<?xml version="1.0"?>
<dblpperson name="Benjamin W. P. Ramsey" pid="06/7666" n="26">
<person key="homepages/06/7666" mdate="2010-01-02">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
</person>
<r><article key="journals/compsec/FullerRRP17" mdate="2024-10-06">
<author orcid="0009-0006-8626-1325" pid="174/1143">Jonathan D. Fuller</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="12/9539">Mason Rice</author>
<author pid="184/3603">John M. Pecarina</author>
<title>Misuse-based detection of Z-Wave network attacks.</title>
<pages>44-58</pages>
<year>2017</year>
<volume>64</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2016.10.003</ee>
<ee>https://www.wikidata.org/entity/Q115060247</ee>
<url>db/journals/compsec/compsec64.html#FullerRRP17</url>
</article>
</r>
<r><article key="journals/compsec/BadenhopGRMM17" mdate="2023-08-28">
<author pid="146/1900">Christopher W. Badenhop</author>
<author orcid="0000-0003-0193-1192" pid="34/2764">Scott R. Graham</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="159/8214">Logan O. Mailloux</author>
<title>The Z-Wave routing protocol and its security implications.</title>
<pages>112-129</pages>
<year>2017</year>
<volume>68</volume>
<journal>Comput. Secur.</journal>
<ee type="oa">https://doi.org/10.1016/j.cose.2017.04.004</ee>
<ee>https://www.wikidata.org/entity/Q115060073</ee>
<url>db/journals/compsec/compsec68.html#BadenhopGRMM17</url>
</article>
</r>
<r><inproceedings key="conf/ifip11-10/MaysRRPM17" mdate="2017-11-21">
<author pid="208/9486">Caleb Mays</author>
<author pid="12/9539">Mason Rice</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="184/3603">John M. Pecarina</author>
<author pid="56/5722">Barry E. Mullins</author>
<title>Defending Building Automation Systems Using DECOY Networks.</title>
<pages>297-317</pages>
<year>2017</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee>https://doi.org/10.1007/978-3-319-70395-4_15</ee>
<crossref>conf/ifip11-10/2017</crossref>
<url>db/conf/ifip11-10/iccip2017.html#MaysRRPM17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-10/RoseBRRM17" mdate="2023-09-30">
<author orcid="0000-0002-2801-2009" pid="208/9491">Anthony Rose</author>
<author pid="149/1420">Jason M. Bindewald</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="12/9539">Mason Rice</author>
<author pid="56/5722">Barry E. Mullins</author>
<title>Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance.</title>
<pages>319-338</pages>
<year>2017</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee>https://doi.org/10.1007/978-3-319-70395-4_16</ee>
<crossref>conf/ifip11-10/2017</crossref>
<url>db/conf/ifip11-10/iccip2017.html#RoseBRRM17</url>
</inproceedings>
</r>
<r><article key="journals/di/BadenhopRMM16" mdate="2020-08-20">
<author pid="146/1900">Christopher W. Badenhop</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="159/8214">Logan O. Mailloux</author>
<title>Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver.</title>
<pages>14-27</pages>
<year>2016</year>
<volume>17</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2016.02.002</ee>
<url>db/journals/di/di17.html#BadenhopRMM16</url>
</article>
</r>
<r><article key="journals/ijcip/YoonDBRR16" mdate="2020-02-21">
<author pid="180/6013">Jungsang Yoon</author>
<author pid="152/8909">Stephen Dunlap</author>
<author pid="29/9539">Jonathan Butts</author>
<author pid="12/9539">Mason Rice</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<title>Evaluating the readiness of cyber first responders responsible for critical infrastructure protection.</title>
<pages>19-27</pages>
<year>2016</year>
<volume>13</volume>
<journal>Int. J. Crit. Infrastructure Prot.</journal>
<ee>https://doi.org/10.1016/j.ijcip.2016.02.003</ee>
<url>db/journals/ijcip/ijcip13.html#YoonDBRR16</url>
</article>
</r>
<r><article key="journals/ijcip/YoungLRRM16" mdate="2020-02-21">
<author pid="17/7596">Derek Young</author>
<author pid="71/8823">Juan Lopez Jr.</author>
<author pid="12/9539">Mason Rice</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="45/4506">Robert McTasney</author>
<title>A framework for incorporating insurance in critical infrastructure cyber risk strategies.</title>
<pages>43-57</pages>
<year>2016</year>
<volume>14</volume>
<journal>Int. J. Crit. Infrastructure Prot.</journal>
<ee>https://doi.org/10.1016/j.ijcip.2016.04.001</ee>
