Observation of a new boson at a mass of 125 GeV with the CMS experiment at the LHC S Chatrchyan, V Khachatryan, AM Sirunyan, A Tumasyan, W Adam, ... Physics Letters B 716 (1), 30-61, 2012 | 22337* | 2012 |
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving M Amoozadeh, A Raghuramu, CN Chuah, D Ghosal, HM Zhang, J Rowe, ... IEEE Communications Magazine 53 (6), 126-132, 2015 | 504 | 2015 |
A specification-based intrusion detection system for AODV CY Tseng, P Balasubramanyam, C Ko, R Limprasittiporn, J Rowe, K Levitt Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 405 | 2003 |
Cooperative response strategies for large scale attack mitigation D Nojiri, J Rowe, K Levitt Proceedings DARPA information survivability conference and exposition 1, 293-302, 2003 | 401 | 2003 |
Using specification-based intrusion detection for automated response I Balepin, S Maltsev, J Rowe, K Levitt Recent Advances in Intrusion Detection: 6th International Symposium, RAID …, 2003 | 228 | 2003 |
Is anybody home? inferring activity from smart home network traffic B Copos, K Levitt, M Bishop, J Rowe 2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016 | 190 | 2016 |
The design of GrIDS: A graph-based intrusion detection system S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, J Rowe, ... Technical Report CSE-99-2, UC Davis Computer Science Department, 1999 | 148 | 1999 |
Argument Schemes for Reasoning about Trust S Parsons, K Atkinson, K Haigh, K Levitt, P McBurney, J Rowe, MP Singh, ... | 82* | |
A hybrid quarantine defense P Porras, L Briesemeister, K Skinner, K Levitt, J Rowe, YCA Ting Proceedings of the 2004 ACM workshop on Rapid malcode, 73-82, 2004 | 72 | 2004 |
System health and intrusion monitoring using a hierarchy of constraints C Ko, P Brutch, J Rowe, G Tsafnat, K Levitt International Workshop on Recent Advances in Intrusion Detection, 190-203, 2001 | 69 | 2001 |
Learning unknown attacks—A start JE Just, JC Reynolds, LA Clough, M Danforth, KN Levitt, R Maglich, ... International Workshop on Recent Advances in Intrusion Detection, 158-176, 2002 | 62 | 2002 |
A distributed host-based worm detection system SG Cheetancheri, JM Agosta, DH Dash, KN Levitt, J Rowe, EM Schooler Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 107-113, 2006 | 59* | 2006 |
Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense J Rowe, KN Levitt, T Demir, R Erbacher National Symposium on Moving Target Research, 2012 | 44 | 2012 |
Detecting and defending against Web-server fingerprinting D Lee, J Rowe, C Ko, K Levitt 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 42 | 2002 |
Intrusion Detection and Isolation Protocol: Automated Response to Attacks. J Rowe, D Schnackenberg, D Darby, K Levitt, C Wee, D Klotz, J Schatz Recent Advances in Intrusion Detection, 1999 | 29 | 1999 |
Privacy-preserving coordination for smart communities P Kianmajd, J Rowe, K Levitt 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 25 | 2016 |
Detection of stealthy TCP-based DoS attacks A Aqil, AOF Atya, T Jaeger, SV Krishnamurthy, K Levitt, PD McDaniel, ... MILCOM 2015-2015 IEEE Military Communications Conference, 348-353, 2015 | 25 | 2015 |
A framework for diversifying windows native APIs to tolerate code injection attacks LQ Nguyen, T Demir, J Rowe, F Hsu, K Levitt Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 22 | 2007 |
Argumentation logic to assist in security administration J Rowe, K Levitt, S Parsons, E Sklar, A Applebaum, S Jalal Proceedings of the 2012 New Security Paradigms Workshop, 43-52, 2012 | 21 | 2012 |
Socialwiki: Bring order to wiki systems with social context H Zhao, S Ye, P Bhattacharyya, J Rowe, K Gribble, SF Wu Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010 | 19 | 2010 |