Peng Liu
Peng Liu
Raymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State University
Verified email at - Homepage
Cited by
Cited by
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 first IEEE international conference on smart grid communications, 327-332, 2010
The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
W Zhou, Y Jia, A Peng, Y Zhang, P Liu
IEEE Internet of things Journal 6 (2), 1606-1616, 2018
Incentive-based modeling and inference of attacker intent, objectives, and strategies
P Liu, W Zang, M Yu
ACM Transactions on Information and System Security (TISSEC) 8 (1), 78-118, 2005
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
Proactive worm containment (PWC) for enterprise networks
P Liu, YC Jhi, L Li
US Patent 8,904,535, 2015
Proactive Worm Containment (PWC) For Enterprise Networks
PL Y. Jhi
US Patent 8,904,535, 2015
Proactive worm containment (PWC) for enterprise networks
US Patent 20,090,031,423, 0
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} security symposium ({USENIX} security 15), 659-674, 2015
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
IEEE transactions on dependable and secure computing 7 (1), 65-79, 2008
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness: Issues and Research, 3-13, 2010
Retrieval of relevant historical data triage operations in security operation centers
T Lin, C Zhong, J Yen, P Liu
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
Architectures for intrusion tolerant database systems
P Liu
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
B Luo, D Lee, WC Lee, P Liu
Proceedings of the thirteenth ACM international conference on Information …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20