The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeff Rowe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
    Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:321-332 [Conf]
  2. Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt
    A framework for diversifying windows native APIs to tolerate code injection attacks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:392-394 [Conf]
  3. D. Nojiri, Jeff Rowe, Karl N. Levitt
    Cooperative Response Strategies for Large Scale Attack Mitigation. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:293-302 [Conf]
  4. Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe
    A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:57-70 [Conf]
  5. Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt
    Using Specification-Based Intrusion Detection for Automated Response. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:136-154 [Conf]
  6. Jeff Rowe
    Intrusion Detection and Isolation Protocol: Automated Response to Attacks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  7. James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe
    Learning Unknown Attacks - A Start. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:158-176 [Conf]
  8. Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt
    System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf]
  9. Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt
    A specification-based intrusion detection system for AODV. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:125-134 [Conf]
  10. Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting
    A hybrid quarantine defense. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:73-82 [Conf]

  11. Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. [Citation Graph (, )][DBLP]


Search in 0.018secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002