default search action
Neil C. Rowe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Jason Landsborough, Thuy Nguyen, Neil C. Rowe:
Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats. HICSS 2024: 944-953 - 2023
- [c45]Nathaniel Haynes, Thuy D. Nguyen, Neil C. Rowe:
Creating Synthetic Attacks with Evolutionary Algorithms for Proactive Defense of Industrial Control Systems. HICSS 2023: 1684-1693 - [c44]Joseph T. Meier, Thuy D. Nguyen, Neil C. Rowe:
Hardening Honeypots for Industrial Control Systems. HICSS 2023: 6665-6674 - 2022
- [j43]Neil C. Rowe:
Algorithms for Artificial Intelligence. Computer 55(7): 97-102 (2022) - [j42]Neil C. Rowe:
The comparative ethics of artificial-intelligence methods for military applications. Frontiers Big Data 5 (2022) - [c43]Ryan P. Ramirez, Thuy D. Nguyen, Neil C. Rowe, Joseph T. Meier:
Classifying RDP Remote Attacks on User Interfaces to Industrial Control Systems. CSCI 2022: 870-875 - [c42]Brian A. Foley, Neil C. Rowe, Thuy D. Nguyen:
Analyzing Attacks on Client-Side Honeypots from Representative Malicious Web Sites. CSCI 2022: 904-909 - 2021
- [j41]Josiah Dykstra, Neil C. Rowe, Timothy J. Shimeall, Angela Horneman, Marisa Midler:
Introduction: On the Nature of Situational Awareness. DTRAP 2(4): 25:1-25:3 (2021) - [c41]George T. Harter, Neil C. Rowe:
Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques. NCS 2021: 110-123 - [c40]Neil C. Rowe, Thuy D. Nguyen, Jeffery T. Dougherty, Matthew C. Bieker, Darry Pilkington:
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots. NCS 2021: 151-162 - 2020
- [c39]Neil C. Rowe, Thuy D. Nguyen, Marian Kendrick, Zaky Rucker, Dahae Hyun, Justin Brown:
Creating Convincing Industrial-Control-System Honeypots. HICSS 2020: 1-10
2010 – 2019
- 2018
- [j40]Charles Leopard, Neil C. Rowe, Michael McCarrin:
Testing Memory Forensics Tools for the Macintosh OS X Operating System. J. Digit. Forensics Secur. Law 13(1): 31-42 (2018) - [c38]Neil C. Rowe:
Associating Drives Based on Their Artifact and Metadata Distributions. ICDF2C 2018: 165-182 - 2017
- [c37]Neil C. Rowe:
Finding and Rating Personal Names on Drives for Forensic Needs. ICDF2C 2017: 49-63 - [c36]Charles B. Leopard, Neil C. Rowe, Michael R. McCarrin:
Memory Forensics and the Macintosh OS X Operating System. ICDF2C 2017: 175-180 - 2016
- [b3]Neil C. Rowe, Julian L. Rrushi:
Introduction to Cyberdeception. Springer 2016, ISBN 978-3-319-41185-9, pp. 1-250 - [j39]Neil C. Rowe, Riqui Schwamm, Michael McCarrin, Ralucca Gera:
Making Sense of Email Addresses on Drives. J. Digit. Forensics Secur. Law 11(2): 153-174 (2016) - [j38]Neil C. Rowe:
Identifying forensically uninteresting files in a large corpus. EAI Endorsed Trans. Security Safety 3(7): e2 (2016) - 2015
- [c35]Neil C. Rowe:
Finding contextual clues to malware using a large corpus. ISCC 2015: 229-236 - 2014
- [j37]Riqui Schwamm, Neil C. Rowe:
Effects of the Factory Reset on Mobile Devices. J. Digit. Forensics Secur. Law 9(2): 205-220 (2014) - 2013
- [j36]Neil C. Rowe, Riqui Schwamm, Simson L. Garfinkel:
Language translation for file paths. Digit. Investig. 10(Supplement): S78-S86 (2013) - [j35]Xiao Chen, Neil C. Rowe:
Energy-efficient communication in wireless cable sensor networks. Int. J. Parallel Emergent Distributed Syst. 28(4): 289-307 (2013) - [c34]Neil C. Rowe:
