False data injection attacks against state estimation in electric power grids Y Liu, P Ning, MK Reiter ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-33, 2011 | 3645 | 2011 |
Establishing pairwise keys in distributed sensor networks D Liu, P Ning, R Li ACM Transactions on Information and System Security (TISSEC) 8 (1), 41-77, 2005 | 2655 | 2005 |
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks A Liu, P Ning 2008 International Conference on Information Processing in Sensor Networks …, 2008 | 1198 | 2008 |
Detecting repackaged smartphone applications in third-party android marketplaces W Zhou, Y Zhou, X Jiang, P Ning Proceedings of the second ACM conference on Data and Application Security …, 2012 | 887 | 2012 |
Constructing attack scenarios through correlation of intrusion alerts P Ning, Y Cui, DS Reeves Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 858 | 2002 |
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks S Zhu, S Setia, S Jajodia, P Ning IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004 | 825 | 2004 |
Location-based pairwise key establishments for static sensor networks D Liu, P Ning Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 821 | 2003 |
Multilevel μTESLA: Broadcast authentication for distributed sensor networks D Liu, P Ning ACM Transactions on Embedded Computing Systems (TECS) 3 (4), 800-836, 2004 | 556 | 2004 |
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 554 | 2013 |
Vetting undesirable behaviors in android apps with permission use analysis Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 451 | 2013 |
Techniques and tools for analyzing intrusion alerts P Ning, Y Cui, DS Reeves, D Xu ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004 | 428 | 2004 |
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 413 | 2010 |
Discovering calendar-based temporal association rules Y Li, P Ning, XS Wang, S Jajodia Data & Knowledge Engineering 44 (2), 193-218, 2003 | 404 | 2003 |
Group-based key predistribution for wireless sensor networks D Liu, P Ning, W Du ACM Transactions on Sensor Networks (TOSN) 4 (2), 1-30, 2008 | 403 | 2008 |
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software C Kil, J Jun, C Bookholt, J Xu, P Ning 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 339-348, 2006 | 393 | 2006 |
Attack-resistant location estimation in sensor networks D Liu, P Ning, WK Du IPSN 2005. Fourth International Symposium on Information Processing in …, 2005 | 388 | 2005 |
Managing security of virtual machine images in a cloud environment J Wei, X Zhang, G Ammons, V Bala, P Ning Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009 | 382 | 2009 |
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 379 | 2014 |
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks D Liu, P Ning North Carolina State University. Dept. of Computer Science, 2002 | 357 | 2002 |
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols P Ning, K Sun Ad Hoc Networks 3 (6), 795-819, 2005 | 350 | 2005 |