An empirical analysis of the IEEE 802.11 MAC layer handoff process A Mishra, M Shin, W Arbaugh ACM SIGCOMM Computer Communication Review 33 (2), 93-102, 2003 | 1289 | 2003 |
A secure and reliable bootstrap architecture WA Arbaugh, DJ Farber, JM Smith Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 934 | 1997 |
Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor. NL Petroni Jr, T Fraser, J Molina, WA Arbaugh USENIX security symposium, 179-194, 2004 | 774 | 2004 |
Your 80211 wireless network has no clothes WA Arbaugh, N Shankar, YCJ Wan, K Zhang IEEE Wireless Communications 9 (6), 44-51, 2002 | 751 | 2002 |
Weighted coloring based channel assignment for WLANs A Mishra, S Banerjee, W Arbaugh ACM SIGMOBILE Mobile Computing and Communications Review 9 (3), 19-31, 2005 | 500 | 2005 |
Toward secure key distribution in truly ad-hoc networks A Khalili, J Katz, WA Arbaugh 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings …, 2003 | 498 | 2003 |
The SwitchWare active network architecture DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ... IEEE network 12 (3), 29-36, 1998 | 481 | 1998 |
Real 802.11 security: Wi-Fi protected access and 802.11 i J Edney, WA Arbaugh Addison-Wesley Professional, 2004 | 469 | 2004 |
Improving the latency of 802.11 hand-offs using neighbor graphs M Shin, A Mishra, WA Arbaugh Proceedings of the 2nd international conference on Mobile systems …, 2004 | 463 | 2004 |
Windows of vulnerability: A case study analysis WA Arbaugh, WL Fithen, J McHugh Computer 33 (12), 52-59, 2000 | 450 | 2000 |
Partially overlapped channels not considered harmful A Mishra, V Shrivastava, S Banerjee, W Arbaugh Proceedings of the joint international conference on Measurement and …, 2006 | 403 | 2006 |
Secure and reliable bootstrap architecture WA Arbaugh, DJ Farber, AD Keromytis, JM Smith US Patent 6,185,678, 2001 | 381 | 2001 |
An initial security analysis of the IEEE 802.1 x standard M Arunesh, WA Arbaugh Technical Report CS-TR-4328. University of Maryland, College Park, 2002 | 371* | 2002 |
Proactive key distribution using neighbor graphs A Mishra, MH Shin, NL Petroni, TC Clancy, WA Arbaugh IEEE Wireless communications 11 (1), 26-36, 2004 | 357 | 2004 |
Client-driven channel management for wireless LANs A Mishra, V Brik, S Banerjee, A Srinivasan, W Arbaugh ACM SIGMOBILE Mobile Computing and Communications Review 10 (4), 8-10, 2006 | 312 | 2006 |
Toward resilient security in wireless sensor networks H Yang, F Ye, Y Yuan, S Lu, W Arbaugh Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 308 | 2005 |
Authentication for DHCP messages R Droms, W Arbaugh | 264 | 2001 |
Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage A Mishra, E Rozner, S Banerjee, W Arbaugh Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, 29-29, 2005 | 253 | 2005 |
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. NL Petroni Jr, T Fraser, AA Walters, WA Arbaugh USENIX Security Symposium, 2006 | 241 | 2006 |
A secure active network environment architecture: Realization in SwitchWare DS Alexander, WA Arbaugh, AD Keromytis, JM Smith IEEE network 12 (3), 37-45, 1998 | 213 | 1998 |