Peng Ning

Works (56)

2017 journal article

A leader-follower controlled Markov stopping game for delay tolerant and opportunistic resource sharing networks

IEEE Journal on Selected Areas in Communications, 35(3), 615–627.

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Faster learning and adaptation in security games by exploiting information asymmetry

IEEE Transactions on Signal Processing, 64(13), 3429–3443.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Jamming-resistant multiradio multichannel opportunistic spectrum access in cognitive radio networks

IEEE Transactions on Vehicular Technology, 65(10), 8331–8344.

By: Q. Wang, K. Ren, P. Ning & S. Hu

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Toward proper guard zones for link signature

IEEE Transactions on Wireless Communications, 15(3), 2104–2117.

By: X. He, H. Dai, W. Shen, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Wireless communications under broadband reactive jamming attacks

IEEE Transactions on Dependable and Secure Computing, 13(3), 394–408.

By: S. Fang, Y. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Cost-efficient and attack-resilient approaches for state estimation in power grids

30th Annual ACM Symposium on Applied Computing, Vols I and II, 2192–2197.

By: K. Xiong & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Dynamic IDS configuration in the presence of intruder type uncertainty

2015 IEEE Global Communications Conference (GLOBECOM).

By: X. He, H. Dai, P. Ning & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Enhancing security of Hadoop in a public cloud

2015 6th International Conference on Information and Communication Systems (ICICS), 38–43.

By: X. Yu, P. Ning & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen, Y. Liu, X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Dynamic adaptive anti-jamming via controlled mobility

IEEE Transactions on Wireless Communications, 13(8), 4374–4388.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Permission use analysis for vetting undesirable behaviors in android apps

IEEE Transactions on Information Forensics and Security, 9(11), 1828–1842.

By: Y. Zhang, M. Yang, Z. Yang, G. Gu, P. Ning & B. Zang

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time

2013 ieee symposium on security and privacy (sp), 174–188.

By: W. Shen, P. Ning, X. He & H. Dai

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Dynamic adaptive anti-jamming via controlled mobility

2013 IEEE Conference on Communications and Network Security (CNS), 1–9.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

HMM-based malicious user detection for robust collaborative spectrum sensing

IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Providing DoS resistance for signature-based broadcast authentication in sensor networks

ACM Transactions on Embedded Computing Systems, 12(3).

By: Q. Dong, D. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He, H. Dai & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for securelogging in resource-constrained systems

ACM Transactions on Information and System Security, 15(2).

By: A. Yavuz, P. Ning & M. Reiter

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

BitTrickle: Defending against broadband and high-power reactive jamming attacks

2012 Proceedings IEEE infocom, 909–917.

By: Y. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Containing bogus packet insertion attacks for broadcast authentication in sensor networks

ACM Transactions on Sensor Networks, 8(3).

By: K. Xiong, R. Wang, W. Du & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Enhanced wireless channel authentication using time-synched link signature

2012 Proceedings IEEE infocom, 2636–2640.

By: Y. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Interval-based flow watermarking for tracing interactive traffic

Computer Networks (Amsterdam, Netherlands : 1999), 56(5), 1646–1665.

By: Y. Pyun, Y. Park, D. Reeves, X. Wang & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

NSDMiner: Automated discovery of network service dependencies

2012 Proceedings IEEE infocom, 2507–2515.

By: A. Natarajan, P. Ning, Y. Liu, S. Jajodia & S. Hutchinson

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Self-sustaining, efficient and forward-secure cryptographic constructions for unattended wireless sensor networks

Ad Hoc Networks, 10(7), 1204–1220.

By: A. Yavuz & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

False data injection attacks against state estimation in electric power grids

ACM Transactions on Information and System Security, 14(1).

By: Y. Liu, P. Ning & M. Reiter

Source: NC State University Libraries
Added: August 6, 2018

2011 journal article

P(2)DAP - Sybil attacks detection in vehicular ad hoc networks

IEEE Journal on Selected Areas in Communications, 29(3), 582–594.

By: T. Zhou, R. Roy, C. Ning & K. Chakrabarty

Source: NC State University Libraries
Added: August 6, 2018

2011 journal article

SeCA: A framework for Secure Channel Assignment in wireless mesh networks

Computer Communications, 34(4), 567–576.

By: M. Kim & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures

2010 ieee symposium on security and privacy, 286–301.

