-based temporal association rules.
Data Knowl. Eng. 44(2): 193-218 (2003) |
2002 |
11 | EE | Peng Ning,
Yun Cui,
Douglas S. Reeves:
Constructing attack scenarios through correlation of intrusion alerts.
ACM Conference on Computer and Communications Security 2002: 245-254 |
10 | EE | Peng Ning,
Yun Cui,
Douglas S. Reeves:
Analyzing Intensive Intrusion Alerts via Correlation.
RAID 2002: 74-94 |
9 | | Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
An Algebraic Representation of Calendars.
Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002) |
8 | EE | Peng Ning,
Sushil Jajodia,
Xiaoyang Sean Wang:
Design and implementation of a decentralized prototype system for detecting distributed attacks.
Computer Communications 25(15): 1374-1391 (2002) |
2001 |
7 | EE | Peng Ning,
Yiqun Lisa Yin:
Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
ICICS 2001: 177-188 |
6 | EE | Yingjiu Li,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Discovering Calendar-based Temporal Association Rules.
TIME 2001: 111-118 |
5 | EE | Peng Ning,
Sushil Jajodia,
Xiaoyang Sean Wang:
Abstraction-based intrusion detection in distributed environments.
ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001) |
4 | EE | Peng Liu,
Peng Ning,
Sushil Jajodia:
Avoiding loss of fairness owing to failures in fair data exchange systems.
Decision Support Systems 31(3): 337-350 (2001) |
2000 |
3 | EE | Peng Liu,
Peng Ning,
Sushil Jajodia:
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
DSN 2000: 631-640 |
2 | | Jiahai Yang,
Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks.
SEC 2000: 171-180 |
1 | EE | Peng Ning,
Xiaoyang Sean Wang,
Sushil Jajodia:
Modeling requests among cooperating intrusion detection systems.
Computer Communications 23(17): 1702-1715 (2000) |