Neil C. Rowe

According to our database1, Neil C. Rowe authored at least 91 papers between 1981 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Hardening Honeypots for Industrial Control Systems.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Creating Synthetic Attacks with Evolutionary Algorithms for Proactive Defense of Industrial Control Systems.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
The comparative ethics of artificial-intelligence methods for military applications.
Frontiers Big Data, 2022

Algorithms for Artificial Intelligence.
Computer, 2022

Classifying RDP Remote Attacks on User Interfaces to Industrial Control Systems.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Analyzing Attacks on Client-Side Honeypots from Representative Malicious Web Sites.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

2020
Creating Convincing Industrial-Control-System Honeypots.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2018
Testing Memory Forensics Tools for the Macintosh OS X Operating System.
J. Digit. Forensics Secur. Law, 2018

Associating Drives Based on Their Artifact and Metadata Distributions.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

2017
Finding and Rating Personal Names on Drives for Forensic Needs.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Memory Forensics and the Macintosh OS X Operating System.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2016
Identifying forensically uninteresting files in a large corpus.
EAI Endorsed Trans. Security Safety, 2016

Making Sense of Email Addresses on Drives.
J. Digit. Forensics Secur. Law, 2016

Introduction to Cyberdeception
Springer, ISBN: 978-3-319-41187-3, 2016

2015
Finding contextual clues to malware using a large corpus.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Effects of the Factory Reset on Mobile Devices.
J. Digit. Forensics Secur. Law, 2014

2013
Energy-efficient communication in wireless cable sensor networks.
Int. J. Parallel Emergent Distributed Syst., 2013

Language translation for file paths.
Digit. Investig., 2013

Identifying Forensically Uninteresting Files Using a Large Corpus.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

2012
Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks.
J. Parallel Distributed Comput., 2012

Testing the National Software Reference Library.
Digit. Investig., 2012

War 2.0: cyberweapons and ethics.
Commun. ACM, 2012

Evaluating Simulated Annealing for the Weighted-Region Path-Planning Problem.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Challenges in Monitoring Cyberarms Compliance.
Int. J. Cyber Warf. Terror., 2011

Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

Saving Energy by Adjusting Transmission Power in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
The Ethics of Cyberweapons in Warfare.
Int. J. Technoethics, 2010

Global Analysis of Drive File Times.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Improving Localization Accuracy Using Spatio-Temporal Information of Objects.
Proceedings of IEEE International Conference on Communications, 2010

Automated Assessment of Physical-motion Tasks for Military Integrative Training.
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010

Detecting Suspicious Motion with Nonimaging Sensors.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2007
Defending Cyberspace with Fake Honeypots.
J. Comput., 2007

Logical Modeling of Deceptive Negative Persuasion.
Proceedings of the Persuasive Technology, 2007

Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Measuring the Effectiveness of Honeypot Counter-Counterdeception.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2004
Using Context to Disambiguate Web Captions.
Proceedings of the International Conference on Internet Computing, 2004

Designing Good Deceptions in Defense of Information Systems.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Applying information-retrieval methods to software reuse: a case study.
Inf. Process. Manag., 2003

Counterplanning Deceptions To Foil Cyber-Attack Plans.
Proceedings of the IEEE Systems, 2003

Experiments with Deceptive Software Responses to Buffer-Based Attacks.
Proceedings of the IEEE Systems, 2003

2002
Load Balancing of Parallelized Information Filters.
IEEE Trans. Knowl. Data Eng., 2002

Finding and Labeling the Subject of a Captioned Depictive Natural Photograph.
IEEE Trans. Knowl. Data Eng., 2002

Marie-4: A High-Recall, Self-Improving Web Crawler That Finds Images Using Captions.
IEEE Intell. Syst., 2002

Automatic removal of advertising from web-page display.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

Virtual multimedia libraries built from the web.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

2001
Change detection for linear features in aerial photographs using edge-finding.
IEEE Trans. Geosci. Remote. Sens., 2001

Natural-Language Processing Support for Developing Policy-Governed Software Systems.
Proceedings of the 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, 2001

2000
Finding Optimal-Path Maps for Path Planning across Weighted Regions.
Int. J. Robotics Res., 2000

1999
Precise and Efficient Retrieval of Captioned Images: The MARIE Project.
Libr. Trends, 1999

1998
Automatic Caption Localization for Photographs on World Wide Web Pages.
Inf. Process. Manag., 1998

An Authoring System for Intelligent Procedural-Skill Tutors.
IEEE Intell. Syst., 1998

