Peng Liu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at - Homepage
Cited by
Cited by
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 first IEEE international conference on smart grid communications, 327-332, 2010
The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
W Zhou, Y Jia, A Peng, Y Zhang, P Liu
IEEE Internet of things Journal 6 (2), 1606-1616, 2018
Incentive-based modeling and inference of attacker intent, objectives, and strategies
P Liu, W Zang, M Yu
ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2015
Proactive Worm Containment (PWC) For Enterprise Networks
PL Y. Jhi
US Patent 8,904,535, 2015
Proactive worm containment (PWC) for enterprise networks
US Patent 20,090,031,423, 0
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness: Issues and Research, 3-13, 2010
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms
W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang
28th USENIX security symposium (USENIX security 19), 1133-1150, 2019
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Retrieval of relevant historical data triage operations in security operation centers
T Lin, C Zhong, J Yen, P Liu
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
Cybersecurity for digital manufacturing
D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu, J Terpenny
Journal of manufacturing systems 48, 3-12, 2018
Architectures for intrusion tolerant database systems
P Liu
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
The system can't perform the operation now. Try again later.
Articles 1–20