46 results on '"Ning, Peng"'
Search Results
2. The Influence of Human Capital on Organization Value
3. Computer-Aided Human Centric Cyber Situation Awareness
4. Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging
5. iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
6. On the Expressiveness of Return-into-libc Attacks
7. Secure Code Dissemination in Wireless Sensor Networks
8. Secure Time Synchronization
9. Security and Privacy for Sensor Networks
10. Toward Automated Intrusion Alert Analysis
11. Cyber SA: Situational Awareness for Cyber Defense
12. Automated Software Vulnerability Analysis
13. Key Pre-Distribution for Sensor Networks Using Group Deployment Knowledge
14. Integrating IDS Alert Correlation and OS-Level Dependency Tracking
15. Network Access Control for Mobile Ad-Hoc Networks
16. An Overview of Related Research
17. Improving Robustness of PGP Keyrings by Conflict Detection
18. Extending Common Intrusion Detection Framework (CIDF) to Support Queries
19. A Hierarchical Model for Distributed Attacks
20. CARDS: An Experimental System for Detecting Distributed Attacks
21. System View and Event History
22. Modeling Request Among Cooperating Intrusion Detection Systems
23. Storage-Efficient Stateless Group Key Revocation
24. Introduction
25. Intrusion Detection in Distributed Systems
26. Decentralized Detection of Distributed Attacks
27. Certificate Recommendations to Improve the Robustness of Web of Trust
28. Conclusion
29. Analyzing Intensive Intrusion Alerts via Correlation
30. Efficient Software Implementation for Finite Field Multiplication in Normal Basis
31. Cards: A Distributed System for Detecting Coordinated Attacks
32. Secure and Resilient Localization in Wireless Sensor Networks
33. A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks
34. Secure and Resilient Time Synchronization in Wireless Sensor Networks
35. Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
36. iHTTP: Efficient Authentication of Non-confidential HTTP Traffic.
37. Secure and Resilient Time Synchronization in Wireless Sensor Networks.
38. Secure and Resilient Localization in Wireless Sensor Networks.
39. A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks.
40. Secure Localization.
41. Improving Pairwise Key Establishment Using Deployment Knowledge.
42. Pairwise Key Establishment.
43. Broadcast Authentication.
44. Introduction.
45. Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
46. Summary and Future Work.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.