<url>db/journals/ijcip/ijcip14.html#YoungLRRM16</url>
</article>
</r>
<r><article key="journals/ijnsec/BadenhopRM16" mdate="2021-01-04">
<author pid="146/1900">Christopher W. Badenhop</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<title>An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols.</title>
<pages>667-677</pages>
<year>2016</year>
<volume>18</volume>
<journal>Int. J. Netw. Secur.</journal>
<number>4</number>
<ee type="oa">http://ijns.jalaxy.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p667-677.pdf</ee>
<url>db/journals/ijnsec/ijnsec18.html#BadenhopRM16</url>
</article>
</r>
<r><inproceedings key="conf/ifip11-10/QuiggLRGR16" mdate="2025-12-07">
<author orcid="0009-0000-8895-501X" pid="189/1344">Michael Quigg</author>
<author pid="71/8823">Juan Lopez Jr.</author>
<author pid="12/9539">Mason Rice</author>
<author pid="g/MichaelRGrimaila">Michael R. Grimaila</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<title>Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.</title>
<pages>3-25</pages>
<year>2016</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee>https://doi.org/10.1007/978-3-319-48737-3_1</ee>
<crossref>conf/ifip11-10/2016</crossref>
<url>db/conf/ifip11-10/iccip2016.html#QuiggLRGR16</url>
</inproceedings>
</r>
<r><article key="journals/ijcip/RamseySMTB15" mdate="2020-02-21">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="158/8852">Tyler D. Stubbs</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="14/4566">Michael A. Temple</author>
<author orcid="0000-0002-4220-8067" pid="38/9882">Mark A. Buckner</author>
<title>Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers.</title>
<pages>27-39</pages>
<year>2015</year>
<volume>8</volume>
<journal>Int. J. Crit. Infrastructure Prot.</journal>
<ee>https://doi.org/10.1016/j.ijcip.2014.11.002</ee>
<url>db/journals/ijcip/ijcip8.html#RamseySMTB15</url>
</article>
</r>
<r><article key="journals/tdsc/RamseyMTG15" mdate="2020-04-09">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="14/4566">Michael A. Temple</author>
<author pid="g/MichaelRGrimaila">Michael R. Grimaila</author>
<title>Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.</title>
<pages>585-596</pages>
<year>2015</year>
<volume>12</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TDSC.2014.2366455</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2014.2366455</ee>
<url>db/journals/tdsc/tdsc12.html#RamseyMTG15</url>
</article>
</r>
<r><inproceedings key="conf/ifip11-10/BadenhopFHRR15" mdate="2024-10-06">
<author pid="146/1900">Christopher W. Badenhop</author>
<author orcid="0009-0006-8626-1325" pid="174/1143">Jonathan D. Fuller</author>
<author pid="76/5406">Joseph Hall</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="12/9539">Mason Rice</author>
<title>Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets.</title>
<pages>209-227</pages>
<year>2015</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-26567-4_13</ee>
<crossref>conf/ifip11-10/2015</crossref>
<url>db/conf/ifip11-10/iccip2015.html#BadenhopFHRR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/FullerR15" mdate="2024-10-06">
<author orcid="0009-0006-8626-1325" pid="174/1143">Jonathan D. Fuller</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<title>Rogue Z-Wave controllers: A persistent attack channel.</title>
<pages>734-741</pages>
<year>2015</year>
<booktitle>LCN Workshops</booktitle>
<ee>https://doi.org/10.1109/LCNW.2015.7365922</ee>
<crossref>conf/lcn/2015w</crossref>
<url>db/conf/lcn/lcnw2015.html#FullerR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/BihlBTR15" mdate="2019-09-25">
<author orcid="0000-0003-2431-2749" pid="120/6483">Trevor J. Bihl</author>
<author pid="25/87">Kenneth W. Bauer Jr.</author>
<author pid="14/4566">Michael A. Temple</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<title>Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devices.</title>
<pages>360-365</pages>
<year>2015</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2015.7357469</ee>
<crossref>conf/milcom/2015</crossref>
<url>db/conf/milcom/milcom2015.html#BihlBTR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/PatelR15" mdate="2017-05-26">
<author pid="38/4954">Hiren J. Patel</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<title>Comparison of parametric and non-parametric statistical features for Z-Wave fingerprinting.</title>
