Peng

Results: 1037



#Item
351Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
352Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
353Telecommunications engineering / Technology / IEEE 802.11 / Direct-sequence spread spectrum / Wireless networking / Chip / Spread spectrum / Frequency-hopping spread spectrum / Process gain / OSI protocols / Multiplexing / Radio resource management

Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure ∗ An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
354Alternative energy / Energy conversion / Low-carbon economy / Energy policy / Solar energy / Renewable portfolio standard / Special-use permit / American Solar Energy Society / Solar power in the United States / Energy / Renewable energy / Technology

An Analysis of Stakeholder Participation in Utility Commission Public Hearings for Utility-Scale Solar Projects in North Carolina By Alexandra Carroll, Amanda Gaffey, Stephen Peng,

Add to Reading List

Source URL: www.ie.unc.edu

Language: English - Date: 2015-04-01 13:36:13
355Digital audio / Watermark / Transmission Control Protocol / Latency / Network packet / Information / Paper / Printing / Watermarking / Digital watermarking / Audio watermark detection

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques∗ Pai Peng Peng Ning Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
356IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
357Computing / Wireless sensor network / IEEE Communications Society / International Conference on Information Processing in Sensor Networks / Wireless security / Telecommunications engineering / Association for Computing Machinery / Ambient intelligence / Support / Wireless networking / International nongovernmental organizations / Technology

Peng Ning (As of MarchDepartment of Computer Science North Carolina State University Telephone: (Email: ; URL: http://www.csc.ncsu.edu/faculty/ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 18:58:42
358Virtual machines / Programming language implementation / Hyper-V / Kernel / Hypervisor / Ring / Rootkit / Xen / Memory management unit / System software / Software / Central processing unit

HIMA: A Hypervisor-Based Integrity Measurement Agent Ahmed M. Azab, Peng Ning, Emre C. Sezer North Carolina State University {amazab, pning, ecsezer}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
359Relevance feedback / Full text search / Inverted index / Search engine / Relevance / PageRank / Information science / Information retrieval / Search engine indexing

Tianwang Search Engine at TREC 2005: Terabyte Track YAN Hongfei, LI Jingjing, ZHU Jiaji, PENG Bo Network and Distribution System Laboratory School of Electronic Engineering and Computer Science Peking University Beijing,

Add to Reading List

Source URL: trec.nist.gov

Language: English - Date: 2006-02-21 09:28:40
360Network performance / Transmission Control Protocol / Greedy algorithm / Audio watermark detection / Packet loss / Communications protocol / Data / Information / Computing

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets∗ Pai Peng, Peng Ning, Douglas S. Reeves Xinyuan Wang Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
UPDATE