2007 |
37 | EE | Zhi (Judy) Fu,
Minho Shin,
John C. Strassner,
Nitin Jain,
Vishnu Ram,
William A. Arbaugh:
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks.
ATC 2007: 489-498 |
2006 |
36 | EE | Arunesh Mishra,
Vladimir Brik,
Suman Banerjee,
Aravind Srinivasan,
William A. Arbaugh:
A Client-Driven Approach for Channel Management in Wireless LANs.
INFOCOM 2006 |
35 | EE | Timothy Fraser,
Nick L. Petroni Jr.,
William A. Arbaugh:
Applying flow-sensitive CQUAL to verify MINIX authorization check placement.
PLAS 2006: 3-6 |
34 | EE | Arunesh Mishra,
Vivek Shrivastava,
Suman Banerjee,
William A. Arbaugh:
Partially overlapped channels not considered harmful.
SIGMETRICS/Performance 2006: 63-74 |
33 | EE | Chuk-Yang Seng,
William A. Arbaugh:
A Secure Trust Establishment Model.
SUTC (1) 2006: 78-85 |
32 | EE | Nick L. Petroni Jr.,
Aaron Walters,
Timothy Fraser,
William A. Arbaugh:
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory.
Digital Investigation 3(4): 197-210 (2006) |
31 | EE | Arunesh Mishra,
Vladimir Brik,
Suman Banerjee,
Aravind Srinivasan,
William A. Arbaugh:
Client-driven channel management for wireless LANs.
Mobile Computing and Communications Review 10(4): 8-10 (2006) |
2005 |
30 | EE | Zhongchao Yu,
Chuk-Yang Seng,
Tao Jiang,
Xue Wu,
William A. Arbaugh:
Robust Routing in Malicious Environment for Ad Hoc Networks.
ISPEC 2005: 36-47 |
29 | EE | Arunesh Mishra,
Eric Rozner,
Suman Banerjee,
William A. Arbaugh:
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage.
Internet Measurment Conference 2005: 311-316 |
28 | EE | Hao Yang,
Fan Ye,
Yuan Yuan,
Songwu Lu,
William A. Arbaugh:
Toward resilient security in wireless sensor networks.
MobiHoc 2005: 34-45 |
27 | EE | Arunesh Mishra,
Suman Banerjee,
William A. Arbaugh:
Weighted coloring based channel assignment for WLANs.
Mobile Computing and Communications Review 9(3): 19-31 (2005) |
2004 |
26 | | Yuan Yuan,
Daqing Gu,
William A. Arbaugh,
Jinyun Zhang:
High-Performance MAC for High-Capacity Wireless LANs.
ICCCN 2004: 167-172 |
25 | EE | Arunesh Mishra,
Minho Shin,
William A. Arbaugh:
Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network.
INFOCOM 2004 |
24 | | Minho Shin,
Arunesh Mishra,
William A. Arbaugh:
Improving the Latency of 802.11 hand-offs using Neighbor Graphs.
MobiSys 2004 |
23 | EE | Nick L. Petroni Jr.,
Timothy Fraser,
Jesus Molina,
William A. Arbaugh:
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor.
USENIX Security Symposium 2004: 179-194 |
22 | | William A. Arbaugh:
he Real Risk of Digital Voting?
IEEE Computer 37(12): 124-125 (2004) |
21 | EE | William A. Arbaugh:
A Patch in Nine Saves Time?
IEEE Computer 37(6): 82-83 (2004) |
20 | EE | William A. Arbaugh:
Guest Editor's Introduction: Wired on Wireless.
IEEE Security & Privacy 2(3): 26-27 (2004) |
19 | EE | Arunesh Mishra,
Nick L. Petroni Jr.,
William A. Arbaugh,
Timothy Fraser:
Security issues in IEEE 802.11 wireless local area networks: a survey.
Wireless Communications and Mobile Computing 4(8): 821-833 (2004) |
2003 |
18 | EE | Aram Khalili,
Jonathan Katz,
William A. Arbaugh:
Toward Secure Key Distribution in Truly Ad-Hoc Networks.
SAINT Workshops 2003: 342-346 |
17 | EE | Adam Agnew,
Adam Sulmicki,
Ronald Minnich,
William A. Arbaugh:
Flexibility in ROM: A Stackable Open Source BIOS
USENIX Annual Technical Conference, FREENIX Track 2003: 115-124 |
16 | EE | Russell Housley,
William A. Arbaugh:
Security problems in 802.11-based networks.
Commun. ACM 46(5): 31-34 (2003) |
15 | EE | Arunesh Mishra,
Minho Shin,
William A. Arbaugh:
An empirical analysis of the IEEE 802.11 MAC layer handoff process.
Computer Communication Review 33(2): 93-102 (2003) |
14 | EE | William A. Arbaugh:
Firewalls: An Outdated Defense.
IEEE Computer 36(6): 112-113 (2003) |
13 | EE | William A. Arbaugh:
Wireless Security Is Different.
IEEE Computer 36(8): 99-101 (2003) |
12 | EE | Nick L. Petroni Jr.,
William A. Arbaugh:
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study.
IEEE Security & Privacy 1(1): 28-36 (2003) |
2002 |
11 | EE | Jesus Molina,
William A. Arbaugh:
Using Independent Auditors as Intrusion Detection Systems.
ICICS 2002: 291-302 |
10 | EE | William A. Arbaugh:
Security: Technical, Social, and Legal Challenges.
IEEE Computer 35(2): 109-111 (2002) |
9 | EE | William A. Arbaugh:
Improving the TCPA Specification.
IEEE Computer 35(8): 77-79 (2002) |
2001 |
8 | EE | Naomaru Itoi,
William A. Arbaugh,
Samuela J. Pollack,
Daniel M. Reeves:
Personal Secure Booting.
ACISP 2001: 130-144 |
7 | EE | Hilary K. Browne,
William A. Arbaugh,
John McHugh,
William L. Fithen:
A Trend Analysis of Exploitations.
IEEE Symposium on Security and Privacy 2001: 214- |
6 | EE | William A. Arbaugh,
Leendert van Doorn:
Guest Editors' Introduction: Embedded Security: Challenges and Concerns.
IEEE Computer 34(10): 40-41 (2001) |
2000 |
5 | EE | William A. Arbaugh,
William L. Fithen,
John McHugh:
Windows of Vulnerability: A Case Study Analysis.
IEEE Computer 33(12): 52-59 (2000) |
1999 |
4 | | D. Scott Alexander,
William A. Arbaugh,
Angelos D. Keromytis,
Jonathan M. Smith:
Security in Active Networks.
Secure Internet Programming 1999: 433-451 |
1998 |
3 | EE | William A. Arbaugh,
Angelos D. Keromytis,
David J. Farber,
Jonathan M. Smith:
Automated Recovery in a Secure Bootstrap Process.
NDSS 1998 |
2 | | William A. Arbaugh,
James R. Davin,
David J. Farber,
Jonathan M. Smith:
Security for Virtual Private Intranets.
IEEE Computer 31(9): 48-55 (1998) |
1997 |
1 | EE | William A. Arbaugh,
David J. Farber,
Jonathan M. Smith:
A Secure and Reliable Bootstrap Architecture.
IEEE Symposium on Security and Privacy 1997: 65-71 |