| 2008 |
| 11 | EE | Senthilkumar G. Cheetancheri,
John Mark Agosta,
Karl N. Levitt,
Shyhtsun Felix Wu,
Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
RAID 2008: 231-250 |
| 2007 |
| 10 | EE | Lynette Qu Nguyen,
Tufan Demir,
Jeff Rowe,
Francis Hsu,
Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks.
ASIACCS 2007: 392-394 |
| 2005 |
| 9 | | Daniel F. Sterne,
Poornima Balasubramanyam,
David Carman,
Brett Wilson,
Rajesh Talpade,
Calvin Ko,
Ravindra Balupari,
Chin-Yang Tseng,
Thomas F. Bowen,
Karl N. Levitt,
Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA 2005: 57-70 |
| 2004 |
| 8 | EE | Phillip A. Porras,
Linda Briesemeister,
Keith Skinner,
Karl N. Levitt,
Jeff Rowe,
Yu-Cheng Allen Ting:
A hybrid quarantine defense.
WORM 2004: 73-82 |
| 2003 |
| 7 | EE | D. Nojiri,
Jeff Rowe,
Karl N. Levitt:
Cooperative Response Strategies for Large Scale Attack Mitigation.
DISCEX (1) 2003: 293-302 |
| 6 | EE | Ivan Balepin,
Sergei Maltsev,
Jeff Rowe,
Karl N. Levitt:
Using Specification-Based Intrusion Detection for Automated Response.
RAID 2003: 136-154 |
| 5 | EE | Chin-Yang Tseng,
Poornima Balasubramanyam,
Calvin Ko,
Rattapon Limprasittiporn,
Jeff Rowe,
Karl N. Levitt:
A specification-based intrusion detection system for AODV.
SASN 2003: 125-134 |
| 2002 |
| 4 | EE | Dustin Lee,
Jeff Rowe,
Calvin Ko,
Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting.
ACSAC 2002: 321-332 |
| 3 | EE | James E. Just,
James C. Reynolds,
Larry A. Clough,
Melissa Danforth,
Karl N. Levitt,
Ryan Maglich,
Jeff Rowe:
Learning Unknown Attacks - A Start.
RAID 2002: 158-176 |
| 2001 |
| 2 | EE | Calvin Ko,
Paul Brutch,
Jeff Rowe,
Guy Tsafnat,
Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection 2001: 190-204 |
| 1999 |
| 1 | EE | Jeff Rowe:
Intrusion Detection and Isolation Protocol: Automated Response to Attacks.
Recent Advances in Intrusion Detection 1999 |