default search action
William A. Arbaugh
Person information
- affiliation: University of Maryland, College Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j29]Terry C. Vickers Benzel, Eric O'Brien, Robert Rodriguez, William Arbaugh, E. John Sebes:
Crossing the Great Divide: From Research to Market. IEEE Secur. Priv. 11(2): 42-46 (2013) - 2011
- [j28]William A. Arbaugh, Deborah A. Frincke:
Living with Insecurity. IEEE Secur. Priv. 9(6): 12-13 (2011)
2000 – 2009
- 2009
- [j27]Minho Shin, William A. Arbaugh:
Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks. KSII Trans. Internet Inf. Syst. 3(1): 5-25 (2009) - 2008
- [c25]Timothy Fraser, Matthew R. Evenson, William A. Arbaugh:
VICI Virtual Machine Introspection for Cognitive Immunity. ACSAC 2008: 87-96 - 2007
- [j26]Yuan Yuan, William A. Arbaugh, Songwu Lu:
Towards Scalable MAC Design for High-Speed Wireless LANs. EURASIP J. Wirel. Commun. Netw. 2007 (2007) - [c24]Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh:
AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. ATC 2007: 489-498 - [c23]Insun Lee, Jihoon Lee, William A. Arbaugh, Daeyoung Kim:
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. ICOIN 2007: 649-658 - 2006
- [j25]Nick L. Petroni Jr., Aaron Walters, Timothy Fraser, William A. Arbaugh:
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. Digit. Investig. 3(4): 197-210 (2006) - [j24]Minho Shin, Justin Ma, Arunesh Mishra, William A. Arbaugh:
Wireless Network Security and Interworking. Proc. IEEE 94(2): 455-466 (2006) - [j23]Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh:
Client-driven channel management for wireless LANs. ACM SIGMOBILE Mob. Comput. Commun. Rev. 10(4): 8-10 (2006) - [c22]Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind Srinivasan, William A. Arbaugh:
A Client-Driven Approach for Channel Management in Wireless LANs. INFOCOM 2006 - [c21]Timothy Fraser, Nick L. Petroni Jr., William A. Arbaugh:
Applying flow-sensitive CQUAL to verify MINIX authorization check placement. PLAS 2006: 3-6 - [c20]Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh:
Partially overlapped channels not considered harmful. SIGMETRICS/Performance 2006: 63-74 - [c19]Chuk-Yang Seng, William A. Arbaugh:
A Secure Trust Establishment Model. SUTC (1) 2006: 78-85 - [c18]Nick L. Petroni Jr., Timothy Fraser, Aaron Walters, William A. Arbaugh:
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. USENIX Security Symposium 2006 - [i2]T. Charles Clancy, William A. Arbaugh:
Extensible Authentication Protocol (EAP) Password Authenticated Exchange. RFC 4746: 1-30 (2006) - 2005
- [j22]Arunesh Mishra, Suman Banerjee, William A. Arbaugh:
Weighted coloring based channel assignment for WLANs. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(3): 19-31 (2005) - [c17]Arunesh Mishra, Eric Rozner, Suman Banerjee, William A. Arbaugh:
Exploiting Partially Overlapping Channels in Wireless Networks: Turning a Peril into an Advantage. Internet Measurement Conference 2005: 311-316 - [c16]Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh:
Robust Routing in Malicious Environment for Ad Hoc Networks. ISPEC 2005: 36-47 - [c15]Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A. Arbaugh:
Toward resilient security in wireless sensor networks. MobiHoc 2005: 34-45 - 2004
- [j21]William A. Arbaugh:
A Patch in Nine Saves Time? Computer 37(6): 82-83 (2004) - [j20]William A. Arbaugh:
he Real Risk of Digital Voting? Computer 37(12): 124-125 (2004) - [j19]William A. Arbaugh:
Guest Editor's Introduction: Wired on Wireless. IEEE Secur. Priv. 2(3): 26-27 (2004) - [j18]Arunesh Mishra, Minho Shin, Nick L. Petroni Jr., T. Charles Clancy, William A. Arbaugh:
Proactive key distribution using neighbor graphs. IEEE Wirel. Commun. 11(1): 26-36 (2004) - [j17]Arunesh Mishra, Nick L. Petroni Jr., William A. Arbaugh, Timothy Fraser:
Security issues in IEEE 802.11 wireless local area networks: a survey. Wirel. Commun. Mob. Comput. 4(8): 821-833 (2004) - [c14]Yuan Yuan, Daqing Gu, William A. Arbaugh, Jinyun Zhang:
High-Performance MAC for High-Capacity Wireless LANs. ICCCN 2004: 167-172 - [c13]Arunesh Mishra, Minho Shin, William A. Arbaugh:
Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. INFOCOM 2004 - [c12]Minho Shin, Arunesh Mishra, William A. Arbaugh:
Improving the Latency of 802.11 hand-offs using Neighbor Graphs. MobiSys 2004 - [c11]Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh:
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. USENIX Security Symposium 2004: 179-194 - 2003
- [j16]Russell Housley, William A. Arbaugh:
Security problems in 802.11-based networks. Commun. ACM 46(5): 31-34 (2003) - [j15]Arunesh Mishra, Minho Shin, William A. Arbaugh:
An empirical analysis of the IEEE 802.11 MAC layer handoff process. Comput. Commun. Rev. 33(2): 93-102 (2003) - [j14]William A. Arbaugh:
Firewalls: An Outdated Defense. Computer 36(6): 112-113 (2003) - [j13]William A. Arbaugh:
Wireless Security Is Different. Computer 36(8): 99-101 (2003) - [j12]Nick L. Petroni Jr., William A. Arbaugh:
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. IEEE Secur. Priv. 1(1): 28-36 (2003) - [c10]Rakeshbabu Bobba, Laurent Eschenauer, Virgil D. Gligor, William A. Arbaugh:
Bootstrapping security associations for routing in mobile ad-hoc networks. GLOBECOM 2003: 1511-1515 - [c9]Yuan Yuan, William A. Arbaugh:
A secure service discovery protocol for MANET. PIMRC 2003: 502-506 - [c8]Aram Khalili, Jonathan Katz, William A. Arbaugh:
Toward Secure Key Distribution in Truly Ad-Hoc Networks. SAINT Workshops 2003: 342-346 - [c7]Adam Agnew, Adam Sulmicki, Ronald G. Minnich, William A. Arbaugh:
Flexibility in ROM: A Stackable Open Source BIOS. USENIX ATC, FREENIX Track 2003: 115-124 - 2002
- [j11]William A. Arbaugh:
Security: Technical, Social, and Legal Challenges. Computer 35(2): 109-111 (2002) - [j10]William A. Arbaugh:
Improving the TCPA Specification. Computer 35(8): 77-79 (2002) - [j9]William A. Arbaugh, Narendar Shankar, Yung-Chun (Justin) Wan, Kan Zhang:
Your 80211 wireless network has no clothes. IEEE Wirel. Commun. 9(6): 44-51 (2002) - [c6]Jesus Molina, William A. Arbaugh:
Using Independent Auditors as Intrusion Detection Systems. ICICS 2002: 291-302 - 2001
- [j8]William A. Arbaugh, Leendert van Doorn:
Guest Editors' Introduction: Embedded Security: Challenges and Concerns. Computer 34(10): 40-41 (2001) - [j7]D. Scott Alexander, Paul Menage, Angelos D. Keromytis, William A. Arbaugh, Kostas G. Anagnostakis, Jonathan M. Smith:
The price of safety in an active network. J. Commun. Networks 3(1): 4-18 (2001) - [c5]Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves:
Personal Secure Booting. ACISP 2001: 130-144 - [c4]Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen:
A Trend Analysis of Exploitations. S&P 2001: 214-229 - [i1]Ralph E. Droms, William Arbaugh:
Authentication for DHCP Messages. RFC 3118: 1-17 (2001) - 2000
- [j6]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Steve Muir, Jonathan M. Smith:
Secure quality of service handling: SQoSH. IEEE Commun. Mag. 38(4): 106-112 (2000) - [j5]William A. Arbaugh, William L. Fithen, John McHugh:
Windows of Vulnerability: A Case Study Analysis. Computer 33(12): 52-59 (2000)
1990 – 1999
- 1999
- [c3]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:
Security in Active Networks. Secure Internet Programming 1999: 433-451 - 1998
- [j4]D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:
Safety and security of programmable network infrastructures. IEEE Commun. Mag. 36(10): 84-92 (1998) - [j3]William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith:
Security for Virtual Private Intranets. Computer 31(9): 48-55 (1998) - [j2]D. Scott Alexander, William Arbaugh, Michael Hicks, Pankaj Kakkar, Angelos Dennis Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott Nettles, Jonathan M. Smith:
The SwitchWare active network architecture. IEEE Netw. 12(3): 29-36 (1998) - [j1]D. Scott Alexander, William Arbaugh, Angelos Dennis Keromytis, Jonathan M. Smith:
A secure active network environment architecture: realization in SwitchWare. IEEE Netw. 12(3): 37-45 (1998) - [c2]William A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith:
Automated Recovery in a Secure Bootstrap Process. NDSS 1998 - 1997
- [c1]William A. Arbaugh, David J. Farber, Jonathan M. Smith:
A Secure and Reliable Bootstrap Architecture. S&P 1997: 65-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint