dblp.uni-trier.dewww.uni-trier.de

William A. Arbaugh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2007
37EEZhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh: AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. ATC 2007: 489-498
2006
36EEArunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh: A Client-Driven Approach for Channel Management in Wireless LANs. INFOCOM 2006
35EETimothy Fraser, Nick L. Petroni Jr., William A. Arbaugh: Applying flow-sensitive CQUAL to verify MINIX authorization check placement. PLAS 2006: 3-6
34EEArunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh: Partially overlapped channels not considered harmful. SIGMETRICS/Performance 2006: 63-74
33EEChuk-Yang Seng, William A. Arbaugh: A Secure Trust Establishment Model. SUTC (1) 2006: 78-85
32EENick L. Petroni Jr., Aaron Walters, Timothy Fraser, William A. Arbaugh: FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation 3(4): 197-210 (2006)
31EEArunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh: Client-driven channel management for wireless LANs. Mobile Computing and Communications Review 10(4): 8-10 (2006)
2005
30EEZhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh: Robust Routing in Malicious Environment for Ad Hoc Networks. ISPEC 2005: 36-47
29EEArunesh Mishra, Eric Rozner, Suman Banerjee, William A. Arbaugh: Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage. Internet Measurment Conference 2005: 311-316
28EEHao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A. Arbaugh: Toward resilient security in wireless sensor networks. MobiHoc 2005: 34-45
27EEArunesh Mishra, Suman Banerjee, William A. Arbaugh: Weighted coloring based channel assignment for WLANs. Mobile Computing and Communications Review 9(3): 19-31 (2005)
2004
26 Yuan Yuan, Daqing Gu, William A. Arbaugh, Jinyun Zhang: High-Performance MAC for High-Capacity Wireless LANs. ICCCN 2004: 167-172
25EEArunesh Mishra, Minho Shin, William A. Arbaugh: Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. INFOCOM 2004
24 Minho Shin, Arunesh Mishra, William A. Arbaugh: Improving the Latency of 802.11 hand-offs using Neighbor Graphs. MobiSys 2004
23EENick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh: Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. USENIX Security Symposium 2004: 179-194
22 William A. Arbaugh: he Real Risk of Digital Voting? IEEE Computer 37(12): 124-125 (2004)
21EEWilliam A. Arbaugh: A Patch in Nine Saves Time? IEEE Computer 37(6): 82-83 (2004)
20EEWilliam A. Arbaugh: Guest Editor's Introduction: Wired on Wireless. IEEE Security & Privacy 2(3): 26-27 (2004)
19EEArunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh, Timothy Fraser: Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing 4(8): 821-833 (2004)
2003
18EEAram Khalili, Jonathan Katz, William A. Arbaugh: Toward Secure Key Distribution in Truly Ad-Hoc Networks. SAINT Workshops 2003: 342-346
17EEAdam Agnew, Adam Sulmicki, Ronald Minnich, William A. Arbaugh: Flexibility in ROM: A Stackable Open Source BIOS USENIX Annual Technical Conference, FREENIX Track 2003: 115-124
16EERussell Housley, William A. Arbaugh: Security problems in 802.11-based networks. Commun. ACM 46(5): 31-34 (2003)
15EEArunesh Mishra, Minho Shin, William A. Arbaugh: An empirical analysis of the IEEE 802.11 MAC layer handoff process. Computer Communication Review 33(2): 93-102 (2003)
14EEWilliam A. Arbaugh: Firewalls: An Outdated Defense. IEEE Computer 36(6): 112-113 (2003)
13EEWilliam A. Arbaugh: Wireless Security Is Different. IEEE Computer 36(8): 99-101 (2003)
12EENick L. Petroni Jr., William A. Arbaugh: The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. IEEE Security & Privacy 1(1): 28-36 (2003)
2002
11EEJesus Molina, William A. Arbaugh: Using Independent Auditors as Intrusion Detection Systems. ICICS 2002: 291-302
10EEWilliam A. Arbaugh: Security: Technical, Social, and Legal Challenges. IEEE Computer 35(2): 109-111 (2002)
9EEWilliam A. Arbaugh: Improving the TCPA Specification. IEEE Computer 35(8): 77-79 (2002)
2001
8EENaomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves: Personal Secure Booting. ACISP 2001: 130-144
7EEHilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen: A Trend Analysis of Exploitations. IEEE Symposium on Security and Privacy 2001: 214-
6EEWilliam A. Arbaugh, Leendert van Doorn: Guest Editors' Introduction: Embedded Security: Challenges and Concerns. IEEE Computer 34(10): 40-41 (2001)
2000
5EEWilliam A. Arbaugh, William L. Fithen, John McHugh: Windows of Vulnerability: A Case Study Analysis. IEEE Computer 33(12): 52-59 (2000)
1999
4 D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith: Security in Active Networks. Secure Internet Programming 1999: 433-451
1998
3EEWilliam A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith: Automated Recovery in a Secure Bootstrap Process. NDSS 1998
2 William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith: Security for Virtual Private Intranets. IEEE Computer 31(9): 48-55 (1998)
1997
1EEWilliam A. Arbaugh, David J. Farber, Jonathan M. Smith: A Secure and Reliable Bootstrap Architecture. IEEE Symposium on Security and Privacy 1997: 65-71

Coauthor Index

1Adam Agnew [17]
2D. Scott Alexander [4]
3Suman Banerjee [27] [29] [31] [34] [36]
4Vladimir Brik [31] [36]
5Hilary K. Browne [7]
6James R. Davin [2]
7Leendert van Doorn [6]
8David J. Farber [1] [2] [3]
9William L. Fithen [5] [7]
10Timothy Fraser [19] [23] [32] [35]
11Zhi (Judy) Fu [37]
12Daqing Gu [26]
13Russell Housley [16]
14Naomaru Itoi [8]
15Nitin Jain [37]
16Tao Jiang [30]
17Jonathan Katz [18]
18Angelos D. Keromytis [3] [4]
19Aram Khalili [18]
20Songwu Lu [28]
21John McHugh [5] [7]
22Ronald Minnich [17]
23Arunesh Mishra [15] [19] [24] [25] [27] [29] [31] [34] [36]
24Jesus Molina [11] [23]
25Nick L. Petroni Jr. [12] [19] [23] [32] [35]
26Samuela J. Pollack [8]
27Vishnu Ram [37]
28Daniel M. Reeves [8]
29Eric Rozner [29]
30Chuk-Yang Seng [30] [33]
31Minho Shin [15] [24] [25] [37]
32Vivek Shrivastava [34]
33Jonathan M. Smith [1] [2] [3] [4]
34Aravind Srinivasan [31] [36]
35John C. Strassner [37]
36Adam Sulmicki [17]
37Aaron Walters [32]
38Xue Wu [30]
39Hao Yang [28]
40Fan Ye [28]
41Zhongchao Yu [30]
42Yuan Yuan [26] [28]
43Jinyun Zhang [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)