Identifying Forensically Uninteresting Files Using a Large Corpus. ICDF2C 2013: 86-101 - 2012
- [j34]Patrick Lin, Fritz Allhoff, Neil C. Rowe:
War 2.0: cyberweapons and ethics. Commun. ACM 55(3): 24-26 (2012) - [j33]Neil C. Rowe:
Testing the National Software Reference Library. Digit. Investig. 9(Supplement): S131-S138 (2012) - [j32]Xiao Chen, Neil C. Rowe, Jie Wu, Kaiqi Xiong:
Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks. J. Parallel Distributed Comput. 72(8): 1008-1018 (2012) - [c33]Eugene Albin, Neil C. Rowe:
A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems. AINA Workshops 2012: 122-127 - [c32]Mark R. Kindl, Neil C. Rowe:
Evaluating Simulated Annealing for the Weighted-Region Path-Planning Problem. AINA Workshops 2012: 926-931 - 2011
- [j31]Neil C. Rowe, Simson L. Garfinkel, Robert Beverly, Panayotis A. Yannakogeorgos:
Challenges in Monitoring Cyberarms Compliance. Int. J. Cyber Warf. Terror. 1(2): 35-48 (2011) - [c31]Xiao Chen, Neil C. Rowe:
Saving Energy by Adjusting Transmission Power in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c30]Xiao Chen, Neil C. Rowe:
An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks. ICC 2011: 1-5 - [c29]Neil C. Rowe, Simson L. Garfinkel:
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus. ICDF2C 2011: 115-130 - 2010
- [j30]Neil C. Rowe:
The Ethics of Cyberweapons in Warfare. Int. J. Technoethics 1(1): 20-31 (2010) - [c28]Neil C. Rowe, Ahren A. Reed, Jose J. Flores:
Detecting Suspicious Motion with Nonimaging Sensors. AINA Workshops 2010: 991-996 - [c27]Neil C. Rowe, Jeff P. Houde, Mathias N. Kolsch, Christian J. Darken, Eric R. Heine, Amela Sadagic, Chumki Basu, Feng Han:
Automated Assessment of Physical-motion Tasks for Military Integrative Training. CSEDU (1) 2010: 190-195 - [c26]Xiao Chen, Neil C. Rowe, Gurminder Singh:
Improving Localization Accuracy Using Spatio-Temporal Information of Objects. ICC 2010: 1-5 - [c25]Neil C. Rowe, Simson L. Garfinkel:
Global Analysis of Drive File Times. SADFE 2010: 97-108
2000 – 2009
- 2007
- [j29]Neil C. Rowe, E. John Custy, Binh T. Duong:
Defending Cyberspace with Fake Honeypots. J. Comput. 2(2): 25-36 (2007) - [c24]Neil C. Rowe:
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. AINA Workshops (1) 2007: 563-568 - [c23]Neil C. Rowe:
Logical Modeling of Deceptive Negative Persuasion. PERSUASIVE 2007: 105-108 - 2006
- [c22]Neil C. Rowe:
Measuring the Effectiveness of Honeypot Counter-Counterdeception. HICSS 2006 - 2004
- [c21]Neil C. Rowe:
Designing Good Deceptions in Defense of Information Systems. ACSAC 2004: 418-427 - [c20]Neil C. Rowe:
Using Context to Disambiguate Web Captions. International Conference on Internet Computing 2004: 109-115 - 2003
- [j28]Eric J. Stierna, Neil C. Rowe:
Applying information-retrieval methods to software reuse: a case study. Inf. Process. Manag. 39(1): 67-74 (2003) - [c19]Donald P. Julian, Neil C. Rowe, James Bret Michael:
Experiments with Deceptive Software Responses to Buffer-Based Attacks. IAW 2003: 43-44 - [c18]Neil C. Rowe:
Counterplanning Deceptions To Foil Cyber-Attack Plans. IAW 2003: 203-210 - [c17]Neil C. Rowe:
Counterplanning Deceptions to Foil Cyber Attack-Plans. IAW 2003: 221-228 - 2002
- [j27]Neil C. Rowe:
Marie-4: A High-Recall, Self-Improving Web Crawler That Finds Images Using Captions. IEEE Intell. Syst. 17(4): 8-14 (2002) - [j26]Neil C. Rowe:
