2007 | ||
---|---|---|
37 | EE | Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh: AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. ATC 2007: 489-498 |
2006 | ||
36 | EE | Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh: A Client-Driven Approach for Channel Management in Wireless LANs. INFOCOM 2006 |
35 | EE | Timothy Fraser, Nick L. Petroni Jr., William A. Arbaugh: Applying flow-sensitive CQUAL to verify MINIX authorization check placement. PLAS 2006: 3-6 |
34 | EE | Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh: Partially overlapped channels not considered harmful. SIGMETRICS/Performance 2006: 63-74 |
33 | EE | Chuk-Yang Seng, William A. Arbaugh: A Secure Trust Establishment Model. SUTC (1) 2006: 78-85 |
32 | EE | Nick L. Petroni Jr., Aaron Walters, Timothy Fraser, William A. Arbaugh: FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation 3(4): 197-210 (2006) |
31 | EE | Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh: Client-driven channel management for wireless LANs. Mobile Computing and Communications Review 10(4): 8-10 (2006) |
2005 | ||
30 | EE | Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh: Robust Routing in Malicious Environment for Ad Hoc Networks. ISPEC 2005: 36-47 |
29 | EE | Arunesh Mishra, Eric Rozner, Suman Banerjee, William A. Arbaugh: Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage. Internet Measurment Conference 2005: 311-316 |
28 | EE | Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A. Arbaugh: Toward resilient security in wireless sensor networks. MobiHoc 2005: 34-45 |
27 | EE | Arunesh Mishra, Suman Banerjee, William A. Arbaugh: Weighted coloring based channel assignment for WLANs. Mobile Computing and Communications Review 9(3): 19-31 (2005) |
2004 | ||
26 | Yuan Yuan, Daqing Gu, William A. Arbaugh, Jinyun Zhang: High-Performance MAC for High-Capacity Wireless LANs. ICCCN 2004: 167-172 | |
25 | EE | Arunesh Mishra, Minho Shin, William A. Arbaugh: Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. INFOCOM 2004 |
24 | Minho Shin, Arunesh Mishra, William A. Arbaugh: Improving the Latency of 802.11 hand-offs using Neighbor Graphs. MobiSys 2004 | |
23 | EE | Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. USENIX Security Symposium 2004: 179-194 |
22 | William A. Arbaugh: he Real Risk of Digital Voting? IEEE Computer 37(12): 124-125 (2004) | |
21 | EE | William A. Arbaugh: A Patch in Nine Saves Time? IEEE Computer 37(6): 82-83 (2004) |
20 | EE | William A. Arbaugh: Guest Editor's Introduction: Wired on Wireless. IEEE Security & Privacy 2(3): 26-27 (2004) |
19 | EE | Arunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh, Timothy Fraser: Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing 4(8): 821-833 (2004) |
2003 | ||
18 | EE | Aram Khalili, Jonathan Katz, William A. Arbaugh: Toward Secure Key Distribution in Truly Ad-Hoc Networks. SAINT Workshops 2003: 342-346 |
17 | EE | Adam Agnew, Adam Sulmicki, Ronald Minnich, William A. Arbaugh: Flexibility in ROM: A Stackable Open Source BIOS USENIX Annual Technical Conference, FREENIX Track 2003: 115-124 |
16 | EE | Russell Housley, William A. Arbaugh: Security problems in 802.11-based networks. Commun. ACM 46(5): 31-34 (2003) |
15 | EE | Arunesh Mishra, Minho Shin, William A. Arbaugh: An empirical analysis of the IEEE 802.11 MAC layer handoff process. Computer Communication Review 33(2): 93-102 (2003) |
14 | EE | William A. Arbaugh: Firewalls: An Outdated Defense. IEEE Computer 36(6): 112-113 (2003) |
13 | EE | William A. Arbaugh: Wireless Security Is Different. IEEE Computer 36(8): 99-101 (2003) |
12 | EE | Nick L. Petroni Jr., William A. Arbaugh: The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. IEEE Security & Privacy 1(1): 28-36 (2003) |
2002 | ||
11 | EE | Jesus Molina, William A. Arbaugh: Using Independent Auditors as Intrusion Detection Systems. ICICS 2002: 291-302 |
10 | EE | William A. Arbaugh: Security: Technical, Social, and Legal Challenges. IEEE Computer 35(2): 109-111 (2002) |
9 | EE | William A. Arbaugh: Improving the TCPA Specification. IEEE Computer 35(8): 77-79 (2002) |
2001 | ||
8 | EE | Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves: Personal Secure Booting. ACISP 2001: 130-144 |
7 | EE | Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen: A Trend Analysis of Exploitations. IEEE Symposium on Security and Privacy 2001: 214- |
6 | EE | William A. Arbaugh, Leendert van Doorn: Guest Editors' Introduction: Embedded Security: Challenges and Concerns. IEEE Computer 34(10): 40-41 (2001) |
2000 | ||
5 | EE | William A. Arbaugh, William L. Fithen, John McHugh: Windows of Vulnerability: A Case Study Analysis. IEEE Computer 33(12): 52-59 (2000) |
1999 | ||
4 | D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith: Security in Active Networks. Secure Internet Programming 1999: 433-451 | |
1998 | ||
3 | EE | William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith: Automated Recovery in a Secure Bootstrap Process. NDSS 1998 |
2 | William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith: Security for Virtual Private Intranets. IEEE Computer 31(9): 48-55 (1998) | |
1997 | ||
1 | EE | William A. Arbaugh, David J. Farber, Jonathan M. Smith: A Secure and Reliable Bootstrap Architecture. IEEE Symposium on Security and Privacy 1997: 65-71 |