Watershed Sciences II, Room 2111; University of Californa Davis; Davis, CA 95616
|My research interests cover a broad range to topics
in cyber-security. My main focus has traditionally been upon run-time security monitoring including intrusion detection, large-scale monitoring architectures and
adaptive response and defenses. Past research topics have included,
Download Complete CV
B. Copos, K. Levitt, J. Rowe, P. Kianmajd, C.-N. Chuah, G. Kesidis, "Security and Privacy for Emerging Smart Community Infrastructures", International Conference on the Internet of Things and Big Data 2016 (IoBTD 2016), Rome, Italy, April, 2016A. Aqul, A. Atya, T. Jaeger, S. Krishnamurthy, K. Levitt, P. McDaniel, J. Rowe, A. Swami, "Detecting Stealthy TCP-based Denial of Service Attacks", IEEE MILCOM 2015, Tampa Bay, FL, Oct. 2015
C. Jackson, K. Levitt, J. Rowe, S. Krishnamurthy, T. Jaeger, A. Swami, "A Diagnosis Based Intrusion Detection Approach", IEEE MILCOM 2015, Tampa Bay, FL, Oct 2015
A. Applebaum, K. Levitt, Z. Li, S. Parsons, J. Rowe, E. Sklar, "Cyber Reasoning with Argumentation: Abstracting From Incomplete and Contradictory Evidence", IEEE MILCOM 2015, Tampa Bay, FL, Oct 2015
M. Amoozadeh, A. Raghuramu, C. Chuah, D. Ghosal, H. M. Zhang, J. Rowe, K. Levitt, "Security vulnerabilities of connected vehicle streams and their impact on cooperative driving", IEEE Communications Magazine, v. 53, i. 6, pp 126-132, 2015
Y. Shan, J. Raghuram, G. Kesidis, D. Miller, A. Scaglione, Jeff R., K. Levitt, "Generation bidding game with potentially false attestation of flexible demand", EURASIP Journal on Advances in Signal Processing, vol. 2015, i. 1, 2015
J. Rowe, K. Levitt, M. Hogarth, "Towards the Realization of a Public Health System for Shared Secure Cyber-Space", New Security Paradigms Workshop 2013, Banff, Canada, Sept. 2013
S. Parsons, Elizabeth Sklar, Munindar Singh, Karl Levitt, Jeff Rowe, "An Argumentation-Based Approach to Handling Trust in Distributed Decision Making", 2013 AAAI Spring Symposium: Trust and Autonomous Systems, Palo Alto, CA, March, 2013
A. Applebaum, K. Levitt, S. Parsons, J. Rowe, "Arguing about Firewall Policy", Proceedings of Fourth International Conference on Computational Models of Argument (COMMA) 2012, Vienna, Austria, Sept. 2012.
S. Parsons, K. Atkinson, K. Haigh, K. Levitt, P. McBurney, J. Rowe, M. Singh, E. Sklar, "Argument Schemes for Reasoning about Trust", Proceedings of Fourth International Conference on Computational Models of Argument (COMMA) 2012, Vienna, Austria, Sept. 2012.
J. Rowe, A. Applebaum, S. Jalal, K. Levitt, E. Sklar, S. Parsons, "Argumentation Logic to Assist in Security Administration", New Security Paradigms Workshop 2012, Bertinoro, Italy, Sept. 2012
J. Rowe, K. Levitt, T. Demir, R. Erbacher, "Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense", Moving Target Research Symposium (MTR 2012), Annapolis, MD June 2012
S. Jalal, K. Levitt, J. Rowe, E. Sklar, S. Parsons, "A Model for Augmenting Trust Management using Argumentation", 15th International Workshop on Trust in Agent Societies (TRUST12), Valencia, Spain, June, 2012
A. Applebaum, Z. Li, A. R. Syed, K. Levitt, S. Parsons, J. Rowe and E. Sklar, "Firewall configuration: An application of multiagent metalevel argumentation", Ninth International Workshop on Argumentation in Multi-Agent Systems (ArgMAS 2012), Valencia, Spain June 2012
P. Bhattacharyya, J. Rowe, F. Wu, K. Haigh, N. Lavesson, H. Johnson, "Your Best might not be Good enough: Ranking in Collaborative Social Search Engines", 7th International Conference on Collaborative Computing: Networking, Orlando, FL, Oct. 2011.
