Works (56)
2017 article
A Leader–Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks
He, X., Dai, H., Ning, P., & Dutta, R. (2017, January 26). IEEE Journal on Selected Areas in Communications, Vol. 35, pp. 615–627.
2016 article
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks
He, X., Dai, H., Ning, P., & Dutta, R. (2016, April 1). IEEE INFOCOM 2016 - the 35th Annual IEEE International Conference on Computer Communications.
2016 article
Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry
He, X., Dai, H., & Ning, P. (2016, March 31). IEEE Transactions on Signal Processing.
2015 article
Cost-efficient and attack-resilient approaches for state estimation in power grids
Xiong, K., & Ning, P. (2015, April 13).
2015 article
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
He, X., Dai, H., Ning, P., & Dutta, R. (2015, December 1). 2015 IEEE Global Communications Conference (GLOBECOM).
2015 article
Enhancing security of Hadoop in a public cloud
Yu, N. X., Ning, P., & Vouk, M. A. (2015, April 1).
2015 article
Improving learning and adaptation in security games by exploiting information asymmetry
He, X., Dai, H., & Ning, P. (2015, April 1).
2015 article
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks
Wang, Q., Su, H., Ren, K., & Xing, K. (2015, December 22). IEEE Transactions on Vehicular Technology.
2015 article
No time to demodulate - fast physical layer verification of friendly jamming
Shen, W., Liu, Y., He, X., Dai, H., & Ning, P. (2015, October 1).
2015 article
Toward Proper Guard Zones for Link Signature
He, X., Dai, H., Shen, W., Ning, P., & Dutta, R. (2015, November 6). IEEE Transactions on Wireless Communications, Vol. 15, pp. 2104–2117.
2015 article
Wireless Communications under Broadband Reactive Jamming Attacks
Fang, S., Liu, Y., & Ning, P. (2015, February 3). IEEE Transactions on Dependable and Secure Computing.
2014 article
Dynamic Adaptive Anti-Jamming via Controlled Mobility
He, X., Dai, H., & Ning, P. (2014, April 29). IEEE Transactions on Wireless Communications.
2014 article
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
Zhang, Y., Yang, M., Yang, Z., Gu, G., Ning, P., & Zang, B. (2014, August 12). IEEE Transactions on Information Forensics and Security.
2013 article
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
Shen, N. W., Ning, N. P., He, N. X., & Dai, N. H. (2013, May 1).
2013 article
Dynamic adaptive anti-jamming via controlled mobility
He, X., Dai, H., & Ning, P. (2013, October 1).
2013 journal article
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
He, N. X., Dai, N. H., & Ning, N. P. (2013, October 17). IEEE Journal on Selected Areas in Communications.
2013 article
Providing DoS resistance for signature-based broadcast authentication in sensor networks
Dong, Q., Liu, D., & Ning, P. (2013, March 10). ACM Transactions on Embedded Computing Systems.
2012 article
A Byzantine attack defender: The Conditional Frequency Check
He, X., Dai, H., & Ning, P. (2012, July 1).
2012 article
BAF and FI-BAF
Yavuz, A. A., Ning, P., & Reiter, M. K. (2012, July 1). ACM Transactions on Information and System Security.
2012 article
BitTrickle: Defending against broadband and high-power reactive jamming attacks
Liu, Y., & Ning, P. (2012, March 1).
2012 article
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
Xiong, K., Wang, R., Du, W., & Ning, P. (2012, July 1). ACM Transactions on Sensor Networks.
2012 article
Enhanced wireless channel authentication using time-synched link signature
Liu, Y., & Ning, P. (2012, March 1).
2012 article
Interval-based flow watermarking for tracing interactive traffic
Pyun, Y. J., Park, Y., Reeves, D. S., Wang, X., & Ning, P. (2012, February 3). Computer Networks.
2012 article
NSDMiner: Automated discovery of Network Service Dependencies
Natarajan, A., Ning, N. P., Liu, N. Y., Jajodia, S., & Hutchinson, S. E. (2012, March 1).
2012 article
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks
Yavuz, A. A., & Ning, P. (2012, April 12). Ad Hoc Networks.
2011 article
False data injection attacks against state estimation in electric power grids
Liu, Y., Ning, P., & Reiter, M. K. (2011, May 1). ACM Transactions on Information and System Security.
2011 article
P2DAP — Sybil Attacks Detection in Vehicular Ad Hoc Networks
Zhou, T., Choudhury, R. R., Ning, P., & Chakrabarty, K. (2011, February 22). IEEE Journal on Selected Areas in Communications.
