Jeff Rowe
According to our database1,
Jeff Rowe
authored at least 37 papers
between 1996 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Argument Comput., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
EURASIP J. Adv. Signal Process., 2015
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving.
IEEE Commun. Mag., 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence.
Proceedings of the 34th IEEE Military Communications Conference, 2015
2014
Proceedings of the 9th International Workshop on Feedback Computing, 2014
2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the Trust and Autonomous Systems, 2013
2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the Computational Models of Argument, 2012
Proceedings of the Computational Models of Argument, 2012
2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
2010
Proceedings of the Social Informatics - Second International Conference, 2010
Proceedings of the Social Informatics - Second International Conference, 2010
2008
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
2005
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
1996
Webmaster's building internet database servers with CGI.
New Riders Publ., ISBN: 978-1-56205-573-8, 1996