An intelligent tutor for intrusion detection on computer systems.
Comput. Educ., 1998

1997
Enhancing Maintainability of Source Programs Through Disabbreviation.
J. Syst. Softw., 1997

Obtaining Optimal Mobile-Robot Paths with Nonsmooth Anisotropic Cost Functions Using Qualitative-State Reasoning.
Int. J. Robotics Res., 1997

Distinguishing the Picture Captions on the World Wide Web (Poster).
Proceedings of the 2nd ACM International Conference on Digital Libraries, 1997

1996
Using Local Optimality Criteria for Efficient Information Retrieval with Redundant Information Filters.
ACM Trans. Inf. Syst., 1996

Natural-Language Retrieval of Images Based on Descriptive Captions.
ACM Trans. Inf. Syst., 1996

1995
Semiautomatic Disabbreviation of Technical Text.
Inf. Process. Manag., 1995

1994
Inferring Depictions in Natural-Language Captions for Efficient Access to Picture Data.
Inf. Process. Manag., 1994

Near-Minimum-Energy Paths on a Vertical-Axis Cone With Anisotropic Friction and Gravity Effects.
Int. J. Robotics Res., 1994

Statistical versus symbolic parsing for captioned-information retrieval.
CoRR, 1994

1993
Exploiting Captions in Retrieval of Multimedia Data.
Inf. Process. Manag., 1993

1992
Overview of Natural Language Processing of Captions for Retrieving Multimedia Data.
Proceedings of the 3rd Applied Natural Language Processing Conference, 1992

1991
Management of Regression-Model Data.
Data Knowl. Eng., 1991

1990
Optimal grid-free path planning across arbitrarily contoured terrain with anisotropic friction and gravity effects.
IEEE Trans. Robotics Autom., 1990

An Efficient Snell's Law Method for Optimal-Path Planning across Multiple Two-Dimensional, Irregular, Homogeneous-Cost Regions.
Int. J. Robotics Res., 1990

Roads, Rivers, and Obstacles: Optimal Two-Dimensional Path Planning around Linear Features for a Mobile Agent.
Int. J. Robotics Res., 1990

Path planning by optimal-path-map construction for homogeneous-cost two-dimensional regions.
Proceedings of the 1990 IEEE International Conference on Robotics and Automation, 1990

DEMOM-A description based media object data model.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1989
Inference-Security Analysis Using Resolution Theorem-Proving.
Proceedings of the Fifth International Conference on Data Engineering, 1989

1988
Absolute Bounds on Set Intersection and Union Sizes from Distribution Information.
IEEE Trans. Software Eng., 1988

Artificial intelligence through Prolog.
Prentice Hall, ISBN: 978-0-13-049362-0, 1988

1987
Solving global two-dimensional routing problems using snell's law and a search.
Proceedings of the 1987 IEEE International Conference on Robotics and Automation, Raleigh, North Carolina, USA, March 31, 1987

Subclass Equal Instances, Thanks to Statistical Databases.
Proceedings of the Third International Conference on Data Engineering, 1987

1986
Exploiting capability constraints to solve global two-dimensional path planning problems.
Proceedings of the 1986 IEEE International Conference on Robotics and Automation, 1986

1985
Antisampling for Estimation: An Overview.
IEEE Trans. Software Eng., 1985

1984
Book Review - Edward A. Feigenbaum and Pamela McCorduck, The Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the World.
SIGMOD Rec., 1984

Diophantine Inference on a Statistical Database.
Inf. Process. Lett., 1984

Modelling Degrees of Item Interest for a General Database Query System.
Int. J. Man Mach. Stud., 1984

Diophantine Inferences from Statistical Aggregates on Few-Valued Attributes.
Proceedings of the First International Conference on Data Engineering, 1984

1983
Rule-based statistical calculations on a database abstract.
PhD thesis, 1983

Some Experiments in Evaluation of an Expert System for Statistical Estimation on Databases.
Proceedings of the Second International Workshop on Statistical Database Management, 1983

Top-Down Statistical Estimation on a Database.
Proceedings of the SIGMOD'83, 1983

1982
On Some Arguable Claims in B. Shneiderman's Evaluation of Natural Language Interaction with Database Systems.
SIGMOD Rec., 1982

Inheritance of Statistical Properties.
Proceedings of the National Conference on Artificial Intelligence, 1982

1981
Rule/based Statistical Calculations on a "Database Abstract".
Proceedings of the First LBL Workshop on Statistical Database Management, 1981


  Loading...