I. Biographical Information
I.1. Demographic information
Currently Professor of Computer Science at the U.S. Naval Postgraduate School. U.S. citizen.
Office: Department of Computer Science, Glasgow Extension 328, Code CS/Rp, 1411 Cunningham Road, Naval Postgraduate School, Monterey CA 93943. Telephone: (831) 656-2462. Email: ncrowe@nps.edu. Web pages: http://faculty.nps.edu/ncrowe.
Prof. Rowe was rated in the top 2% of computer scientists in a 2022 survey based on career publications and citations (https://elsevier.digitalcommonsdata.com/datasets/btchxktzyw/6).
I.2. Education
Ph.D. in Computer Science, Stanford University, June 1983, thesis "Rule-based Statistical Calculations on a Database Abstract" (supervised by Gio Wiederhold).
E.E. in Electrical Engineering and Computer Science, Massachusetts Institute of Technology, June 1978, thesis "An Inductive Tutor for Context-Free Grammar Construction" (supervised by Seymour Papert).
S.M. in Electrical Engineering and Computer Science, Massachusetts Institute of Technology, February 1978.
S.B. in Electrical Engineering, Massachusetts Institute of Technology, June 1975.
I.3. Chronology of Professional history
9/20 - : Program Director, Artificial Intelligence Certificate, Computer Science Department, NPS
3/19: Visiting Researcher at Brno University of Technology, Brno, Czech Republic
10/07-9/08: National Research Council Associate (until 4/08) and then sabbatical at the Army Research Laboratory, Adelphi, Maryland
6/00 - : Professor of Computer Science at the Naval Postgraduate School, Monterey, California
7/95-9/07: Associate Chairman for Research of the Computer Science Department, NPS
9/83 - 6/00: Associate Professor (tenured 7/89) of Computer Science at the Naval Postgraduate School, Monterey, California
II. External activities
II.1. Publications
Nearly all the publications listed below can be accessed from the Web page http://faculty.nps.edu/ncrowe and also from calhoun.nps.edu.
Books
N. C. Rowe and J. Rrushi, Introduction to Cyberdeception, New York: Springer, October 2016, 344+14 pages including 71 pages of appendices, ISBN 978-3-319-41185-9.
N. C. Rowe, Artificial Intelligence through Prolog, Englewood Cliffs, N.J.: Prentice-Hall Inc., 1988, 451+20 pages, ISBN 0-13-048679-5. Accompanied by a 108-page instructor's manual written entirely by the author. (Item [82] is the accompanying software.)
Proceedings edited
E. A. Fox and N. C. Rowe (eds.), Digital Libraries 99: The Fourth ACM Conference on Digital Libraries, August 11-14, 1999, Berkeley, CA. New York, NY: Association for Computing Machinery, 1999, 274+12 pages, ISBN 1-58113-145-3.
J. Prasad-Rao, O. J. P. Fischer, N. C. Rowe, J. Williams, T. Puranik, D. Mavris, M. Natali, M. Tindall, and B. Atkinson. Attrition risk and aircraft suitability prediction in U.S. Navy pilot training using machine learning. MDPI Aerospace, Vol. 10, No. 4, paper 379, April 2023. doi: 10.3390/aerospace10040379.
N. C. Rowe, The comparative ethics of artificial-intelligence methods for military applications. Frontiers in Big Data, Cyber Security and Privacy section. Lausanne, Switzerland, 2022. doi: 10.3389/fdata 2022.991759.
N. Rowe, Algorithms for artificial intelligence. IEEE Computer, Vol. 55, No. 7, pp. 87-102, DOI 10.11109/MC.2022/3169360, July 2022.
T. Shimeall, N. Rowe, J. Dykstra, A. Horneman, and M. Midler, Introduction on the nature of situation awareness. Digital Threats: Research and Practice, Vol. 2, No. 4, Article 25, 3 pages, DOI 10.1145/3462334, August 2021.
N. C. Rowe, T. D. Nguyen, M. M. Kendrick, Z. A. Rucker, D. Hyun, and J. C. Brown, Creating effective industrial-control-systems honeypots. American Journal of Management, Vol. 20, No. 2, 2020. Revised version of the conference paper with the same title.
C. B. Leopard, N. C. Rowe, and M. R. McCarrin, Testing memory forensics tools for the Macintosh OS X operating system. Journal of Digital Forensics, Security, and Law, Vol. 13, No. 1, Winter 2018, pp. 31-42.
N. C. Rowe, A taxonomy of norms in cyberconflict for government policymakers. Journal of Information Warfare, Vol. 17, No. 1, Winter 2018, pp 31-48.
J. M. Park, N. C. Rowe, and M. Cisneros, South Korea's options in responding to North Korean cyberattacks. Journal of Information Warfare, Vol. 15, No. 4, Fall 2016, pp. 86-99. (Expanded version of conference paper)
N. C. Rowe, R. Schwamm, M. R. McCarrin, and R. Gera, Making sense of email addresses on drives. Journal of Digital Forensics, Security, and Law, Vol. 11, No. 2 (Proceedings of the International Conference on Digital Forensics and Computer Crime, New York City, NY, US, September 2016), pp. 153-173, 2016. (Winner of "Best Paper" at the conference out of 46 papers submitted.)
N. C. Rowe, Identifying forensically uninteresting files in a large corpus. EAI Endorsed Transactions on Security and Safety, Vol. 16, No. 7, article e2, 2016.
R. Schwamm and N. C. Rowe, Effects of the factory reset on mobile devices. Journal of Digital Forensics, Security, and Law, Vol 9, No. 2 (Proceedings of the International Conference on Digital Forensics and Computer Crime, New Haven, CT, US, September 2014), pp. 205-220, 2014.
A. Sadagic, M. Kölsch, G. Welch, C. Basu, C. Darken, J. Wachs, H. Fuchs, H. Towles, N. Rowe, J.-M. Frahm, L. Guan, R. Kumar, and H. Cheng, Smart instrumented training ranges: Bringing automated system solutions to support critical domain needs. Journal of Defense Modeling and Simulation, Vol. 10, No. 3, pp. 327-342, July 2013.
N. C. Rowe, R. Schwamm, and S. L. Garfinkel, Language translation for file paths. Digital Investigation (Proc. Digital Forensics Research Workshop, Monterey, CA, USA), Vol. 10S, August 2013, pp. S78-S86 (winner of "Best Paper" at the conference of about 50 papers submitted).
N. C. Rowe, Testing the National Software Reference Library. Digital Investigation, Vol. 9S (Proc. Digital Forensics Research Workshop 2012, Washington, DC, August), 2012, pp. S131-S138.
X. Chen, N. C. Rowe, J. Wu, and K. Xiong, Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks. Journal of Parallel and Distributed Computing, Vol. 72, No. 8 (August 2012), pp. 1008-1018.
P. L. Lin, F. Allhoff, and N. C. Rowe, War 2.0: Cyberweapons and ethics. Communications of the ACM, Vol. 55, No. 3, pp. 24-26, March 2012. Reprinted in B. Allenby, ed., The Ethics of Military and Security Technologies, 2015.
N. C. Rowe, S. L. Garfinkel, R. Beverly, and P. Yannakogeorgos, Challenges in monitoring cyberarms compliance. Intl. Journal of Cyber Warfare and Terrorism, Vol. 1, No. 2, 11-14, April-June 2011, pp. 46-59.
N. C. Rowe, The ethics of cyberweapons in warfare. International Journal of Technoethics, Vol. 1, No. 1, January-March 2010, pp. 20-31.
N. C. Rowe, War crimes from cyberweapons. Journal of Information Warfare, Vol. 6, No. 3, pp. 15-25, 2007.
N. C. Rowe, E. John Custy, and B. T. Duong, Defending cyberspace with fake honeypots. Journal of Computers, 2 (2), 2007, pp. 25-36.
S. H. Calfee and N. C. Rowe, Multi-agent simulation of human behavior in naval air defense. Naval Engineers Journal, 116 (4), Fall 2004, pp. 53-64.
N. C. Rowe and H. S. Rothstein, Two taxonomies of deception for attacks on information systems. Journal of Information Warfare, Vol. 3, No. 2 (July), 2004, pp. 27-39.
N. C. Rowe, Cheating in online student assessment: beyond plagiarism. On-Line Journal of Distance Learning Administration, Vol. 7, No., 2, Summer 2004, http://www.westga.edu/ ~distance/jmain11.html. Reprinted in Online Education: A Legal Compendium, 2007, published by the National Association of College and University Attorneys (www.nacua.org).
S. E. Hynes and N. C. Rowe, Multi-agent simulation for assessing massive sensor deployment. Journal of Battlefield Technology, Vol. 7, No. 2 (July), 2004, pp. 23-26.
E. J. Stierna and N. C. Rowe, Applying information-retrieval methods to software reuse: A case study. Information Processing and Management, Vol. 39, No. 1 (January 2003), pp. 67-74.
N. C. Rowe, MARIE-4: A high-recall, self-improving Web crawler that finds images using captions. IEEE Intelligent Systems, Vol. 17, no. 4, July/August 2002, pp. 8-14.
N. C. Rowe and A. Zaky, Load balancing of parallelized information filters. IEEE Transactions on Data and Knowledge Engineering, Vol. 14, No. 2 (March/April 2002), pp. 456-461.
N. C. Rowe, Finding and labeling the subject of a captioned depictive natural photograph. IEEE Transactions on Data and Knowledge Engineering, Vol. 14, No. 1 (January/February 2002),pp. 202-207.
N. C. Rowe and L. Grewe, Change detection for linear features in aerial photographs using edge-finding. IEEE Transactions on Geoscience and Remote Sensing, Vol. 39, No. 7 (July 2001), pp. 1608-1612.
N. C. Rowe and R. S. Alexander, Finding optimal-path maps for path planning across weighted regions. International Journal of Robotics Research, Vol. 19, No. 2 (February 2000), pp. 83-95.
N. C. Rowe, Precise and efficient retrieval of captioned images: The MARIE project. Library Trends, 48, 2 (Fall 1999), pp. 475-495.
