default search action
Jeff Rowe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1996
- [b1]Jeff Rowe:
Webmaster's building internet database servers with CGI. New Riders Publ. 1996, ISBN 978-1-56205-573-8, pp. I-XIV, 1-395
Journal Articles
- 2016
- [j4]Andy Applebaum, Zimi Li, Karl N. Levitt, Simon Parsons, Jeff Rowe, Elizabeth I. Sklar:
Firewall configuration: An application of multiagent metalevel argumentation. Argument Comput. 7(2-3): 201-221 (2016) - 2015
- [j3]Mani Amoozadeh, Arun Raghuramu, Chen-Nee Chuah, Dipak Ghosal, H. Michael Zhang, Jeff Rowe, Karl N. Levitt:
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6): 126-132 (2015) - [j2]Yuquan Shan, Jayaram Raghuram, George Kesidis, David J. Miller, Anna Scaglione, Jeff Rowe, Karl N. Levitt:
Generation bidding game with potentially false attestation of flexible demand. EURASIP J. Adv. Signal Process. 2015: 29 (2015) - 2014
- [j1]Simon Parsons, Katie Atkinson, Zimi Li, Peter McBurney, Elizabeth Sklar, Munindar P. Singh, Karen Zita Haigh, Karl N. Levitt, Jeff Rowe:
Argument schemes for reasoning about trust. Argument Comput. 5(2-3): 160-190 (2014)
Conference and Workshop Papers
- 2016
- [c31]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. CNS 2016: 270-278 - [c30]Parisa Kianmajd, Jeff Rowe, Karl N. Levitt:
Privacy-preserving coordination for smart communities. INFOCOM Workshops 2016: 1045-1046 - [c29]Bogdan Copos, Karl N. Levitt, Jeff Rowe, Parisa Kianmajd, Chen-Nee Chuah, George Kesidis:
Security and Privacy for Emerging Smart Community Infrastructures. IoTBD 2016: 148-155 - [c28]Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. MILCOM 2016: 7-12 - [c27]Bogdan Copos, Karl N. Levitt, Matt Bishop, Jeff Rowe:
Is Anybody Home? Inferring Activity From Smart Home Network Traffic. IEEE Symposium on Security and Privacy Workshops 2016: 245-251 - 2015
- [c26]Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. MILCOM 2015: 348-353 - [c25]Andy Applebaum, Karl N. Levitt, Zimi Li, Simon Parsons, Jeff Rowe, Elizabeth Sklar:
Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence. MILCOM 2015: 623-628 - [c24]Conner Jackson, Karl N. Levitt, Jeff Rowe, Srikanth V. Krishnamurthy, Trent Jaeger, Ananthram Swami:
A diagnosis based intrusion detection approach. MILCOM 2015: 929-934 - 2014
- [c23]Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J. Miller, Jeff Rowe, Anna Scaglione:
A Bidding Game for Generators in the Presence of Flexible Demand. Feedback Computing 2014 - 2013
- [c22]Simon Parsons, Elizabeth Sklar, Munindar P. Singh, Karl N. Levitt, Jeff Rowe:
An Argumentation-Based Approach to Handling Trust in Distributed Decision Making. AAAI Spring Symposium: Trust and Autonomous Systems 2013 - [c21]Jeff Rowe, Karl N. Levitt, Mike Hogarth:
Towards the realization of a public health system for shared secure cyber-space. NSPW 2013: 11-18 - 2012
- [c20]Andy Applebaum, Karl N. Levitt, Jeff Rowe, Simon Parsons:
Arguing About Firewall Policy. COMMA 2012: 91-102 - [c19]Simon Parsons, Katie Atkinson, Karen Zita Haigh, Karl N. Levitt, Peter McBurney, Jeff Rowe, Munindar P. Singh, Elizabeth Sklar:
Argument Schemes for Reasoning about Trust. COMMA 2012: 430-441 - [c18]Jeff Rowe, Karl N. Levitt, Simon Parsons, Elizabeth Sklar, Andy Applebaum, Sharmin Jalal:
Argumentation logic to assist in security administration. NSPW 2012: 43-52 - 2011
- [c17]Ruaylong Lee, Roozbeh Nia, Jason Hsu, Karl N. Levitt, Jeff Rowe, Shyhtsun Felix Wu, Shaozhi Ye:
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics. ASONAM 2011: 195-202 - [c16]Prantik Bhattacharyya, Jeff Rowe, Shyhtsun Felix Wu, Karen Zita Haigh, Niklas Lavesson, Henric Johnson:
Your best might not be good enough: Ranking in collaborative social search engines. CollaborateCom 2011: 87-94 - [c15]Daniela Oliveira, Dhiraj Murthy, Henric Johnson, Shyhtsun Felix Wu, Roozbeh Nia, Jeff Rowe:
A Socially-Aware Operating System for Trustworthy Computing. ICSC 2011: 380-386 - 2010
- [c14]Thomas Tran, Jeff Rowe, Shyhtsun Felix Wu:
Social Email: A Framework and Application for More Socially-Aware Communications. SocInfo 2010: 203-215 - [c13]Haifeng Zhao, Shaozhi Ye, Prantik Bhattacharyya, Jeff Rowe, Ken Gribble, Shyhtsun Felix Wu:
SocialWiki: Bring Order to Wiki Systems with Social Context. SocInfo 2010: 232-247 - 2008
- [c12]Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. RAID 2008: 231-250 - 2007
- [c11]Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks. AsiaCCS 2007: 392-394 - 2006
- [c10]Senthilkumar G. Cheetancheri, John Mark Agosta, Denver Dash, Karl N. Levitt, Jeff Rowe, Eve M. Schooler:
A distributed host-based worm detection system. LSAD@SIGCOMM 2006: 107-113 - 2005
- [c9]Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs. IWIA 2005: 57-70 - 2004
- [c8]Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting:
A hybrid quarantine defense. WORM 2004: 73-82 - 2003
- [c7]D. Nojiri, Jeff Rowe, Karl N. Levitt:
Cooperative Response Strategies for Large Scale Attack Mitigation. DISCEX (1) 2003: 293-302 - [c6]Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt:
Using Specification-Based Intrusion Detection for Automated Response. RAID 2003: 136-154 - [c5]Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt:
A specification-based intrusion detection system for AODV. SASN 2003: 125-134 - 2002
- [c4]Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting. ACSAC 2002: 321-330 - [c3]James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe:
Learning Unknown Attacks - A Start. RAID 2002: 158-176 - 2001
- [c2]Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190-204 - 1999
- [c1]Jeff Rowe:
Intrusion Detection and Isolation Protocol: Automated Response to Attacks. Recent Advances in Intrusion Detection 1999
Informal and Other Publications
- 2014
- [i1]Yuquan Shan, Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J. Miller, Jeff Rowe, Anna Scaglione:
Generation bidding game with flexible demand. CoRR abs/1408.6689 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint