Follow
Peng Ning
Title
Cited by
Cited by
Year
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011
38072011
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li
ACM Transactions on Information and System Security (TISSEC) 8 (1), 41-77, 2005
26772005
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
A Liu, P Ning
2008 International Conference on Information Processing in Sensor Networks …, 2008
12162008
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
8982012
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
8662002
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
8352004
Location-based pairwise key establishments for static sensor networks
D Liu, P Ning
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
8262003
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5752013
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D Liu, P Ning
ACM Transactions on Embedded Computing Systems (TECS) 3 (4), 800-836, 2004
5582004
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4602013
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
4302004
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4152010
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
C Kil, J Jun, C Bookholt, J Xu, P Ning
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 339-348, 2006
4072006
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
4062003
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008
4032008
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3952014
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
3912005
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
3892009
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
D Liu, P Ning
North Carolina State University. Dept. of Computer Science, 2002
3612002
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
P Ning, K Sun
Ad Hoc Networks 3 (6), 795-819, 2005
3542005
The system can't perform the operation now. Try again later.
Articles 1–20