An argumentation-based approach to handling trust in distributed decision making

Karl N. Levitt , Simon Parsons , Elizabeth Sklar , Jeff Rowe
national conference on artificial intelligence

4
2013
Learning unknown attacks: A start

Larry A. Clough , Ryan Maglich , Karl N. Levitt , James E. Just
Lecture Notes in Computer Science 158 -176

14
2002
A hybrid quarantine defense

Phillip Porras , Linda Briesemeister , Keith Skinner , Karl Levitt
workshop on rapid malcode 73 -82

72
2004
A specification-based intrusion detection system for AODV

Chin-Yang Tseng , Poornima Balasubramanyam , Calvin Ko , Rattapon Limprasittiporn
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03 125 -134

246
2003
Firewall configuration: An application of multiagent metalevel argumentation

Andy Applebaum , Zimi Li , Karl Levitt , Simon Parsons
Argument & Computation 7 201 -221

2
2016
A Socially-Aware Operating System for Trustworthy Computing

Daniela Oliveira , Dhiraj Murthy , Henric Johnson , S. Felix Wu
2011 IEEE Fifth International Conference on Semantic Computing 380 -386

2
2011
Helix: A Self-Regenerative Architecture for the Incorruptible Enterprise

John C Knight , Jack W Davidson , David Evans , Westley Weimer
Defense Technical Information Center

2012
Generation bidding game with potentially false attestation of flexible demand

Yuquan Shan , Jayaram Raghuram , George Kesidis , David J Miller
EURASIP Journal on Advances in Signal Processing 2015 ( 1) 29

3
2015
Argumentation logic to assist in security administration

Jeff Rowe , Karl Levitt , Simon Parsons , Elizabeth Sklar
new security paradigms workshop 43 -52

13
2012
Privacy-preserving coordination for smart communities

Parisa Kianmajd , Jeff Rowe , Karl Levitt
conference on computer communications workshops 1045 -1046

11
2016
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving

Mani Amoozadeh , Arun Raghuramu , Chen-nee Chuah , Dipak Ghosal
IEEE Communications Magazine 53 ( 6) 126 -132

185
2015
Security and Privacy for Emerging Smart Community Infrastructures

Bogdan Copos , Karl Levitt , Jeff Rowe , Parisa Kianmajd
the internet of things 148 -155

4
2016
Modeling cybersecurity risks: Proof of concept of a holistic approach for integrated risk quantification

Diane Henshel , Alexander Alexeev , Mariana Cains , Jeff Rowe
2016 IEEE Symposium on Technologies for Homeland Security (HST) 1 -5

1
2016
Is Anybody Home? Inferring Activity From Smart Home Network Traffic

Bogdan Copos , Karl Levitt , Matt Bishop , Jeff Rowe
ieee symposium on security and privacy 245 -251

141
2016
A distributed host-based worm detection system

Senthilkumar G. Cheetancheri , John Mark Agosta , Denver H. Dash , Karl N. Levitt
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense - LSAD '06 107 -113

38
2006
Social email: a framework and application for more socially-aware communications

Thomas Tran , Jeff Rowe , S. Felix Wu
social informatics 6430 203 -215

14
2010
SocialWiki: bring order to wiki systems with social context

Haifeng Zhao , Shaozhi Ye , Prantik Bhattacharyya , Jeff Rowe
social informatics 6430 232 -247

12
2010
Your best might not be good enough: Ranking in collaborative social search engines

Henric Johnson , Prantik Bhattacharyya , S. Felix Wu , Jeff Rowe
collaborative computing 87 -94

5
2011
System Health and Intrusion Monitoring Using a Hierarchy of Constraints

Calvin Ko , Paul Brutch , Jeff Rowe , Guy Tsafnat
recent advances in intrusion detection 190 -204

40
2001
Automated cross layer feature selection for effective intrusion detection in networked systems

Azeem Aqil , Ahmed Fathy Atya , Srikanth V. Krishnamurthy , Paul Yu
communications and networking symposium 270 -278

2016