Jeff Rowe
Jeff Rowe
Verified email at
Cited by
Cited by
Observation of a new boson at a mass of 125 GeV with the CMS experiment at the LHC
S Chatrchyan, V Khachatryan, AM Sirunyan, A Tumasyan, W Adam, ...
Physics Letters B 716 (1), 30-61, 2012
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
M Amoozadeh, A Raghuramu, CN Chuah, D Ghosal, HM Zhang, J Rowe, ...
IEEE Communications Magazine 53 (6), 126-132, 2015
A specification-based intrusion detection system for AODV
CY Tseng, P Balasubramanyam, C Ko, R Limprasittiporn, J Rowe, K Levitt
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
Cooperative response strategies for large scale attack mitigation
D Nojiri, J Rowe, K Levitt
Proceedings DARPA information survivability conference and exposition 1, 293-302, 2003
Using specification-based intrusion detection for automated response
I Balepin, S Maltsev, J Rowe, K Levitt
Recent Advances in Intrusion Detection: 6th International Symposium, RAID …, 2003
Is anybody home? inferring activity from smart home network traffic
B Copos, K Levitt, M Bishop, J Rowe
2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016
The design of GrIDS: A graph-based intrusion detection system
S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, J Rowe, ...
Technical Report CSE-99-2, UC Davis Computer Science Department, 1999
Argument Schemes for Reasoning about Trust
S Parsons, K Atkinson, K Haigh, K Levitt, P McBurney, J Rowe, MP Singh, ...
A hybrid quarantine defense
P Porras, L Briesemeister, K Skinner, K Levitt, J Rowe, YCA Ting
Proceedings of the 2004 ACM workshop on Rapid malcode, 73-82, 2004
System health and intrusion monitoring using a hierarchy of constraints
C Ko, P Brutch, J Rowe, G Tsafnat, K Levitt
International Workshop on Recent Advances in Intrusion Detection, 190-203, 2001
Learning unknown attacks—A start
JE Just, JC Reynolds, LA Clough, M Danforth, KN Levitt, R Maglich, ...
International Workshop on Recent Advances in Intrusion Detection, 158-176, 2002
A distributed host-based worm detection system
SG Cheetancheri, JM Agosta, DH Dash, KN Levitt, J Rowe, EM Schooler
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 107-113, 2006
Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense
J Rowe, KN Levitt, T Demir, R Erbacher
National Symposium on Moving Target Research, 2012
Detecting and defending against Web-server fingerprinting
D Lee, J Rowe, C Ko, K Levitt
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Intrusion Detection and Isolation Protocol: Automated Response to Attacks.
J Rowe, D Schnackenberg, D Darby, K Levitt, C Wee, D Klotz, J Schatz
Recent Advances in Intrusion Detection, 1999
Detection of stealthy TCP-based DoS attacks
A Aqil, AOF Atya, T Jaeger, SV Krishnamurthy, K Levitt, PD McDaniel, ...
MILCOM 2015-2015 IEEE Military Communications Conference, 348-353, 2015
Privacy-preserving coordination for smart communities
P Kianmajd, J Rowe, K Levitt
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
A framework for diversifying windows native APIs to tolerate code injection attacks
LQ Nguyen, T Demir, J Rowe, F Hsu, K Levitt
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Argumentation logic to assist in security administration
J Rowe, K Levitt, S Parsons, E Sklar, A Applebaum, S Jalal
Proceedings of the 2012 New Security Paradigms Workshop, 43-52, 2012
Arguing About Firewall Policy
A Applebaum, K Levitt, J Rowe, S Parsons
The system can't perform the operation now. Try again later.
Articles 1–20