Finding and Labeling the Subject of a Captioned Depictive Natural Photograph. IEEE Trans. Knowl. Data Eng. 14(1): 202-207 (2002) - [j25]Neil C. Rowe, Amr Zaky:
Load Balancing of Parallelized Information Filters. IEEE Trans. Knowl. Data Eng. 14(2): 456-461 (2002) - [c16]Neil C. Rowe:
Virtual multimedia libraries built from the web. JCDL 2002: 158-159 - [c15]Neil C. Rowe, Jim Coffman, Yilmaz Degirmenci, Scott Hall, Shong Lee, Clifton Williams:
Automatic removal of advertising from web-page display. JCDL 2002: 406 - 2001
- [j24]Neil C. Rowe, Lynne L. Grewe:
Change detection for linear features in aerial photographs using edge-finding. IEEE Trans. Geosci. Remote. Sens. 39(7): 1608-1612 (2001) - [c14]James Bret Michael, Vanessa L. Ong, Neil C. Rowe:
Natural-Language Processing Support for Developing Policy-Governed Software Systems. TOOLS (39) 2001: 263-275 - 2000
- [j23]Neil C. Rowe, Robert S. Alexander:
Finding Optimal-Path Maps for Path Planning across Weighted Regions. Int. J. Robotics Res. 19(2): 83-95 (2000)
1990 – 1999
- 1999
- [j22]Neil C. Rowe:
Precise and Efficient Retrieval of Captioned Images: The MARIE Project. Libr. Trends 48(2) (1999) - 1998
- [j21]Neil C. Rowe, Sandra Schiavo:
An intelligent tutor for intrusion detection on computer systems. Comput. Educ. 31(4): 395-404 (1998) - [j20]Neil C. Rowe, Thomas P. Galvin:
An Authoring System for Intelligent Procedural-Skill Tutors. IEEE Intell. Syst. 13(3): 61-69 (1998) - [j19]Neil C. Rowe, Brian Frew:
Automatic Caption Localization for Photographs on World Wide Web Pages. Inf. Process. Manag. 34(1): 95-107 (1998) - [i2]Neil C. Rowe:
Using Local Optimality Criteria for Efficient Information Retrieval with Redundant Information Filters. CoRR cs.IR/9809121 (1998) - 1997
- [j18]Neil C. Rowe:
Obtaining Optimal Mobile-Robot Paths with Nonsmooth Anisotropic Cost Functions Using Qualitative-State Reasoning. Int. J. Robotics Res. 16(3): 375-399 (1997) - [j17]Kari Laitinen, Jorma Taramaa, Markky Heikkila, Neil C. Rowe:
Enhancing Maintainability of Source Programs Through Disabbreviation. J. Syst. Softw. 37(2): 117-128 (1997) - [c13]Neil C. Rowe, Brian Frew:
Distinguishing the Picture Captions on the World Wide Web (Poster). ACM DL 1997: 263 - 1996
- [j16]Neil C. Rowe:
Using Local Optimality Criteria for Efficient Information Retrieval with Redundant Information Filters. ACM Trans. Inf. Syst. 14(2): 138-174 (1996) - [j15]Eugene J. Guglielmo, Neil C. Rowe:
Natural-Language Retrieval of Images Based on Descriptive Captions. ACM Trans. Inf. Syst. 14(3): 237-267 (1996) - 1995
- [j14]Neil C. Rowe, Kari Laitinen:
Semiautomatic Disabbreviation of Technical Text. Inf. Process. Manag. 31(6): 851-857 (1995) - 1994
- [j13]Neil C. Rowe, Yutaka Kanayama:
Near-Minimum-Energy Paths on a Vertical-Axis Cone With Anisotropic Friction and Gravity Effects. Int. J. Robotics Res. 13(5): 408-433 (1994) - [j12]Neil C. Rowe:
Inferring Depictions in Natural-Language Captions for Efficient Access to Picture Data. Inf. Process. Manag. 30(3): 379-388 (1994) - [i1]Neil C. Rowe:
Statistical versus symbolic parsing for captioned-information retrieval. CoRR abs/cmp-lg/9408008 (1994) - 1993
- [j11]Neil C. Rowe, Eugene J. Guglielmo:
Exploiting Captions in Retrieval of Multimedia Data. Inf. Process. Manag. 29(4): 453-462 (1993) - 1992
- [c12]Eugene J. Guglielmo, Neil C. Rowe:
