Works (56)

Updated: July 5th, 2023 16:00

2017 journal article

A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

author keywords: Resource sharing; delay tolerant; opportunistic resource; game theory; optimal stopping
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 conference paper

A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2016 journal article

Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry

IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cloud computing; cognitive radio; energy harvesting; jamming; reinforcement learning; security; stochastic game
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65(10), 8331–8344.

By: Q. Wang*, K. Ren*, P. Ning n & S. Hu*

author keywords: Antijamming; cognitive radio networks (CRNs); multiradio multichannel; spectrum access
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Toward Proper Guard Zones for Link Signature

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.

By: X. He n, H. Dai n, W. Shen n, P. Ning n & R. Dutta n

author keywords: Link signature; channel correlation model; guard zone; physical-layer security
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 journal article

Wireless Communications under Broadband Reactive Jamming Attacks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 13(3), 394–408.

By: S. Fang*, Y. Liu* & P. Ning n

author keywords: Wireless communication; jamming attacks; reactive jammer; broadband
Source: Web Of Science
Added: August 6, 2018

2015 article

Cost-Efficient and Attack-Resilient Approaches for State Estimation in Power Grids

30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, pp. 2192–2197.

By: K. Xiong* & P. Ning n

author keywords: Security attacks; Power grids; State estimation
Source: Web Of Science
Added: August 6, 2018

2015 article

Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

Sources: Web Of Science, ORCID
Added: August 6, 2018

2015 conference paper

Enhancing security of Hadoop in a public cloud

2015 6th International Conference on Information and Communication Systems (ICICS), 38–43.

By: X. Yu n, P. Ning n & M. Vouk n

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He n, H. Dai n & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen n, Y. Liu*, X. He n, H. Dai n & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Dynamic Adaptive Anti-Jamming via Controlled Mobility

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388.

By: X. He n, H. Dai n & P. Ning n

author keywords: Jamming/anti-jamming; mobility control; conductance; cognitive radio network; security
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(11), 1828–1842.

By: Y. Zhang*, M. Yang*, Z. Yang*, G. Gu*, P. Ning n & B. Zang*

author keywords: Android security; permission use analysis; vetting undesirable behaviors; android behavior representation
Source: Web Of Science
Added: August 6, 2018

2013 article

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.

By: W. Shen n, P. Ning n, X. He n & H. Dai n

author keywords: Wireless; friendly jamming; interference cancellation
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Dynamic adaptive anti-jamming via controlled mobility

2013 IEEE Conference on Communications and Network Security (CNS), 1–9.

By: X. He n, H. Dai n & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing

IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.

By: X. He n, H. Dai n & P. Ning n

author keywords: Cognitive radio network; security; collaborative spectrum sensing; malicious user detection; Byzantine attacks; HMM
Sources: Web Of Science, Crossref
Added: August 6, 2018

2013 journal article

Providing DoS resistance for signature-based broadcast authentication in sensor networks

ACM Transactions on Embedded Computing Systems, 12(3).

By: Q. Dong*, D. Liu* & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He n, H. Dai n & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 15(2).

By: A. Yavuz n, P. Ning n & M. Reiter*

author keywords: Security; Design; Applied cryptography; digital signature; secure audit logging; forward security; signature aggregation
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

BitTrickle: Defending against broadband and high-power reactive jamming attacks

2012 Proceedings IEEE infocom, 909–917.

By: Y. Liu n & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks

ACM TRANSACTIONS ON SENSOR NETWORKS, 8(3).

By: K. Xiong*, R. Wang*, W. Du* & P. Ning n

author keywords: Security; Design; Algorithms; Broadcast authentication; bogus packet insertion attack; AIMD; sensor networks; energy consumption; broadcast delay
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

Enhanced wireless channel authentication using time-synched link signature

2012 Proceedings IEEE infocom, 2636–2640.

By: Y. Liu n & P. Ning n

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Interval-based flow watermarking for tracing interactive traffic

COMPUTER NETWORKS, 56(5), 1646–1665.

