Jeff Rowe

According to our database1, Jeff Rowe authored at least 37 papers between 1996 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Firewall configuration: An application of multiagent metalevel argumentation.
Argument Comput., 2016

Is Anybody Home? Inferring Activity From Smart Home Network Traffic.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Security and Privacy for Emerging Smart Community Infrastructures.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Privacy-preserving coordination for smart communities.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Generation bidding game with potentially false attestation of flexible demand.
EURASIP J. Adv. Signal Process., 2015

Security vulnerabilities of connected vehicle streams and their impact on cooperative driving.
IEEE Commun. Mag., 2015

A diagnosis based intrusion detection approach.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Generation bidding game with flexible demand.
CoRR, 2014

Argument schemes for reasoning about trust.
Argument Comput., 2014

A Bidding Game for Generators in the Presence of Flexible Demand.
Proceedings of the 9th International Workshop on Feedback Computing, 2014

2013
Towards the realization of a public health system for shared secure cyber-space.
Proceedings of the New Security Paradigms Workshop, 2013

An Argumentation-Based Approach to Handling Trust in Distributed Decision Making.
Proceedings of the Trust and Autonomous Systems, 2013

2012
Argumentation logic to assist in security administration.
Proceedings of the New Security Paradigms Workshop, 2012

Argument Schemes for Reasoning about Trust.
Proceedings of the Computational Models of Argument, 2012

Arguing About Firewall Policy.
Proceedings of the Computational Models of Argument, 2012

2011
A Socially-Aware Operating System for Trustworthy Computing.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Your best might not be good enough: Ranking in collaborative social search engines.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
SocialWiki: Bring Order to Wiki Systems with Social Context.
Proceedings of the Social Informatics - Second International Conference, 2010

Social Email: A Framework and Application for More Socially-Aware Communications.
Proceedings of the Social Informatics - Second International Conference, 2010

2008
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
A framework for diversifying windows native APIs to tolerate code injection attacks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
A distributed host-based worm detection system.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006

2005
A General Cooperative Intrusion Detection Architecture for MANETs.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

2004
A hybrid quarantine defense.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

2003
A specification-based intrusion detection system for AODV.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Using Specification-Based Intrusion Detection for Automated Response.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Cooperative Response Strategies for Large Scale Attack Mitigation.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Learning Unknown Attacks - A Start.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Detecting and Defending against Web-Server Fingerprinting.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

1999
Intrusion Detection and Isolation Protocol: Automated Response to Attacks.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

1996
Webmaster's building internet database servers with CGI.
New Riders Publ., ISBN: 978-1-56205-573-8, 1996


  Loading...