Peng Li

Affiliations:
  • University of North Carolina, Chapel Hill, USA (PhD 2014)


According to our database1, Peng Li authored at least 8 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Replica Placement for Availability in the Worst Case.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Replication and placement for security in distributed systems.
PhD thesis, 2014

StopWatch: A Cloud Architecture for Timing Channel Mitigation.
ACM Trans. Inf. Syst. Secur., 2014

2013
Mitigating access-driven timing channels in clouds using StopWatch.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2010
On Challenges in Evaluating Malware Clustering.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Automatically Adapting a Trained Anomaly Detector to Software Patches.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2008
Distinguishing between FE and DDoS Using Randomness Check.
Proceedings of the Information Security, 11th International Conference, 2008

Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008


  Loading...