D. Oliveira, D. Murthy, H. Johnson, S. F. Wu, R. Nia and J. Rowe. "A Socially-Aware Operating System for Trustworthy Computing", Fifth IEEE International Conference on Semantic Computing (ICSC2011), Palo Alto, CA, Sept 2011
R. Lee, R. Nia, S. Ye, J. Hsu, K. Levitt, J. Rowe and S. F. Wu. , "Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics", Advances in Social Network Analysis and Mining (ASONAM 2011), Kaohsiung, Taiwan, July 2011
T. Tran, J. Rowe and S. F. Wu, "Social Email: A Framework and Application for More Socially-Aware Communications", 2nd International Conference on Social Informatics, Laxenburg, Austria, October, 2010
H. Zao, S. Ye, P. Bhattacharyya, J. Rowe, K. Gribble and S. F. Wu, "SocialWiki: Bring Order to Wiki Systems with Social Context", 2nd International Conference on Social Informatics, Laxenburg, Austria, October, 2010
Cheetancheri, S. G., Agosta, J., Levitt, K. N., Wu, F., and Rowe, J., "Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach", In Proceedings of the 11th international Symposium on Recent Advances in intrusion Detection, Cambridge, MA, USA, September, 2008
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu and Karl Levitt, "A framework for diversifying windows Native APIs to tolerate code injection attacks", ASIACCS'07, March 2007.
S. Cheetancheri, J.M. Agosta, D. Dash, K. Levitt, J. Rowe, E. Schooler, "A Distributed Host-Based Worm Detection System", ACM SIGCOMM LSAD '06 Workshop, Sept. 2006.
Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balupari, R., Tseng, C., Bowen, T., Levitt, K., and Rowe, J., "A General Cooperative Intrusion Detection Architecture for MANETs". In Proceedings of the Third IEEE international Workshop on information Assurance (March, 2005).
P. Porras, L. Briesmeister, K. Levitt, J. Rowe, K. Skinner, A. Ting, "A Hybrid Quarantine Defense", 2nd ACM Workshop on Rapid Malcode 2004 (WORM '04), Oct. 2004, Fairfax, VA.
Just, J., Kesidis, G., Levitt, K., Rowe, J., Wu, F., Porras, P., "Lack of Science for Testing the Effectiveness of Large-scale Cyber Defenses", New Security Paradigms Workshop 2004, Sept. 2004, Nova Scotia, Canada
C.Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, K. Levitt, "A Specification-Based Instrusion Detection system for AODV," 2003 ACM Workshop on security of Ad Hoc and Sensor Networks (SASN '03), October 21, 2003.
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, "Using Specification-Based Intrusion Detection for Automated Response", Proceeding of the 6th International Symposium, RAID 2003, Recent Advances in Intrusion Detection, Pittsburgh, PA, Sept 8-10, 2003
D. Nojiri, J. Rowe, K. Levitt, "Cooperative Response Strategies for Large Scale Attack Mitigation," Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C., April 22-24, 2003.
D. Lee, J. Rowe, C. Ko, K. Levitt, "Detecting and Defending Against Web-server Fingerprinting", Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, Dec. 2002.
J. Just, J. Reynolds, L. Clough, M. Danforth, K Levitt, R. Maglich, J. Rowe, "Learning Unknown Attacks - A Start", Proceedings of the 5th International Symposium, Recent Advances in Intrusion Detection, Zurich, Switzerland, October 2002, Springer.
Ko, C., Brutch, P., Rowe, J., Tsafnat, G., and Levitt, K. "System Health and Intrusion Monitoring Using a Hierarchy of Constraints", Proceedings of 4th International Symposium, Recent Advances in Intrusion Detection, Davis, CA, October 2001, Springer.
J. Rowe, "Intrusion Detection and Isolation Protocol: Automated Response to Attacks", 2nd International Symposium, Recent Advances in Intrusion Detection, West Lafayette, IN, October 1999