Jeff Rowe
Jeff Rowe
Verified email at
TitleCited byYear
A specification-based intrusion detection system for AODV
CY Tseng, P Balasubramanyam, C Ko, R Limprasittiporn, J Rowe, K Levitt
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
Cooperative response strategies for large scale attack mitigation
D Nojiri, J Rowe, K Levitt
Proceedings DARPA Information Survivability Conference and Exposition 1, 293-302, 2003
Using specification-based intrusion detection for automated response
I Balepin, S Maltsev, J Rowe, K Levitt
International Workshop on Recent Advances in Intrusion Detection, 136-154, 2003
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
M Amoozadeh, A Raghuramu, CN Chuah, D Ghosal, HM Zhang, J Rowe, ...
IEEE Communications Magazine 53 (6), 126-132, 2015
The design of GrIDS: A graph-based intrusion detection system
S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, J Rowe, ...
Technical Report CSE-99-2, UC Davis Computer Science Department, 1999
A hybrid quarantine defense
P Porras, L Briesemeister, K Skinner, K Levitt, J Rowe, YCA Ting
Proceedings of the 2004 ACM workshop on Rapid malcode, 73-82, 2004
System health and intrusion monitoring using a hierarchy of constraints
C Ko, P Brutch, J Rowe, G Tsafnat, K Levitt
International Workshop on Recent Advances in Intrusion Detection, 190-203, 2001
Learning unknown attacks—A start
JE Just, JC Reynolds, LA Clough, M Danforth, KN Levitt, R Maglich, ...
International Workshop on Recent Advances in Intrusion Detection, 158-176, 2002
A distributed host-based worm detection system
SG Cheetancheri, JM Agosta, DH Dash, KN Levitt, J Rowe, EM Schooler
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 107-113, 2006
Argument Schemes for Reasoning about Trust
S Parsons, K Atkinson, K Haigh, K Levitt, P McBurney, J Rowe, MP Singh, ...
Is anybody home? inferring activity from smart home network traffic
B Copos, K Levitt, M Bishop, J Rowe
2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016
Detecting and defending against Web-server fingerprinting
D Lee, J Rowe, C Ko, K Levitt
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense
J Rowe, KN Levitt, T Demir, R Erbacher
National Symposium on Moving Target Research, 2012
Intrusion Detection and Isolation Protocol: Automated Response to Attacks.
J Rowe, D Schnackenberg, D Darby, K Levitt, C Wee, D Klotz, J Schatz
Recent Advances in Intrusion Detection, 1999
Argumentation logic to assist in security administration
J Rowe, K Levitt, S Parsons, E Sklar, A Applebaum, S Jalal
Proceedings of the 2012 New Security Paradigms Workshop, 43-52, 2012
Arguing About Firewall Policy
A Applebaum, K Levitt, J Rowe, S Parsons
Socialwiki: Bring order to wiki systems with social context
H Zhao, S Ye, P Bhattacharyya, J Rowe, K Gribble, SF Wu
International Conference on Social Informatics, 232-247, 2010
Social email: a framework and application for more socially-aware communications
T Tran, J Rowe, SF Wu
International Conference on Social Informatics, 203-215, 2010
A framework for diversifying windows native APIs to tolerate code injection attacks
LQ Nguyen, T Demir, J Rowe, F Hsu, K Levitt
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Design and implementation of faith, an experimental system to intercept and manipulate online social informatics
R Lee, R Nia, J Hsu, KN Levitt, J Rowe, SF Wu, S Ye
2011 International Conference on Advances in Social Networks Analysis and …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20