Peng Ning
TitleCited byYear
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li
ACM Transactions on Information and System Security (TISSEC) 8 (1), 41-77, 2005
23852005
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 13, 2011
18542011
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
A Liu, P Ning
Proceedings of the 7th international conference on Information processing in …, 2008
10152008
Location-based pairwise key establishments for static sensor networks
D Liu, P Ning
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
7612003
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
7492002
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
7302004
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
6472012
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D Liu, P Ning
ACM Transactions on Embedded Computing Systems (TECS) 3 (4), 800-836, 2004
4802004
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3932013
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 11, 2008
3652008
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
3642004
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3502003
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
Proceedings of the 4th international symposium on Information processing in …, 2005
3492005
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3272010
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
D Liu, P Ning
North Carolina State University. Dept. of Computer Science, 2002
3172002
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3162013
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
P Ning, K Sun
Ad Hoc Networks 3 (6), 795-819, 2005
3102005
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
3082009
An efficient scheme for authenticating public keys in sensor networks
W Du, R Wang, P Ning
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
2702005
LAD: Localization anomaly detection for wireless sensor networks
W Du, L Fang, P Ningi
19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005
2702005
The system can't perform the operation now. Try again later.
Articles 1–20