​
Login / Signup
Jeff Rowe
Publication Activity (10 Years)
Years Active: 1999-2016
Publications (10 Years): 6
Top Topics
Intrusion Detection
Johns Hopkins
Security Vulnerabilities
Argumentation Schemes
Top Venues
MILCOM
COMMA
Argument Comput.
NSPW
</>
Publications
</>
Parisa Kianmajd
,
Jeff Rowe
,
Karl N. Levitt
Privacy-preserving coordination for smart communities.
INFOCOM Workshops
(2016)
Azeem Aqil
,
Ahmed Osama Fathy Atya
,
Srikanth V. Krishnamurthy
,
Paul Yu
,
Ananthram Swami
,
Jeff Rowe
,
Karl N. Levitt
,
Alexander Poylisher
,
Constantin Serban
,
Ritu Chadha
Automated cross layer feature selection for effective intrusion detection in networked systems.
CNS
(2016)
Bogdan Copos
,
Karl N. Levitt
,
Matt Bishop
,
Jeff Rowe
Is Anybody Home? Inferring Activity From Smart Home Network Traffic.
IEEE Symposium on Security and Privacy Workshops
(2016)
Z. Berkay Celik
,
Nan Hu
,
Yun Li
,
Nicolas Papernot
,
Patrick D. McDaniel
,
Robert J. Walls
,
Jeff Rowe
,
Karl N. Levitt
,
Novella Bartolini
,
Thomas F. La Porta
,
Ritu Chadha
Mapping sample scenarios to operational models.
MILCOM
(2016)
Bogdan Copos
,
Karl N. Levitt
,
Jeff Rowe
,
Parisa Kianmajd
,
Chen-Nee Chuah
,
George Kesidis
Security and Privacy for Emerging Smart Community Infrastructures.
IoTBD
(2016)
Andy Applebaum
,
Zimi Li
,
Karl N. Levitt
,
Simon Parsons
,
Jeff Rowe
,
Elizabeth I. Sklar
Firewall configuration: An application of multiagent metalevel argumentation.
Argument Comput.
7 (2-3) (2016)
Mani Amoozadeh
,
Arun Raghuramu
,
Chen-Nee Chuah
,
Dipak Ghosal
,
H. Michael Zhang
,
Jeff Rowe
,
Karl N. Levitt
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving.
IEEE Commun. Mag.
53 (6) (2015)
Yuquan Shan
,
Jayaram Raghuram
,
George Kesidis
,
David J. Miller
,
Anna Scaglione
,
Jeff Rowe
,
Karl N. Levitt
Generation bidding game with potentially false attestation of flexible demand.
EURASIP J. Adv. Signal Process.
2015 (2015)
Conner Jackson
,
Karl N. Levitt
,
Jeff Rowe
,
Srikanth V. Krishnamurthy
,
Trent Jaeger
,
Ananthram Swami
A diagnosis based intrusion detection approach.
MILCOM
(2015)
Azeem Aqil
,
Ahmed Osama Fathy Atya
,
Trent Jaeger
,
Srikanth V. Krishnamurthy
,
Karl N. Levitt
,
Patrick D. McDaniel
,
Jeff Rowe
,
Ananthram Swami
Detection of stealthy TCP-based DoS attacks.
MILCOM
(2015)
Andy Applebaum
,
Karl N. Levitt
,
Zimi Li
,
Simon Parsons
,
Jeff Rowe
,
Elizabeth Sklar
Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence.
MILCOM
(2015)
Jayaram Raghuram
,
George Kesidis
,
Christopher Griffin
,
Karl N. Levitt
,
David J. Miller
,
Jeff Rowe
,
Anna Scaglione
A Bidding Game for Generators in the Presence of Flexible Demand.
Feedback Computing
(2014)
Yuquan Shan
,
Jayaram Raghuram
,
George Kesidis
,
Christopher Griffin
,
Karl N. Levitt
,
David J. Miller
,
Jeff Rowe
,
Anna Scaglione
Generation bidding game with flexible demand.
CoRR
(2014)
Simon Parsons
,
Katie Atkinson
,
Zimi Li
,
Peter McBurney
,
Elizabeth Sklar
,
Munindar P. Singh
,
Karen Zita Haigh
,
Karl N. Levitt
,
Jeff Rowe
Argument schemes for reasoning about trust.
Argument Comput.
5 (2-3) (2014)
Jeff Rowe
,
Karl N. Levitt
,
Mike Hogarth
Towards the realization of a public health system for shared secure cyber-space.
NSPW
(2013)
Simon Parsons
,
Elizabeth Sklar
,
Munindar P. Singh
,
Karl N. Levitt
,
Jeff Rowe
An Argumentation-Based Approach to Handling Trust in Distributed Decision Making.