By: Y. Pyun n, Y. Park n, D. Reeves n, X. Wang* & P. Ning n

author keywords: Intrusion tracing; Stepping stones; Flow watermarking; Flow correlation
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

NSDMiner: Automated discovery of network service dependencies

2012 Proceedings IEEE infocom, 2507–2515.

By: A. Natarajan n, P. Ning n, Y. Liu n, S. Jajodia* & S. Hutchinson*

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks

AD HOC NETWORKS, 10(7), 1204–1220.

By: A. Yavuz* & P. Ning*

author keywords: Applied cryptography; Unattended Wireless Sensor Networks (UWSNs); Digital signatures; Forward security; Aggregate signatures
Source: Web Of Science
Added: August 6, 2018

2011 article

False Data Injection Attacks against State Estimation in Electric Power Grids

Liu, Y., Ning, P., & Reiter, M. K. (2011, May). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 14.

By: Y. Liu n, P. Ning n & M. Reiter*

author keywords: Algorithms; Security; Power grids; state estimation; attack
Source: Web Of Science
Added: August 6, 2018

2011 journal article

P(2)DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 29(3), 582–594.

By: T. Zhou*, R. Roy*, C. Ning n & K. Chakrabarty*

author keywords: Coarse-grained hash; fine-grained hash; privacy; security; Sybil attack; vehicular ad hoc network
Source: Web Of Science
Added: August 6, 2018

2011 journal article

SeCA: A framework for Secure Channel Assignment in wireless mesh networks

COMPUTER COMMUNICATIONS, 34(4), 567–576.

By: M. Kim n & P. Ning n

author keywords: Secure channel assignment; Multi-channel multi-radio; Wireless mesh networks; Relay attack resistance; Misbehavior resistance
Source: Web Of Science
Added: August 6, 2018

2010 article

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.

By: Y. Liu n, P. Ning n & H. Dai n

author keywords: cognitive radio networks; primary user detection; link signatures
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

Randomized differential DSSS: Jamming-resistant wireless broadcast communication

2010 proceedings ieee infocom.

By: Y. Liu n, P. Ning n, H. Dai n & A. Liu n

Source: NC State University Libraries
Added: August 6, 2018

2009 article

BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.

By: A. Yavuz n & P. Ning n

author keywords: Applied cryptography; secure audit logging; digital forensics; forward security; signature aggregation
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

False data injection attacks against state estimation in electric power grids

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.

By: Y. Liu n, P. Ning n & M. Reiter*

Source: NC State University Libraries
Added: August 6, 2018

2009 article

HIMA: A Hypervisor-Based Integrity Measurement Agent

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+.

By: A. Azab n, P. Ning n, E. Sezer n & X. Zhang*

Source: Web Of Science
Added: August 6, 2018

2009 article

Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks

IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+.

By: A. Liu n, P. Ning n & C. Wang*

Source: Web Of Science
Added: August 6, 2018

2009 article

Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence

2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+.

By: C. Kil n, E. Sezer n, A. Azab n, P. Ning n & X. Zhang*

author keywords: Remote attestation; dynamic attestation; runtime integrity; system security; trusted computing
Source: Web Of Science
Added: August 6, 2018

2009 journal article

ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks

ACM TRANSACTIONS ON SENSOR NETWORKS, 6(1).

By: R. Wang*, W. Du*, X. Liu* & P. Ning n

author keywords: Security; Design; Performance; Sensor networks; public key; communication
Source: Web Of Science
Added: August 6, 2018

2008 article

A framework for identifying compromised nodes in wireless sensor networks

Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.

By: Q. Zhang n, T. Yu n & P. Ning n

author keywords: algorithms; security; sensor networks; intrusion detection
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Attack-resistant location estimation in wireless sensor networks

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 11(4).

By: D. Liu*, P. Ning n, A. Liu n, C. Wang & W. Du*

author keywords: security; design; algorithms; sensor networks; security; localization
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Group-based key predistribution for wireless sensor networks

ACM TRANSACTIONS ON SENSOR NETWORKS, 4(2).

By: D. Liu*, P. Ning n & W. Du*

author keywords: security; design; algorithms; sensor networks; security; pairwise key establishment; key predistribution; group-based deployment
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

ACM TRANSACTIONS ON SENSOR NETWORKS, 4(1).