<pages>378-382</pages>
<year>2015</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2015.7357472</ee>
<crossref>conf/milcom/2015</crossref>
<url>db/conf/milcom/milcom2015.html#PatelR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/PatelTR14" mdate="2022-09-16">
<author pid="38/4954">Hiren J. Patel</author>
<author pid="14/4566">Michael A. Temple</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<title>Comparison of High-end and Low-end Receivers for RF-DNA Fingerprinting.</title>
<pages>24-29</pages>
<year>2014</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2014.13</ee>
<crossref>conf/milcom/2014</crossref>
<url>db/conf/milcom/milcom2014.html#PatelTR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/RamseyMLS14" mdate="2022-09-16">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="328/8405">William M. Lowder</author>
<author pid="38/11056">Ryan Speers</author>
<title>Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking.</title>
<pages>104-109</pages>
<year>2014</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2014.24</ee>
<crossref>conf/milcom/2014</crossref>
<url>db/conf/milcom/milcom2014.html#RamseyMLS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-10/DubendorferRT13" mdate="2018-06-26">
<author pid="138/7081">Clay K. Dubendorfer</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="14/4566">Michael A. Temple</author>
<title>ZigBee Device Verification for Securing Industrial Control and Building Automation Systems.</title>
<pages>47-62</pages>
<year>2013</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-45330-4_4</ee>
<crossref>conf/ifip11-10/2013</crossref>
<url>db/conf/ifip11-10/iccip2013.html#DubendorferRT13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-10/RamseyM13" mdate="2018-06-26">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<title>Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks.</title>
<pages>63-79</pages>
<year>2013</year>
<booktitle>Critical Infrastructure Protection</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-45330-4_5</ee>
<crossref>conf/ifip11-10/2013</crossref>
<url>db/conf/ifip11-10/iccip2013.html#RamseyM13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/RamseyMSB13" mdate="2017-05-26">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="38/11056">Ryan Speers</author>
<author pid="190/6259">Katherine A. Batterton</author>
<title>Watching for Weakness in Wild WPANs.</title>
<pages>1404-1409</pages>
<year>2013</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2013.238</ee>
<crossref>conf/milcom/2013</crossref>
<url>db/conf/milcom/milcom2013.html#RamseyMSB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/RamseyTM12" mdate="2017-05-23">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="14/4566">Michael A. Temple</author>
<author pid="56/5722">Barry E. Mullins</author>
<title>PHY foundation for multi-factor ZigBee node authentication.</title>
<pages>795-800</pages>
<year>2012</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2012.6503210</ee>
<crossref>conf/globecom/2012</crossref>
<url>db/conf/globecom/globecom2012.html#RamseyTM12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/RamseyMW12" mdate="2023-03-24">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="125/8863">Edward D. White</author>
<title>Improved tools for indoor ZigBee warwalking.</title>
<pages>921-924</pages>
<year>2012</year>
<booktitle>LCN Workshops</booktitle>
<ee>https://doi.org/10.1109/LCNW.2012.6424083</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCNW.2012.6424083</ee>
<crossref>conf/lcn/2012w</crossref>
<url>db/conf/lcn/lcnw2012.html#RamseyMW12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/DubendorferRT12" mdate="2017-05-26">
<author pid="138/7081">Clay K. Dubendorfer</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="14/4566">Michael A. Temple</author>
<title>An RF-DNA verification process for ZigBee networks.</title>
<pages>1-6</pages>
<year>2012</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM.2012.6415804</ee>
<crossref>conf/milcom/2012</crossref>
<url>db/conf/milcom/milcom2012.html#DubendorferRT12</url>
</inproceedings>
</r>
<r><article key="journals/ijsn/RamseyMTA11" mdate="2020-04-01">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="97/5225">Ryan W. Thomas</author>
<author pid="87/6417">Todd R. Andel</author>