Overview of Natural Language Processing of Captions for Retrieving Multimedia Data. ANLP 1992: 231-232 - 1991
- [j10]Neil C. Rowe:
Management of Regression-Model Data. Data Knowl. Eng. 6: 349-363 (1991) - 1990
- [j9]Neil C. Rowe, R. F. Richbourg:
An Efficient Snell's Law Method for Optimal-Path Planning across Multiple Two-Dimensional, Irregular, Homogeneous-Cost Regions. Int. J. Robotics Res. 9(6): 48-66 (1990) - [j8]Neil C. Rowe:
Roads, Rivers, and Obstacles: Optimal Two-Dimensional Path Planning around Linear Features for a Mobile Agent. Int. J. Robotics Res. 9(6): 67-73 (1990) - [j7]Neil C. Rowe, Ron S. Ross:
Optimal grid-free path planning across arbitrarily contoured terrain with anisotropic friction and gravity effects. IEEE Trans. Robotics Autom. 6(5): 540-553 (1990) - [c11]Bernhard Holtkamp, Vincent Y. Lum, Neil C. Rowe:
DEMOM-A description based media object data model. COMPSAC 1990: 57-63 - [c10]Robert S. Alexander, Neil C. Rowe:
Path planning by optimal-path-map construction for homogeneous-cost two-dimensional regions. ICRA 1990: 1924-1929
1980 – 1989
- 1989
- [c9]Neil C. Rowe:
Inference-Security Analysis Using Resolution Theorem-Proving. ICDE 1989: 410-416 - 1988
- [b2]Neil C. Rowe:
Artificial intelligence through Prolog. Prentice Hall 1988, ISBN 978-0-13-049362-0, pp. I-XX, 1-451 - [j6]Neil C. Rowe:
Absolute Bounds on Set Intersection and Union Sizes from Distribution Information. IEEE Trans. Software Eng. 14(7): 1033-1048 (1988) - 1987
- [c8]Neil C. Rowe:
Subclass Equal Instances, Thanks to Statistical Databases. ICDE 1987: 283-284 - [c7]R. F. Richbourg, Neil C. Rowe, Michael Zyda, Robert B. McGhee:
Solving global two-dimensional routing problems using snell's law and a search. ICRA 1987: 1631-1636 - 1986
- [c6]R. F. Richbourg, Neil C. Rowe, Michael Zyda:
Exploiting capability constraints to solve global two-dimensional path planning problems. ICRA 1986: 90-95 - 1985
- [j5]Neil C. Rowe:
Antisampling for Estimation: An Overview. IEEE Trans. Software Eng. 11(10): 1081-1091 (1985) - 1984
- [j4]Neil C. Rowe:
Modelling Degrees of Item Interest for a General Database Query System. Int. J. Man Mach. Stud. 20(5): 421-443 (1984) - [j3]Neil C. Rowe:
Diophantine Inference on a Statistical Database. Inf. Process. Lett. 18(1): 25-31 (1984) - [j2]Neil C. Rowe:
Book Review - Edward A. Feigenbaum and Pamela McCorduck, The Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the World. SIGMOD Rec. 14(1): 64-65 (1984) - [c5]Neil C. Rowe:
Diophantine Inferences from Statistical Aggregates on Few-Valued Attributes. ICDE 1984: 107-110 - 1983
- [b1]Neil C. Rowe:
Rule-based statistical calculations on a database abstract. Stanford University, USA, 1983 - [c4]Neil C. Rowe:
Top-Down Statistical Estimation on a Database. SIGMOD Conference 1983: 135-145 - [c3]Neil C. Rowe:
Some Experiments in Evaluation of an Expert System for Statistical Estimation on Databases. SSDBM 1983: 235-244 - 1982
- [j1]Neil C. Rowe:
On Some Arguable Claims in B. Shneiderman's Evaluation of Natural Language Interaction with Database Systems. SIGMOD Rec. 13(1): 92-97 (1982) - [c2]Neil C. Rowe:
Inheritance of Statistical Properties. AAAI 1982: 221-224 - 1981
- [c1]Neil C. Rowe:
Rule/based Statistical Calculations on a "Database Abstract". SSDBM 1981: 163-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint