Peng Ning
TitleCited byYear
Establishing pairwise keys in distributed sensor networks
D Liu, P Ning, R Li
ACM Transactions on Information and System Security (TISSEC) 8 (1), 41-77, 2005
23372005
False data injection attacks against state estimation in electric power grids
Y Liu, P Ning, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 13, 2011
17422011
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
A Liu, P Ning
Proceedings of the 7th international conference on Information processing in …, 2008
9792008
Location-based pairwise key establishments for static sensor networks
D Liu, P Ning
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
7462003
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
7312002
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Lee
7122006
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
6302012
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
D Liu, P Ning
ACM Transactions on Embedded Computing Systems (TECS) 3 (4), 800-836, 2004
4692004
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3782013
Group-based key predistribution for wireless sensor networks
D Liu, P Ning, W Du
ACM Transactions on Sensor Networks (TOSN) 4 (2), 11, 2008
3602008
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
3582004
Attack-resistant location estimation in sensor networks
D Liu, P Ning, WK Du
Proceedings of the 4th international symposium on Information processing in …, 2005
3432005
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3432003
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
3172010
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
D Liu, P Ning
NDSS, 2003
3092003
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3032013
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
P Ning, K Sun
Ad Hoc Networks 3 (6), 795-819, 2005
3032005
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
2972009
An efficient scheme for authenticating public keys in sensor networks
W Du, R Wang, P Ning
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
2652005
LAD: Localization anomaly detection for wireless sensor networks
W Du, L Fang, P Ningi
19th IEEE International Parallel and Distributed Processing Symposium, 15 pp., 2005
2612005
The system can't perform the operation now. Try again later.
Articles 1–20