<title>Subjective audio quality over a secure IEEE 802.11n network.</title>
<pages>53-63</pages>
<year>2011</year>
<volume>6</volume>
<journal>Int. J. Secur. Networks</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJSN.2011.039633</ee>
<url>db/journals/ijsn/ijsn6.html#RamseyMTA11</url>
</article>
</r>
<r><article key="journals/sigmobile/MullinsSRRW09" mdate="2020-05-17">
<author pid="56/5722">Barry E. Mullins</author>
<author pid="20/7666">Jason R. Seyba</author>
<author pid="07/6093">Richard A. Raines</author>
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="35/4453">Paul D. Williams</author>
<title>Voice and video capacity of a secure IEEE 802.11g wireless network.</title>
<pages>26-34</pages>
<year>2009</year>
<volume>13</volume>
<journal>ACM SIGMOBILE Mob. Comput. Commun. Rev.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/1558590.1558595</ee>
<url>db/journals/sigmobile/sigmobile13.html#MullinsSRRW09</url>
</article>
</r>
<r><inproceedings key="conf/ipccc/RamseyMTA08" mdate="2023-03-24">
<author pid="06/7666">Benjamin W. P. Ramsey</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="97/5225">Ryan W. Thomas</author>
<author pid="87/6417">Todd R. Andel</author>
<title>Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.</title>
<pages>469-474</pages>
<year>2008</year>
<booktitle>IPCCC</booktitle>
<ee>https://doi.org/10.1109/PCCC.2008.4745097</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PCCC.2008.4745097</ee>
<crossref>conf/ipccc/2008</crossref>
<url>db/conf/ipccc/ipccc2008.html#RamseyMTA08</url>
</inproceedings>
</r>
<coauthors n="35" nc="1">
<co c="0"><na f="a/Andel:Todd_R=" pid="87/6417">Todd R. Andel</na></co>
<co c="0"><na f="b/Badenhop:Christopher_W=" pid="146/1900">Christopher W. Badenhop</na></co>
<co c="0"><na f="b/Batterton:Katherine_A=" pid="190/6259">Katherine A. Batterton</na></co>
<co c="0"><na f="b/Bauer_Jr=:Kenneth_W=" pid="25/87">Kenneth W. Bauer Jr.</na></co>
<co c="0"><na f="b/Bihl:Trevor_J=" pid="120/6483">Trevor J. Bihl</na></co>
<co c="0"><na f="b/Bindewald:Jason_M=" pid="149/1420">Jason M. Bindewald</na></co>
<co c="0"><na f="b/Buckner:Mark_A=" pid="38/9882">Mark A. Buckner</na></co>
<co c="0"><na f="b/Butts:Jonathan" pid="29/9539">Jonathan Butts</na></co>
<co c="0"><na f="d/Dubendorfer:Clay_K=" pid="138/7081">Clay K. Dubendorfer</na></co>
<co c="0"><na f="d/Dunlap:Stephen" pid="152/8909">Stephen Dunlap</na></co>
<co c="0"><na f="f/Fuller:Jonathan_D=" pid="174/1143">Jonathan D. Fuller</na></co>
<co c="0"><na f="g/Graham:Scott_R=" pid="34/2764">Scott R. Graham</na></co>
<co c="0"><na f="g/Grimaila:Michael_R=" pid="g/MichaelRGrimaila">Michael R. Grimaila</na></co>
<co c="0"><na f="h/Hall:Joseph" pid="76/5406">Joseph Hall</na></co>
<co c="0"><na f="l/Lopez_Jr=:Juan" pid="71/8823">Juan Lopez Jr.</na></co>
<co c="0"><na f="l/Lowder:William_M=" pid="328/8405">William M. Lowder</na></co>
<co c="0"><na f="m/Mailloux:Logan_O=" pid="159/8214">Logan O. Mailloux</na></co>
<co c="0"><na f="m/Mays:Caleb" pid="208/9486">Caleb Mays</na></co>
<co c="0"><na f="m/McTasney:Robert" pid="45/4506">Robert McTasney</na></co>
<co c="0"><na f="m/Mullins:Barry_E=" pid="56/5722">Barry E. Mullins</na></co>
<co c="0"><na f="p/Patel:Hiren_J=" pid="38/4954">Hiren J. Patel</na></co>
<co c="0"><na f="p/Pecarina:John_M=" pid="184/3603">John M. Pecarina</na></co>
<co c="0"><na f="q/Quigg:Michael" pid="189/1344">Michael Quigg</na></co>
<co c="0"><na f="r/Raines:Richard_A=" pid="07/6093">Richard A. Raines</na></co>
<co c="0"><na f="r/Rice:Mason" pid="12/9539">Mason Rice</na></co>
<co c="0"><na f="r/Rose:Anthony" pid="208/9491">Anthony Rose</na></co>
<co c="0"><na f="s/Seyba:Jason_R=" pid="20/7666">Jason R. Seyba</na></co>
<co c="0"><na f="s/Speers:Ryan" pid="38/11056">Ryan Speers</na></co>
<co c="0"><na f="s/Stubbs:Tyler_D=" pid="158/8852">Tyler D. Stubbs</na></co>
<co c="0"><na f="t/Temple:Michael_A=" pid="14/4566">Michael A. Temple</na></co>
<co c="0"><na f="t/Thomas:Ryan_W=" pid="97/5225">Ryan W. Thomas</na></co>
<co c="0"><na f="w/White:Edward_D=" pid="125/8863">Edward D. White</na></co>
<co c="0"><na f="w/Williams:Paul_D=" pid="35/4453">Paul D. Williams</na></co>
<co c="0"><na f="y/Yoon:Jungsang" pid="180/6013">Jungsang Yoon</na></co>
<co c="0"><na f="y/Young:Derek" pid="17/7596">Derek Young</na></co>
</coauthors>
</dblpperson>

