Search

Your search keyword '"Peng Ning"' showing total 38 results

Search Constraints

Start Over You searched for: Author "Peng Ning" Remove constraint Author: "Peng Ning" Publisher acm Remove constraint Publisher: acm
38 results on '"Peng Ning"'

Search Results

1. PrivWatcher

2. SPOKE

3. Cost-efficient and attack-resilient approaches for state estimation in power grids

4. SEER

5. Samsung KNOX and Enterprise Mobile Security

6. Hypervision Across Worlds

7. Securing Hadoop in cloud

8. Detecting repackaged smartphone applications in third-party android marketplaces

9. SICE

10. Poster

11. Always up-to-date

13. HyperSentry

14. Managing security of virtual machine images in a cloud environment

15. Countering kernel rootkits with lightweight hook protection

16. Pre-authentication filters

17. Memsherlock

18. Containing denial-of-service attacks in broadcast authentication in sensor networks

19. Analyzing network traffic to detect self-decrypting exploit code

20. A k -anonymous communication protocol for overlay networks

21. TinySeRSync

22. Automatic diagnosis and response to memory corruption vulnerabilities

23. Group-based key pre-distribution in wireless sensor networks

24. An efficient scheme for authenticating public keys in sensor networks

25. Session details: Sensor networks

26. Location-based pairwise key establishments for static sensor networks

27. Efficient self-healing group key distribution with revocation capability

28. Learning attack strategies from intrusion alerts

30. Constructing attack scenarios through correlation of intrusion alerts

Catalog

Books, media, physical & digital resources