Follow
Peng Liu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at ist.psu.edu - Homepage
Title
Cited by
Cited by
Year
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 first IEEE international conference on smart grid communications, 327-332, 2010
6362010
Incentive-based modeling and inference of attacker intent, objectives, and strategies
P Liu, W Zang, M Yu
ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005
3732005
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
3352014
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
3062010
The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
W Zhou, Y Jia, A Peng, Y Zhang, P Liu
IEEE Internet of things Journal 6 (2), 1606-1616, 2018
2932018
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2015
2592015
Proactive Worm Containment (PWC) For Enterprise Networks
PL Y. Jhi
US Patent 8,904,535, 2015
259*2015
Proactive worm containment (PWC) for enterprise networks
US Patent 20,090,031,423, 0
259*
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the {Google-Play} Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
2412015
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
2282014
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002
2232002
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2052014
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008
1962008
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
1702009
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber situational awareness, 3-13, 2010
1602010
Retrieval of relevant historical data triage operations in security operation centers
T Lin, C Zhong, J Yen, P Liu
From Database to Cyber Security, 227-243, 2018
1592018
Architectures for intrusion tolerant database systems
P Liu
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
1512002
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1332009
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
B Luo, D Lee, WC Lee, P Liu
Proceedings of the thirteenth ACM international conference on Information …, 2004
1322004
Rewriting histories: Recovering from malicious transactions
P Liu, P Ammann, S Jajodia
Security of Data and Transaction Processing, 7-40, 2000
1262000
The system can't perform the operation now. Try again later.
Articles 1–20