AAAI Spring Symposium: Trust and Autonomous Systems
(2013)
Simon Parsons
,
Katie Atkinson
,
Karen Zita Haigh
,
Karl N. Levitt
,
Peter McBurney
,
Jeff Rowe
,
Munindar P. Singh
,
Elizabeth Sklar
Argument Schemes for Reasoning about Trust.
COMMA
(2012)
Jeff Rowe
,
Karl N. Levitt
,
Simon Parsons
,
Elizabeth Sklar
,
Andy Applebaum
,
Sharmin Jalal
Argumentation logic to assist in security administration.
NSPW
(2012)
Andy Applebaum
,
Karl N. Levitt
,
Jeff Rowe
,
Simon Parsons
Arguing About Firewall Policy.
COMMA
(2012)
Prantik Bhattacharyya
,
Jeff Rowe
,
Shyhtsun Felix Wu
,
Karen Zita Haigh
,
Niklas Lavesson
,
Henric Johnson
Your best might not be good enough: Ranking in collaborative social search engines.
CollaborateCom
(2011)
Ruaylong Lee
,
Roozbeh Nia
,
Jason Hsu
,
Karl N. Levitt
,
Jeff Rowe
,
Shyhtsun Felix Wu
,
Shaozhi Ye
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
ASONAM
(2011)
Daniela Oliveira
,
Dhiraj Murthy
,
Henric Johnson
,
Shyhtsun Felix Wu
,
Roozbeh Nia
,
Jeff Rowe
A Socially-Aware Operating System for Trustworthy Computing.
ICSC
(2011)
Thomas Tran
,
Jeff Rowe
,
Shyhtsun Felix Wu
Social Email: A Framework and Application for More Socially-Aware Communications.
SocInfo
(2010)
Haifeng Zhao
,
Shaozhi Ye
,
Prantik Bhattacharyya
,
Jeff Rowe
,
Ken Gribble
,
Shyhtsun Felix Wu
SocialWiki: Bring Order to Wiki Systems with Social Context.
SocInfo
(2010)
Senthilkumar G. Cheetancheri
,
John Mark Agosta
,
Karl N. Levitt
,
Shyhtsun Felix Wu
,
Jeff Rowe
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
RAID
(2008)
Lynette Qu Nguyen
,
Tufan Demir
,
Jeff Rowe
,
Francis Hsu
,
Karl N. Levitt
A framework for diversifying windows native APIs to tolerate code injection attacks.
AsiaCCS
(2007)
Senthilkumar G. Cheetancheri
,
John Mark Agosta
,
Denver Dash
,
Karl N. Levitt
,
Jeff Rowe
,
Eve M. Schooler
A distributed host-based worm detection system.
LSAD@SIGCOMM
(2006)
Daniel F. Sterne
,
Poornima Balasubramanyam
,
David Carman
,
Brett Wilson
,
Rajesh Talpade
,
Calvin Ko
,
Ravindra Balupari
,
Chin-Yang Tseng
,
Thomas F. Bowen
,
Karl N. Levitt
,
Jeff Rowe
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA
(2005)
Phillip A. Porras
,
Linda Briesemeister
,
Keith Skinner
,
Karl N. Levitt
,
Jeff Rowe
,
Yu-Cheng Allen Ting
A hybrid quarantine defense.
WORM
(2004)
D. Nojiri
,
Jeff Rowe
,
Karl N. Levitt
Cooperative Response Strategies for Large Scale Attack Mitigation.
DISCEX (1)
(2003)
Chin-Yang Tseng
,
Poornima Balasubramanyam
,
Calvin Ko
,
Rattapon Limprasittiporn
,
Jeff Rowe
,
Karl N. Levitt
A specification-based intrusion detection system for AODV.
SASN
(2003)
Ivan Balepin
,
Sergei Maltsev
,
Jeff Rowe
,
Karl N. Levitt
Using Specification-Based Intrusion Detection for Automated Response.
RAID
(2003)
James E. Just
,
James C. Reynolds
,
Larry A. Clough
,
Melissa Danforth
,
Karl N. Levitt
,
Ryan Maglich
,
Jeff Rowe
Learning Unknown Attacks - A Start.
RAID
(2002)
Dustin Lee
,
Jeff Rowe
,
Calvin Ko
,
Karl N. Levitt
Detecting and Defending against Web-Server Fingerprinting.
ACSAC
(2002)
Calvin Ko
,
Paul Brutch
,
Jeff Rowe
,
Guy Tsafnat
,
Karl N. Levitt
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection
(2001)
Jeff Rowe
Intrusion Detection and Isolation Protocol: Automated Response to Attacks.
Recent Advances in Intrusion Detection
(1999)