The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William A. Arbaugh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves
    Personal Secure Booting. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:130-144 [Conf]
  2. D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith
    Security in Active Networks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:433-451 [Conf]
  3. Yuan Yuan, Daqing Gu, William A. Arbaugh, Jinyun Zhang
    High-Performance MAC for High-Capacity Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:167-172 [Conf]
  4. Jesus Molina, William A. Arbaugh
    Using Independent Auditors as Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:291-302 [Conf]
  5. Arunesh Mishra, Eric Rozner, Suman Banerjee, William A. Arbaugh
    Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:311-316 [Conf]
  6. Arunesh Mishra, Minho Shin, William A. Arbaugh
    Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  7. Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
    Robust Routing in Malicious Environment for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:36-47 [Conf]
  8. Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A. Arbaugh
    Toward resilient security in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:34-45 [Conf]
  9. Minho Shin, Arunesh Mishra, William A. Arbaugh
    Improving the Latency of 802.11 hand-offs using Neighbor Graphs. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2004, pp:- [Conf]
  10. William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
    Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  11. Aram Khalili, Jonathan Katz, William A. Arbaugh
    Toward Secure Key Distribution in Truly Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:342-346 [Conf]
  12. Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh
    Partially overlapped channels not considered harmful. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:63-74 [Conf]
  13. William A. Arbaugh, David J. Farber, Jonathan M. Smith
    A Secure and Reliable Bootstrap Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:65-71 [Conf]
  14. Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen
    A Trend Analysis of Exploitations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:214-0 [Conf]
  15. Chuk-Yang Seng, William A. Arbaugh
    A Secure Trust Establishment Model. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:78-85 [Conf]
  16. Adam Agnew, Adam Sulmicki, Ronald Minnich, William A. Arbaugh
    Flexibility in ROM: A Stackable Open Source BIOS [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2003, pp:115-124 [Conf]
  17. Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh
    Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:179-194 [Conf]
  18. Russell Housley, William A. Arbaugh
    Security problems in 802.11-based networks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:5, pp:31-34 [Journal]
  19. Arunesh Mishra, Minho Shin, William A. Arbaugh
    An empirical analysis of the IEEE 802.11 MAC layer handoff process. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2003, v:33, n:2, pp:93-102 [Journal]
  20. William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith
    Security for Virtual Private Intranets. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:9, pp:48-55 [Journal]
  21. William A. Arbaugh, William L. Fithen, John McHugh
    Windows of Vulnerability: A Case Study Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:12, pp:52-59 [Journal]
  22. William A. Arbaugh, Leendert van Doorn
    Guest Editors' Introduction: Embedded Security: Challenges and Concerns. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:40-41 [Journal]
  23. William A. Arbaugh
    Security: Technical, Social, and Legal Challenges. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:2, pp:109-111 [Journal]
  24. William A. Arbaugh
    Improving the TCPA Specification. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:8, pp:77-79 [Journal]
  25. William A. Arbaugh
    Firewalls: An Outdated Defense. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:6, pp:112-113 [Journal]
  26. William A. Arbaugh
    Wireless Security Is Different. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:8, pp:99-101 [Journal]
  27. William A. Arbaugh
    A Patch in Nine Saves Time? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:6, pp:82-83 [Journal]
  28. William A. Arbaugh
    he Real Risk of Digital Voting? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:12, pp:124-125 [Journal]
  29. Nick L. Petroni Jr., Aaron Walters, Timothy Fraser, William A. Arbaugh
    FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:4, pp:197-210 [Journal]
  30. William A. Arbaugh
    Guest Editor's Introduction: Wired on Wireless. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:26-27 [Journal]
  31. Nick L. Petroni Jr., William A. Arbaugh
    The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:28-36 [Journal]
  32. Arunesh Mishra, Suman Banerjee, William A. Arbaugh
    Weighted coloring based channel assignment for WLANs. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2005, v:9, n:3, pp:19-31 [Journal]
  33. Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh
    Client-driven channel management for wireless LANs. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2006, v:10, n:4, pp:8-10 [Journal]
  34. Arunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh, Timothy Fraser
    Security issues in IEEE 802.11 wireless local area networks: a survey. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2004, v:4, n:8, pp:821-833 [Journal]
  35. Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh
    AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:489-498 [Conf]
  36. Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh
    A Client-Driven Approach for Channel Management in Wireless LANs. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  37. VICI Virtual Machine Introspection for Cognitive Immunity. [Citation Graph (, )][DBLP]


  38. Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. [Citation Graph (, )][DBLP]


  39. Applying flow-sensitive CQUAL to verify MINIX authorization check placement. [Citation Graph (, )][DBLP]


Search in 0.060secs, Finished in 0.062secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002