By: Y. Liu, P. Ning & H. Dai

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Randomized differential DSSS: Jamming-resistant wireless broadcast communication

2010 proceedings ieee infocom.

By: Y. Liu, P. Ning, H. Dai & A. Liu

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems

25th Annual Computer Security Applications Conference, 219–228.

By: A. Yavuz & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

False data injection attacks against state estimation in electric power grids

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.

By: Y. Liu, P. Ning & M. Reiter

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

HIMA: A hypervisor-based integrity measurement agent

25th Annual Computer Security Applications Conference, 461–470.

By: A. Azab, P. Ning, E. Sezer & X. Zhang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Lightweight remote image management for secure code dissemination in wireless sensor networks

Ieee infocom 2009 - ieee conference on computer communications, vols 1-5, 1242–1250.

By: A. Liu, P. Ning & C. Wang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Remote attestation to dynamic system properties: Towards providing complete system integrity evidence

2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN 2009), 115–124.

By: C. Kil, E. Sezer, A. Azab, P. Ning & X. Zhang

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

ACM Transactions on Sensor Networks, 6(1).

By: R. Wang, W. Du, X. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

A framework for identifying compromised nodes in wireless sensor networks

ACM Transactions on Information and System Security, 11(3).

By: Q. Zhang, T. Yu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Attack-resistant location estimation in wireless sensor networks

ACM Transactions on Information and System Security, 11(4).

By: D. Liu, P. Ning, A. Liu, C. Wang & W. Du

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Group-based key predistribution for wireless sensor networks

ACM Transactions on Sensor Networks, 4(2).

By: D. Liu, P. Ning & W. Du

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

ACM Transactions on Sensor Networks, 4(1).

By: P. Ning, A. Liu & W. Du

Source: NC State University Libraries
Added: August 6, 2018

2007 journal article

Interleaved hop-by-hop authentication against false data injection attacks in sensor networks

ACM Transactions on Sensor Networks, 3(3).

By: S. Zhu, S. Setia, S. Jajodia & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2007 book

Security for wireless sensor networks

New York: Springer.

By: D. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2006 book

Information and communications security 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings

Berlin ;|aNew York: Springer.

Source: NC State University Libraries
Added: August 6, 2018

2006 chapter

Integrating IDS alert correlation and OS-level dependency tracking

In Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings (Lecture notes in computer science; 3975) (Vol. 3975, pp. 272–284).

By: Y. Zhai, P. Ning & J. Xu

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

LAD: Localization anomaly detection for wireless sensor networks

Journal of Parallel and Distributed Computing, 66(7), 874–886.

By: W. Du, L. Fang & N. Peng

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Secure and resilient clock synchronization in wireless sensor networks

IEEE Journal on Selected Areas in Communications, 24(2), 395–408.

By: K. Sun, P. Ning & C. Wang

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Fault-tolerant cluster-wise clock synchronization for wireless sensor networks

IEEE Transactions on Dependable and Secure Computing, 2(3), 177–189.

By: K. Sun, P. Ning & C. Wang

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Network access control for mobile ad-hoc networks

Information and Communications Security, 3783, 350–362.

By: P. Wang, P. Ning & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Certificate recommendations to improve the robustness of web of trust

In Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303).

By: Q. Jiang, D. Reeves & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Improving robustness of PGP keyrings by conflict detection

In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207).

By: Q. Jiang, D. Reeves & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2004 book

Intrusion detection in distributed systems: An abstraction-based approach

Boston: Kluwer Academic Publishers.

By: P. Ning, S. Jajodia & S. Wang

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Storage-efficient stateless group key revocation

In Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38).

By: P. Wang, P. Ning & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

Discovering calendar-based temporal association rules

Data & Knowledge Engineering, 44(2), 193–218.

By: Y. Li, P. Ning, X. Wang & S. Jajodia

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

An algebraic representation of calendars

Annals of Mathematics and Artificial Intelligence, 36(1-2), 5–38.

By: P. Ning, X. Wang & S. Jajodia

Source: NC State University Libraries
Added: August 6, 2018

2002 chapter

Analyzing intensive intrusion alerts via correlation

In Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94).

By: P. Ning, Y. Cui & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

Design and implementation of a decentralized prototype system for detecting distributed attacks

Computer Communications, 25(15), 1374–1391.

By: P. Ning, S. Jajodia & X. Wang

Source: NC State University Libraries
Added: August 6, 2018