By: P. Ning n, A. Liu n & W. Du*

author keywords: security; design; algorithms; sensor networks; security; broadcast authentication; DoS attacks
Source: Web Of Science
Added: August 6, 2018

2007 journal article

Interleaved hop-by-hop authentication against false data injection attacks in sensor networks

ACM TRANSACTIONS ON SENSOR NETWORKS, 3(3).

By: S. Zhu*, S. Setia*, S. Jajodia* & P. Ning n

author keywords: security; algorithm; design; authentication; filtering false data; interleaved hop-by-hop; sensor networks
Source: Web Of Science
Added: August 6, 2018

2007 book

Security for wireless sensor networks

New York: Springer.

By: D. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2006 book

Information and communications security 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings

Berlin ;|aNew York: Springer.

Source: NC State University Libraries
Added: August 6, 2018

2006 chapter

Integrating IDS alert correlation and OS-level dependency tracking

In Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings (Lecture notes in computer science; 3975) (Vol. 3975, pp. 272–284).

By: Y. Zhai n, P. Ning n & J. Xu n

Source: NC State University Libraries
Added: August 6, 2018

2006 article

LAD: Localization anomaly detection for wireless sensor networks

Du, W., Fang, L., & Peng, N. (2006, July). JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 66, pp. 874–886.

By: W. Du*, L. Fang* & N. Peng

author keywords: sensor networks; security; anomaly detection; location discovery
Source: Web Of Science
Added: August 6, 2018

2006 journal article

Secure and resilient clock synchronization in wireless sensor networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 24(2), 395–408.

By: K. Sun n, P. Ning n & C. Wang*

author keywords: computer network security; fault tolerance; synchronization; wireless sensor networks
Source: Web Of Science
Added: August 6, 2018

2005 journal article

Fault-tolerant cluster-wise clock synchronization for wireless sensor networks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2(3), 177–189.

By: K. Sun n, P. Ning n & C. Wang*

author keywords: clock synchronization; wireless sensor networks; fault tolerance
Source: Web Of Science
Added: August 6, 2018

2005 journal article

Network access control for mobile ad-hoc networks

Information and Communications Security, 3783, 350–362.

By: P. Wang, P. Ning & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Certificate recommendations to improve the robustness of web of trust

In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303).

By: Q. Jiang*, D. Reeves* & P. Ning*

Ed(s): . K. Zhang & Y. Zheng

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Improving robustness of PGP keyrings by conflict detection

In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207).

By: Q. Jiang*, D. Reeves* & P. Ning*

Source: NC State University Libraries
Added: August 6, 2018

2004 book

Intrusion detection in distributed systems: An abstraction-based approach

Boston: Kluwer Academic Publishers.

By: P. Ning, S. Jajodia & S. Wang

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Storage-efficient stateless group key revocation

In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38).

By: P. Wang n, P. Ning n & D. Reeves n

Ed(s): . K. Zhang & Y. Zheng

Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

Discovering calendar-based temporal association rules

DATA & KNOWLEDGE ENGINEERING, 44(2), 193–218.

By: Y. Li*, P. Ning n, X. Wang* & S. Jajodia*

author keywords: knowledge discovery; temporal data mining; association rule; time granularity
Source: Web Of Science
Added: August 6, 2018

2002 article

An algebraic representation of calendars

Ning, P., Wang, X. Y. S., & Jajodia, S. (2002, September). ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, Vol. 36, pp. 5–38.

By: P. Ning n, X. Wang* & S. Jajodia*

author keywords: temporal granularity; calendar; calendar algebra; granule conversion
Source: Web Of Science
Added: August 6, 2018

2002 chapter

Analyzing intensive intrusion alerts via correlation

In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94).

By: P. Ning n, Y. Cui n & D. Reeves n

Ed(s): G. A. Wespi & L. Deri

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

Design and implementation of a decentralized prototype system for detecting distributed attacks

COMPUTER COMMUNICATIONS, 25(15), 1374–1391.

By: P. Ning*, S. Jajodia & X. Wang

author keywords: decentralized intrusion detection; misuse detection; computer security; network security
Source: Web Of Science
Added: August 6, 2018