Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Benjamin W. P. Ramsey
@article{DBLP:journals/compsec/FullerRRP17, author = {Jonathan D. Fuller and Benjamin W. P. Ramsey and Mason Rice and John M. Pecarina}, title = {Misuse-based detection of Z-Wave network attacks}, journal = {Comput. Secur.}, volume = {64}, pages = {44--58}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.10.003}, doi = {10.1016/J.COSE.2016.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FullerRRP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BadenhopGRMM17, author = {Christopher W. Badenhop and Scott R. Graham and Benjamin W. P. Ramsey and Barry E. Mullins and Logan O. Mailloux}, title = {The Z-Wave routing protocol and its security implications}, journal = {Comput. Secur.}, volume = {68}, pages = {112--129}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.04.004}, doi = {10.1016/J.COSE.2017.04.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BadenhopGRMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/MaysRRPM17, author = {Caleb Mays and Mason Rice and Benjamin W. P. Ramsey and John M. Pecarina and Barry E. Mullins}, editor = {Mason Rice and Sujeet Shenoi}, title = {Defending Building Automation Systems Using {DECOY} Networks}, booktitle = {Critical Infrastructure Protection {XI} - 11th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {512}, pages = {297--317}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70395-4\_15}, doi = {10.1007/978-3-319-70395-4\_15}, timestamp = {Tue, 21 Nov 2017 10:54:08 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/MaysRRPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/RoseBRRM17, author = {Anthony Rose and Jason M. Bindewald and Benjamin W. P. Ramsey and Mason Rice and Barry E. Mullins}, editor = {Mason Rice and Sujeet Shenoi}, title = {Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance}, booktitle = {Critical Infrastructure Protection {XI} - 11th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {512}, pages = {319--338}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70395-4\_16}, doi = {10.1007/978-3-319-70395-4\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/RoseBRRM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BadenhopRMM16, author = {Christopher W. Badenhop and Benjamin W. P. Ramsey and Barry E. Mullins and Logan O. Mailloux}, title = {Extraction and analysis of non-volatile memory of the {ZW0301} module, a Z-Wave transceiver}, journal = {Digit. Investig.}, volume = {17}, pages = {14--27}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.02.002}, doi = {10.1016/J.DIIN.2016.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BadenhopRMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YoonDBRR16, author = {Jungsang Yoon and Stephen Dunlap and Jonathan Butts and Mason Rice and Benjamin W. P. Ramsey}, title = {Evaluating the readiness of cyber first responders responsible for critical infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {19--27}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.02.003}, doi = {10.1016/J.IJCIP.2016.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YoonDBRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YoungLRRM16, author = {Derek Young and Juan Lopez Jr. and Mason Rice and Benjamin W. P. Ramsey and Robert McTasney}, title = {A framework for incorporating insurance in critical infrastructure cyber risk strategies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {43--57}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.04.001}, doi = {10.1016/J.IJCIP.2016.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YoungLRRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BadenhopRM16, author = {Christopher W. Badenhop and Benjamin W. P. Ramsey and Barry E. Mullins}, title = {An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {4}, pages = {667--677}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p667-677.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BadenhopRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/QuiggLRGR16, author = {Michael Quigg and Juan Lopez Jr. and Mason Rice and Michael R. Grimaila and Benjamin W. P. Ramsey}, editor = {Mason Rice and Sujeet Shenoi}, title = {Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment}, booktitle = {Critical Infrastructure Protection {X} - 10th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {485}, pages = {3--25}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48737-3\_1}, doi = {10.1007/978-3-319-48737-3\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/QuiggLRGR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RamseySMTB15, author = {Benjamin W. P. Ramsey and Tyler D. Stubbs and Barry E. Mullins and Michael A. Temple and Mark A. Buckner}, title = {Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {27--39}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.11.002}, doi = {10.1016/J.IJCIP.2014.11.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RamseySMTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RamseyMTG15, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Michael A. Temple and Michael R. Grimaila}, title = {Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {5}, pages = {585--596}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2366455}, doi = {10.1109/TDSC.2014.2366455}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RamseyMTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/BadenhopFHRR15, author = {Christopher W. Badenhop and Jonathan D. Fuller and Joseph Hall and Benjamin W. P. Ramsey and Mason Rice}, editor = {Mason Rice and Sujeet Shenoi}, title = {Evaluating {ITU-T} {G.9959} Based Wireless Systems Used in Critical Infrastructure Assets}, booktitle = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {466}, pages = {209--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26567-4\_13}, doi = {10.1007/978-3-319-26567-4\_13}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/BadenhopFHRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/FullerR15, author = {Jonathan D. Fuller and Benjamin W. P. Ramsey}, editor = {Salil S. Kanhere and Jens T{\"{o}}lle and Soumaya Cherkaoui}, title = {Rogue Z-Wave controllers: {A} persistent attack channel}, booktitle = {40th {IEEE} Local Computer Networks Conference Workshops, {LCN} Workshops 2015, Clearwater Beach, FL, USA, October 26-29, 2015}, pages = {734--741}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/LCNW.2015.7365922}, doi = {10.1109/LCNW.2015.7365922}, timestamp = {Fri, 07 Aug 2020 17:23:40 +0200}, biburl = {https://dblp.org/rec/conf/lcn/FullerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/BihlBTR15, author = {Trevor J. Bihl and Kenneth W. Bauer Jr. and Michael A. Temple and Benjamin W. P. Ramsey}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devices}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {360--365}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357469}, doi = {10.1109/MILCOM.2015.7357469}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/BihlBTR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/PatelR15, author = {Hiren J. Patel and Benjamin W. P. Ramsey}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Comparison of parametric and non-parametric statistical features for Z-Wave fingerprinting}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {378--382}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357472}, doi = {10.1109/MILCOM.2015.7357472}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/PatelR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/PatelTR14, author = {Hiren J. Patel and Michael A. Temple and Benjamin W. P. Ramsey}, title = {Comparison of High-end and Low-end Receivers for {RF-DNA} Fingerprinting}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {24--29}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.13}, doi = {10.1109/MILCOM.2014.13}, timestamp = {Fri, 16 Sep 2022 20:28:33 +0200}, biburl = {https://dblp.org/rec/conf/milcom/PatelTR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/RamseyMLS14, author = {Benjamin W. P. Ramsey and Barry E. Mullins and William M. Lowder and Ryan Speers}, title = {Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {104--109}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.24}, doi = {10.1109/MILCOM.2014.24}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/RamseyMLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/DubendorferRT13, author = {Clay K. Dubendorfer and Benjamin W. P. Ramsey and Michael A. Temple}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {ZigBee Device Verification for Securing Industrial Control and Building Automation Systems}, booktitle = {Critical Infrastructure Protection {VII} - 7th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {417}, pages = {47--62}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45330-4\_4}, doi = {10.1007/978-3-642-45330-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/DubendorferRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/RamseyM13, author = {Benjamin W. P. Ramsey and Barry E. Mullins}, editor = {Jonathan Butts and Sujeet Shenoi}, title = {Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks}, booktitle = {Critical Infrastructure Protection {VII} - 7th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {417}, pages = {63--79}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45330-4\_5}, doi = {10.1007/978-3-642-45330-4\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/RamseyM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/RamseyMSB13, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Ryan Speers and Katherine A. Batterton}, editor = {Joe Senftle and Mike Beltrani and Kari Karwedsky}, title = {Watching for Weakness in Wild WPANs}, booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San Diego, CA, USA, November 18-20, 2013}, pages = {1404--1409}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MILCOM.2013.238}, doi = {10.1109/MILCOM.2013.238}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/RamseyMSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RamseyTM12, author = {Benjamin W. P. Ramsey and Michael A. Temple and Barry E. Mullins}, title = {{PHY} foundation for multi-factor ZigBee node authentication}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {795--800}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503210}, doi = {10.1109/GLOCOM.2012.6503210}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RamseyTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/RamseyMW12, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Edward D. White}, title = {Improved tools for indoor ZigBee warwalking}, booktitle = {37th Annual {IEEE} Conference on Local Computer Networks, Workshop Proceedings, Clearwater Beach, FL, USA, October 22-25, 2012}, pages = {921--924}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/LCNW.2012.6424083}, doi = {10.1109/LCNW.2012.6424083}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/RamseyMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/DubendorferRT12, author = {Clay K. Dubendorfer and Benjamin W. P. Ramsey and Michael A. Temple}, title = {An {RF-DNA} verification process for ZigBee networks}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415804}, doi = {10.1109/MILCOM.2012.6415804}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/DubendorferRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RamseyMTA11, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Ryan W. Thomas and Todd R. Andel}, title = {Subjective audio quality over a secure {IEEE} 802.11n network}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {1}, pages = {53--63}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.039633}, doi = {10.1504/IJSN.2011.039633}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RamseyMTA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/MullinsSRRW09, author = {Barry E. Mullins and Jason R. Seyba and Richard A. Raines and Benjamin W. P. Ramsey and Paul D. Williams}, title = {Voice and video capacity of a secure {IEEE} 802.11g wireless network}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {13}, number = {1}, pages = {26--34}, year = {2009}, url = {https://doi.org/10.1145/1558590.1558595}, doi = {10.1145/1558590.1558595}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/MullinsSRRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/RamseyMTA08, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Ryan W. Thomas and Todd R. Andel}, editor = {Ty Znati and Youtao Zhang}, title = {Subjective Audio Quality over Secure {IEEE} 802.11 Wireless Local Area Networks}, booktitle = {2008 {IEEE} International Performance, Computing and Communications Conference, {IPCCC} 2008, Austin, TX, USA, December 7-9, 2008}, pages = {469--474}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PCCC.2008.4745097}, doi = {10.1109/PCCC.2008.4745097}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/RamseyMTA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.