William A. Arbaugh

Affiliations:
  • University of Maryland, College Park, USA


According to our database1, William A. Arbaugh authored at least 56 papers between 1997 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2013
Crossing the Great Divide: From Research to Market.
IEEE Secur. Priv., 2013

2011
Living with Insecurity.
IEEE Secur. Priv., 2011

2009
Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks.
KSII Trans. Internet Inf. Syst., 2009

2008
VICI Virtual Machine Introspection for Cognitive Immunity.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Towards Scalable MAC Design for High-Speed Wireless LANs.
EURASIP J. Wirel. Commun. Netw., 2007

Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Extensible Authentication Protocol (EAP) Password Authenticated Exchange.
RFC, November, 2006

Client-driven channel management for wireless LANs.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006

Wireless Network Security and Interworking.
Proc. IEEE, 2006

FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory.
Digit. Investig., 2006

An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

A Secure Trust Establishment Model.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Partially overlapped channels not considered harmful.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Applying flow-sensitive CQUAL to verify MINIX authorization check placement.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

A Client-Driven Approach for Channel Management in Wireless LANs.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Weighted coloring based channel assignment for WLANs.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Toward resilient security in wireless sensor networks.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Robust Routing in Malicious Environment for Ad Hoc Networks.
Proceedings of the Information Security Practice and Experience, 2005

Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Security issues in IEEE 802.11 wireless local area networks: a survey.
Wirel. Commun. Mob. Comput., 2004

Proactive key distribution using neighbor graphs.
IEEE Wirel. Commun., 2004

Guest Editor's Introduction: Wired on Wireless.
IEEE Secur. Priv., 2004

he Real Risk of Digital Voting?
Computer, 2004

A Patch in Nine Saves Time?
Computer, 2004

Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Improving the Latency of 802.11 hand-offs using Neighbor Graphs.
Proceedings of the Second International Conference on Mobile Systems, 2004

Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

High-Performance MAC for High-Capacity Wireless LANs.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study.
IEEE Secur. Priv., 2003

Wireless Security Is Different.
Computer, 2003

Firewalls: An Outdated Defense.
Computer, 2003

An empirical analysis of the IEEE 802.11 MAC layer handoff process.
Comput. Commun. Rev., 2003

Security problems in 802.11-based networks.
Commun. ACM, 2003

Flexibility in ROM: A Stackable Open Source BIOS
Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference, 2003

Toward Secure Key Distribution in Truly Ad-Hoc Networks.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

A secure service discovery protocol for MANET.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Bootstrapping security associations for routing in mobile ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Your 80211 wireless network has no clothes.
IEEE Wirel. Commun., 2002

Improving the TCPA Specification.
Computer, 2002

Security: Technical, Social, and Legal Challenges.
Computer, 2002

Using Independent Auditors as Intrusion Detection Systems.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Authentication for DHCP Messages.
RFC, June, 2001

The price of safety in an active network.
J. Commun. Networks, 2001

Guest Editors' Introduction: Embedded Security: Challenges and Concerns.
Computer, 2001

A Trend Analysis of Exploitations.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Personal Secure Booting.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Windows of Vulnerability: A Case Study Analysis.
Computer, 2000

Secure quality of service handling: SQoSH.
IEEE Commun. Mag., 2000

1999
Security in Active Networks.
Proceedings of the Secure Internet Programming, 1999

1998
A secure active network environment architecture: realization in SwitchWare.
IEEE Netw., 1998

The SwitchWare active network architecture.
IEEE Netw., 1998

Security for Virtual Private Intranets.
Computer, 1998

Safety and security of programmable network infrastructures.
IEEE Commun. Mag., 1998

Automated Recovery in a Secure Bootstrap Process.
Proceedings of the Network and Distributed System Security Symposium, 1998

1997
A Secure and Reliable Bootstrap Architecture.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997


  Loading...