2017 journal article
A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627.
2016 conference paper
A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks
IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.
2016 journal article
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443.
2016 journal article
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65(10), 8331–8344.
2016 journal article
Toward Proper Guard Zones for Link Signature
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117.
2016 journal article
Wireless Communications under Broadband Reactive Jamming Attacks
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 13(3), 394–408.
2015 article
Cost-Efficient and Attack-Resilient Approaches for State Estimation in Power Grids
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, pp. 2192–2197.
2015 article
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).
2015 conference paper
Enhancing security of Hadoop in a public cloud
2015 6th International Conference on Information and Communication Systems (ICICS), 38–43.
2015 conference paper
Improving learning and adaptation in security games by exploiting information asymmetry
2015 ieee conference on computer communications (infocom).
2015 conference paper
No time to demodulate - fast physical layer verification of friendly jamming
2015 ieee military communications conference (milcom 2015), 653–658.
2014 journal article
Dynamic Adaptive Anti-Jamming via Controlled Mobility
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388.
2014 journal article
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(11), 1828–1842.
2013 article
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.
2013 conference paper
Dynamic adaptive anti-jamming via controlled mobility
2013 IEEE Conference on Communications and Network Security (CNS), 1–9.
2013 journal article
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
IEEE Journal on Selected Areas in Communications, 31(11), 2196–2208.
2013 journal article
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems, 12(3).
2012 conference paper
A Byzantine attack defender: The Conditional Frequency Check
2012 ieee international symposium on information theory proceedings (isit).
2012 journal article
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 15(2).
2012 conference paper
BitTrickle: Defending against broadband and high-power reactive jamming attacks
2012 Proceedings IEEE infocom, 909–917.
2012 journal article
Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 8(3).
2012 conference paper
Enhanced wireless channel authentication using time-synched link signature
2012 Proceedings IEEE infocom, 2636–2640.
2012 journal article
Interval-based flow watermarking for tracing interactive traffic
COMPUTER NETWORKS, 56(5), 1646–1665.
2012 conference paper
NSDMiner: Automated discovery of network service dependencies
2012 Proceedings IEEE infocom, 2507–2515.
2012 journal article
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks
AD HOC NETWORKS, 10(7), 1204–1220.
2011 article
False Data Injection Attacks against State Estimation in Electric Power Grids
Liu, Y., Ning, P., & Reiter, M. K. (2011, May). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 14.
2011 journal article
P(2)DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 29(3), 582–594.
2011 journal article
SeCA: A framework for Secure Channel Assignment in wireless mesh networks
COMPUTER COMMUNICATIONS, 34(4), 567–576.
2010 article
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.
2010 conference paper
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
2010 proceedings ieee infocom.
2009 article
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.
2009 conference paper
False data injection attacks against state estimation in electric power grids
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.
2009 article
HIMA: A Hypervisor-Based Integrity Measurement Agent
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+.
2009 article
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+.
2009 article
Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+.
2009 journal article
ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 6(1).
2008 article
A framework for identifying compromised nodes in wireless sensor networks
Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.
2008 journal article
Attack-resistant location estimation in wireless sensor networks
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 11(4).
2008 journal article
Group-based key predistribution for wireless sensor networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 4(2).
2008 journal article
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 4(1).
2007 journal article
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 3(3).
2007 book
Security for wireless sensor networks
New York: Springer.
2006 book
Information and communications security 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings
Berlin ;|aNew York: Springer.
2006 chapter
Integrating IDS alert correlation and OS-level dependency tracking
In Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings (Lecture notes in computer science; 3975) (Vol. 3975, pp. 272–284).
2006 article
LAD: Localization anomaly detection for wireless sensor networks
Du, W., Fang, L., & Peng, N. (2006, July). JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 66, pp. 874–886.
2006 journal article
Secure and resilient clock synchronization in wireless sensor networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 24(2), 395–408.
2005 journal article
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2(3), 177–189.
2005 journal article
Network access control for mobile ad-hoc networks
Information and Communications Security, 3783, 350–362.
2004 chapter
Certificate recommendations to improve the robustness of web of trust
In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303).
Ed(s): . K. Zhang & Y. Zheng
2004 chapter
Improving robustness of PGP keyrings by conflict detection
In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207).
2004 book
Intrusion detection in distributed systems: An abstraction-based approach
Boston: Kluwer Academic Publishers.
2004 chapter
Storage-efficient stateless group key revocation
In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38).
Ed(s): . K. Zhang & Y. Zheng
2002 article
An algebraic representation of calendars
Ning, P., Wang, X. Y. S., & Jajodia, S. (2002, September). ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, Vol. 36, pp. 5–38.
2002 chapter
Analyzing intensive intrusion alerts via correlation
In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94).
Ed(s): G. A. Wespi & L. Deri
2002 journal article
Design and implementation of a decentralized prototype system for detecting distributed attacks
COMPUTER COMMUNICATIONS, 25(15), 1374–1391.
2002 journal article
Discovering calendar-based temporal association rules
DATA & KNOWLEDGE ENGINEERING, 44(2), 193–218.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.