Peng Liu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at - Homepage
Cited by
Cited by
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 first IEEE international conference on smart grid communications, 327-332, 2010
Incentive-based modeling and inference of attacker intent, objectives, and strategies
P Liu, W Zang, M Yu
ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
W Zhou, Y Jia, A Peng, Y Zhang, P Liu
IEEE Internet of Things Journal 6 (2), 1606-1616, 2018
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2015
Proactive Worm Containment (PWC) For Enterprise Networks
PL Y. Jhi
US Patent 8,904,535, 2015
Proactive worm containment (PWC) for enterprise networks
US Patent 20,090,031,423, 0
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber situational awareness, 3-13, 2010
Architectures for intrusion tolerant database systems
P Liu
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
B Luo, D Lee, WC Lee, P Liu
Proceedings of the thirteenth ACM international conference on Information …, 2004
Rewriting histories: Recovering from malicious transactions
P Liu, P Ammann, S Jajodia
Security of Data and Transaction Processing, 7-40, 2000
Detecting software theft via system call based birthmarks
X Wang, YC Jhi, S Zhu, P Liu
2009 Annual Computer Security Applications Conference, 149-158, 2009
The system can't perform the operation now. Try again later.
Articles 1–20