2010 article
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures
Liu, Y., Ning, P., & Dai, H. (2010, January 1).
2010 article
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
Liu, Y., Ning, P., Dai, H., & Liu, A. (2010, March 1).
2010 article
SeCA: A framework for Secure Channel Assignment in wireless mesh networks
Kim, M., & Ning, P. (2010, May 25). Computer Communications.
2009 article
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Yavuz, A. A., & Ning, P. (2009, December 1).
2009 article
False data injection attacks against state estimation in electric power grids
Liu, Y., Ning, P., & Reiter, M. K. (2009, November 9).
2009 article
HIMA: A Hypervisor-Based Integrity Measurement Agent
Azab, A. M., Ning, P., Sezer, E. C., & Zhang, X. (2009, December 1).
2009 article
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Liu, A., Ning, P., & Wang, C. (2009, April 1).
2009 article
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Kil, C., Sezer, E. C., Azab, A. M., Ning, P., & Zhang, X. (2009, June 1).
2009 article
ShortPK
Wang, R., Du, W., Liu, X., & Ning, P. (2009, December 1). ACM Transactions on Sensor Networks.
2008 article
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
Zhang, Q., Yu, T., & Ning, P. (2008, March 1). ACM Transactions on Information and System Security.
2008 article
Attack-Resistant Location Estimation in Wireless Sensor Networks
Liu, D., Ning, P., Liu, A., Wang, C., & Du, W. K. (2008, July 1). ACM Transactions on Information and System Security.
2008 article
Group-based key predistribution for wireless sensor networks
Liu, D., Ning, P., & Du, W. (2008, March 1). ACM Transactions on Sensor Networks.
2008 article
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
Ning, P., Liu, A., & Du, W. (2008, January 1). ACM Transactions on Sensor Networks.
2007 article
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007, August 1). ACM Transactions on Sensor Networks.
2007 book
Security for wireless sensor networks
New York: Springer.
2006 book
Information and communications security 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006 : proceedings
Berlin ;|aNew York: Springer.
2006 article
Integrating IDS Alert Correlation and OS-Level Dependency Tracking
Zhai, Y., Ning, P., & Xu, J. (2006, January 1). Lecture Notes in Computer Science.
Ed(s):
2006 article
LAD: Localization anomaly detection for wireless sensor networks
Du, W., Fang, L., & Peng, N. (2006, May 12). Journal of Parallel and Distributed Computing.
2006 article
Secure and resilient clock synchronization in wireless sensor networks
Sun, N. K., Ning, N. P., & Wang, N. C. (2006, February 1). IEEE Journal on Selected Areas in Communications.
2005 article
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
Sun, N. K., Ning, N. P., & Wang, C. (2005, March 1). IEEE Transactions on Dependable and Secure Computing.
2005 journal article
Network access control for mobile ad-hoc networks
Information and Communications Security, 3783, 350–362.
2004 article
Certificate Recommendations to Improve the Robustness of Web of Trust
Jiang, Q., Reeves, D. S., & Ning, P. (2004, January 1). Lecture Notes in Computer Science.
Ed(s):
2004 article
Improving Robustness of PGP Keyrings by Conflict Detection
Jiang, Q., Reeves, D. S., & Ning, P. (2004, January 1). Lecture Notes in Computer Science.
2004 book
Intrusion detection in distributed systems: An abstraction-based approach
Boston: Kluwer Academic Publishers.
2004 article
Storage-Efficient Stateless Group Key Revocation
Wang, P., Ning, P., & Reeves, D. S. (2004, January 1). Lecture Notes in Computer Science.
Ed(s):
2002 article
An Algebraic Representation of Calendars
Ning, P., Wang, X. S., & Jajodia, S. (2002, September 1). Annals of Mathematics and Artificial Intelligence.
2002 article
Analyzing Intensive Intrusion Alerts via Correlation
Ning, P., Cui, Y., & Reeves, D. S. (2002, January 1). Lecture Notes in Computer Science.
Ed(s):
2002 article
Design and implementation of a decentralized prototype system for detecting distributed attacks
Ning, P., Jajodia, S., & Wang, X. S. (2002, July 26). Computer Communications.
2002 article
Discovering calendar-based temporal association rules
Li, Y., Ning, P., Wang, X. S., & Jajodia, S. (2002, December 30). Data & Knowledge Engineering.