|
Search the dblp DataBase
William A. Arbaugh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves
Personal Secure Booting. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:130-144 [Conf]
- D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith
Security in Active Networks. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:433-451 [Conf]
- Yuan Yuan, Daqing Gu, William A. Arbaugh, Jinyun Zhang
High-Performance MAC for High-Capacity Wireless LANs. [Citation Graph (0, 0)][DBLP] ICCCN, 2004, pp:167-172 [Conf]
- Jesus Molina, William A. Arbaugh
Using Independent Auditors as Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:291-302 [Conf]
- Arunesh Mishra, Eric Rozner, Suman Banerjee, William A. Arbaugh
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage. [Citation Graph (0, 0)][DBLP] Internet Measurment Conference, 2005, pp:311-316 [Conf]
- Arunesh Mishra, Minho Shin, William A. Arbaugh
Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. [Citation Graph (0, 0)][DBLP] INFOCOM, 2004, pp:- [Conf]
- Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
Robust Routing in Malicious Environment for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:36-47 [Conf]
- Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A. Arbaugh
Toward resilient security in wireless sensor networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2005, pp:34-45 [Conf]
- Minho Shin, Arunesh Mishra, William A. Arbaugh
Improving the Latency of 802.11 hand-offs using Neighbor Graphs. [Citation Graph (0, 0)][DBLP] MobiSys, 2004, pp:- [Conf]
- William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith
Automated Recovery in a Secure Bootstrap Process. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Aram Khalili, Jonathan Katz, William A. Arbaugh
Toward Secure Key Distribution in Truly Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] SAINT Workshops, 2003, pp:342-346 [Conf]
- Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh
Partially overlapped channels not considered harmful. [Citation Graph (0, 0)][DBLP] SIGMETRICS/Performance, 2006, pp:63-74 [Conf]
- William A. Arbaugh, David J. Farber, Jonathan M. Smith
A Secure and Reliable Bootstrap Architecture. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:65-71 [Conf]
- Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen
A Trend Analysis of Exploitations. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2001, pp:214-0 [Conf]
- Chuk-Yang Seng, William A. Arbaugh
A Secure Trust Establishment Model. [Citation Graph (0, 0)][DBLP] SUTC (1), 2006, pp:78-85 [Conf]
- Adam Agnew, Adam Sulmicki, Ronald Minnich, William A. Arbaugh
Flexibility in ROM: A Stackable Open Source BIOS [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2003, pp:115-124 [Conf]
- Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:179-194 [Conf]
- Russell Housley, William A. Arbaugh
Security problems in 802.11-based networks. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:5, pp:31-34 [Journal]
- Arunesh Mishra, Minho Shin, William A. Arbaugh
An empirical analysis of the IEEE 802.11 MAC layer handoff process. [Citation Graph (0, 0)][DBLP] Computer Communication Review, 2003, v:33, n:2, pp:93-102 [Journal]
- William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith
Security for Virtual Private Intranets. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1998, v:31, n:9, pp:48-55 [Journal]
- William A. Arbaugh, William L. Fithen, John McHugh
Windows of Vulnerability: A Case Study Analysis. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2000, v:33, n:12, pp:52-59 [Journal]
- William A. Arbaugh, Leendert van Doorn
Guest Editors' Introduction: Embedded Security: Challenges and Concerns. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:10, pp:40-41 [Journal]
- William A. Arbaugh
Security: Technical, Social, and Legal Challenges. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:2, pp:109-111 [Journal]
- William A. Arbaugh
Improving the TCPA Specification. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:8, pp:77-79 [Journal]
- William A. Arbaugh
Firewalls: An Outdated Defense. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2003, v:36, n:6, pp:112-113 [Journal]
- William A. Arbaugh
Wireless Security Is Different. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2003, v:36, n:8, pp:99-101 [Journal]
- William A. Arbaugh
A Patch in Nine Saves Time? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:6, pp:82-83 [Journal]
- William A. Arbaugh
he Real Risk of Digital Voting? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:12, pp:124-125 [Journal]
- Nick L. Petroni Jr., Aaron Walters, Timothy Fraser, William A. Arbaugh
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:4, pp:197-210 [Journal]
- William A. Arbaugh
Guest Editor's Introduction: Wired on Wireless. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:26-27 [Journal]
- Nick L. Petroni Jr., William A. Arbaugh
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:1, pp:28-36 [Journal]
- Arunesh Mishra, Suman Banerjee, William A. Arbaugh
Weighted coloring based channel assignment for WLANs. [Citation Graph (0, 0)][DBLP] Mobile Computing and Communications Review, 2005, v:9, n:3, pp:19-31 [Journal]
- Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh
Client-driven channel management for wireless LANs. [Citation Graph (0, 0)][DBLP] Mobile Computing and Communications Review, 2006, v:10, n:4, pp:8-10 [Journal]
- Arunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh, Timothy Fraser
Security issues in IEEE 802.11 wireless local area networks: a survey. [Citation Graph (0, 0)][DBLP] Wireless Communications and Mobile Computing, 2004, v:4, n:8, pp:821-833 [Journal]
- Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:489-498 [Conf]
- Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh
A Client-Driven Approach for Channel Management in Wireless LANs. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
VICI Virtual Machine Introspection for Cognitive Immunity. [Citation Graph (, )][DBLP]
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. [Citation Graph (, )][DBLP]
Applying flow-sensitive CQUAL to verify MINIX authorization check placement. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.306secs
|