Observation of a new boson at a mass of 125 GeV with the CMS experiment at the LHC S Chatrchyan, V Khachatryan, AM Sirunyan, A Tumasyan, W Adam, ... Physics Letters B 716 (1), 30-61, 2012 | 16561 | 2012 |
A specification-based intrusion detection system for AODV CY Tseng, P Balasubramanyam, C Ko, R Limprasittiporn, J Rowe, K Levitt Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 370 | 2003 |
Cooperative response strategies for large scale attack mitigation D Nojiri, J Rowe, K Levitt Proceedings DARPA information survivability conference and exposition 1, 293-302, 2003 | 329 | 2003 |
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving M Amoozadeh, A Raghuramu, CN Chuah, D Ghosal, HM Zhang, J Rowe, ... IEEE Communications Magazine 53 (6), 126-132, 2015 | 240 | 2015 |
Using specification-based intrusion detection for automated response I Balepin, S Maltsev, J Rowe, K Levitt International Workshop on Recent Advances in Intrusion Detection, 136-154, 2003 | 203 | 2003 |
The design of GrIDS: A graph-based intrusion detection system S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, J Rowe, ... Technical Report CSE-99-2, UC Davis Computer Science Department, 1999 | 135 | 1999 |
Is anybody home? Inferring activity from smart home network traffic B Copos, K Levitt, M Bishop, J Rowe 2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016 | 75 | 2016 |
A hybrid quarantine defense P Porras, L Briesemeister, K Skinner, K Levitt, J Rowe, YCA Ting Proceedings of the 2004 ACM workshop on Rapid malcode, 73-82, 2004 | 68 | 2004 |
System health and intrusion monitoring using a hierarchy of constraints C Ko, P Brutch, J Rowe, G Tsafnat, K Levitt International Workshop on Recent Advances in Intrusion Detection, 190-203, 2001 | 68 | 2001 |
Argument Schemes for Reasoning about Trust S Parsons, K Atkinson, K Haigh, K Levitt, P McBurney, J Rowe, MP Singh, ... | 60* | |
A distributed host-based worm detection system SG Cheetancheri, JM Agosta, DH Dash, KN Levitt, J Rowe, EM Schooler Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 107-113, 2006 | 58* | 2006 |
Learning unknown attacks—A start JE Just, JC Reynolds, LA Clough, M Danforth, KN Levitt, R Maglich, ... International Workshop on Recent Advances in Intrusion Detection, 158-176, 2002 | 55 | 2002 |
Detecting and defending against Web-server fingerprinting D Lee, J Rowe, C Ko, K Levitt 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 37 | 2002 |
Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense J Rowe, KN Levitt, T Demir, R Erbacher National Symposium on Moving Target Research, 2012 | 33 | 2012 |
Intrusion Detection and Isolation Protocol: Automated Response to Attacks. J Rowe, D Schnackenberg, D Darby, K Levitt, C Wee, D Klotz, J Schatz Recent Advances in Intrusion Detection, 1999 | 27 | 1999 |
Argumentation logic to assist in security administration J Rowe, K Levitt, S Parsons, E Sklar, A Applebaum, S Jalal Proceedings of the 2012 New Security Paradigms Workshop, 43-52, 2012 | 19 | 2012 |
Social email: A framework and application for more socially-aware communications T Tran, J Rowe, SF Wu International Conference on Social Informatics, 203-215, 2010 | 18 | 2010 |
Socialwiki: Bring order to wiki systems with social context H Zhao, S Ye, P Bhattacharyya, J Rowe, K Gribble, SF Wu International Conference on Social Informatics, 232-247, 2010 | 18 | 2010 |
Arguing About Firewall Policy A Applebaum, K Levitt, J Rowe, S Parsons | 18* | |
A framework for diversifying windows native APIs to tolerate code injection attacks LQ Nguyen, T Demir, J Rowe, F Hsu, K Levitt Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 15 | 2007 |