Author of the publication

Arguing About Firewall Policy.

, , , and . COMMA, volume 245 of Frontiers in Artificial Intelligence and Applications, page 91-102. IOS Press, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rowe, Jeff
add a person with the name Rowe, Jeff
 

Other publications of authors with the same name

Intrusion Detection and Isolation Protocol: Automated Response to Attacks.. Recent Advances in Intrusion Detection, (1999)Mapping sample scenarios to operational models., , , , , , , , , and 1 other author(s). MILCOM, page 7-12. IEEE, (2016)Arguing About Firewall Policy., , , and . COMMA, volume 245 of Frontiers in Artificial Intelligence and Applications, page 91-102. IOS Press, (2012)Argument Schemes for Reasoning about Trust., , , , , , , and . COMMA, volume 245 of Frontiers in Artificial Intelligence and Applications, page 430-441. IOS Press, (2012)Is Anybody Home? Inferring Activity From Smart Home Network Traffic., , , and . IEEE Symposium on Security and Privacy Workshops, page 245-251. IEEE Computer Society, (2016)Privacy-preserving coordination for smart communities., , and . INFOCOM Workshops, page 1045-1046. IEEE, (2016)Argument schemes for reasoning about trust., , , , , , , , and . Argument & Computation, 5 (2-3): 160-190 (2014)Firewall configuration: An application of multiagent metalevel argumentation., , , , , and . Argument & Computation, 7 (2-3): 201-221 (2016)Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 231-250. Springer, (2008)A framework for diversifying windows native APIs to tolerate code injection attacks., , , , and . AsiaCCS, page 392-394. ACM, (2007)