Benjamin W. P. Ramsey

According to our database1, Benjamin W. P. Ramsey authored at least 26 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Misuse-based detection of Z-Wave network attacks.
Comput. Secur., 2017

The Z-Wave routing protocol and its security implications.
Comput. Secur., 2017

Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance.
Proceedings of the Critical Infrastructure Protection XI, 2017

Defending Building Automation Systems Using DECOY Networks.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols.
Int. J. Netw. Secur., 2016

A framework for incorporating insurance in critical infrastructure cyber risk strategies.
Int. J. Crit. Infrastructure Prot., 2016

Evaluating the readiness of cyber first responders responsible for critical infrastructure protection.
Int. J. Crit. Infrastructure Prot., 2016

Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver.
Digit. Investig., 2016

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.
Proceedings of the Critical Infrastructure Protection X, 2016

2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.
IEEE Trans. Dependable Secur. Comput., 2015

Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers.
Int. J. Crit. Infrastructure Prot., 2015

Comparison of parametric and non-parametric statistical features for Z-Wave fingerprinting.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Rogue Z-Wave controllers: A persistent attack channel.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Watching for Weakness in Wild WPANs.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks.
Proceedings of the Critical Infrastructure Protection VII, 2013

ZigBee Device Verification for Securing Industrial Control and Building Automation Systems.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
An RF-DNA verification process for ZigBee networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Improved tools for indoor ZigBee warwalking.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

PHY foundation for multi-factor ZigBee node authentication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Subjective audio quality over a secure IEEE 802.11n network.
Int. J. Secur. Networks, 2011

2009
Voice and video capacity of a secure IEEE 802.11g wireless network.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

2008
Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.
Proceedings of the 2008 IEEE International Performance, 2008


  Loading...