N. C. Rowe and S. Schiavo, An intelligent tutor for intrusion detection on computer systems. Computers and Education, Vol. 31 (1998), pp. 395-404.
N. C. Rowe and T. Galvin, An authoring system for intelligent tutors for procedural skills. IEEE Intelligent Systems, Vol. 13, No. 3 (May/June 1998), pp. 61-69.
N. C. Rowe and B. Frew, Automatic caption localization for photographs on World Wide Web pages. Information Processing and Management, Vol. 34, 1 (1998), pp. 95-107.
K. Laitinen, J. Taramaa, M. Heikkila, and N. C. Rowe, Enhancing maintainability of source programs through disabbreviation. Journal of Systems Software, Vol. 37 (1997), pp. 117-128.
N. C. Rowe, Obtaining optimal mobile-robot paths with non-smooth anisotropic cost functions using qualitative-state reasoning. International Journal of Robotics Research, Vol. 16, No. 3 (June 1997), pp. 375-399.
E. J. Guglielmo and N. C. Rowe, Natural language retrieval of images based on descriptive captions. ACM Transactions on Information Systems, Vol. 14, No. 3 (May 1996), pp. 237-267.
N. C. Rowe, Using local optimality criteria for efficient information retrieval with redundant information filters. ACM Transactions on Information Systems, Vol. 14, No. 2 (April 1996), pp. 138-174.
N. C. Rowe and K. Laitinen, Semiautomatic disabbreviation of technical text. Information Processing and Management, 31, 6 (1995), pp. 851-857.
N. C. Rowe and Y. Kanayama, Near-minimum energy paths on a vertical-axis cone with anisotropic friction and gravity effects. International Journal of Robotics Research, 13, 5 (October 1994), pp. 408-432. This is a shortened version of a longer paper with additional theorems, available as technical report NPS52-92, Computer Science Department, U.S. Naval Postgraduate School, September 1992.
D. A. Seem and N. C. Rowe, Shape correlation of low-frequency underwater sounds. Journal of the Acoustical Society of America, 95, 4 (April 1994), pp. 2099-2103.
N. C. Rowe, Inferring depictions in natural-language captions for efficient access to picture data. Information Processing and Management, 30, 3 (1994), pp. 379-388.
N. C. Rowe and E. J. Guglielmo, Exploiting captions in retrieval of multimedia data. Information Processing and Management, 29, 4 (1993), pp. 453-461.
A. Steed, N. C. Rowe, and E. Carter, Using artificial intelligence for hydrographic survey planning, The Hydrographic Journal, 64 (April 1992), pp. 9-16.
N. C. Rowe, Management of regression-model data, Data and Knowledge Engineering, 6 (1991), pp. 349-363. An earlier version was technical report NPS52-85-013, Computer Science Department, U.S. Naval Postgraduate School, September 1985.
N. C. Rowe and R. S. Ross, Optimal grid-free path planning across arbitrarily-contoured terrain with anisotropic friction and gravity effects. IEEE Transactions on Robotics and Automation, 6, 5 (October 1990), pp. 540-553. An earlier draft is Technical report NPS52-89-003, Department of Computer Science, Naval Postgraduate School, Monterey CA, November 1988.
N. C. Rowe and R. F. Richbourg, An efficient Snell's-law method for optimal-path planning across multiple two-dimensional irregular homogeneous-cost regions. International Journal of Robotics Research, 9, 6 (December 1990), pp. 48-66. Also Technical report NPS52-88-017, Department of Computer Science, U. S. Naval Postgraduate School, Monterey CA, July 1988.
N. C. Rowe, Roads, rivers, and obstacles: optimal two-dimensional route planning around linear features for a mobile agent. International Journal of Robotics Research, 9, 6 (December 1990), pp. 67-74. From a longer paper, Technical report NPS52-87-027, Department of Computer Science, U.S. Naval Postgraduate School, June 1987.
N. C. Rowe, Absolute bounds on the mean and standard deviation of transformed data for constant-derivative transformations. SIAM Journal of Scientific and Statistical Computing, 9, 6 (November 1988), pp. 1098-1113. An earlier version is technical report NPS52-84-006, Computer Science Department, U. S. Naval Postgraduate School, September 1987.
N. C. Rowe, Absolute bounds on set intersection and union sizes from distribution information. IEEE Transactions on Software Engineering, SE-14, 7 (July 1988), pp. 1033-1048. An earlier version is technical report NPS52-85-014, Computer Science Department, U.S. Naval Postgraduate School, September 1985.
N. C. Rowe, Antisampling for estimation: an overview. IEEE Transactions on Software Engineering, SE-11, 10 (October 1985), pp. 1081-1091. Also technical report NPS52-84-016, Computer Science Department, Naval Postgraduate School, November 1984.
N. C. Rowe, Naming in programming. Computers in the Schools, 2, 2/3, Summer/Fall 1985, pp. 241-253. Also technical report NPS52-84-17, Computer Science Department, Naval Postgraduate School, November 1984.
N. C. Rowe, Rotating cubes: a trigonometry project using Logo. Computers in the Schools, 2, 2/3, Summer/Fall 1985, pp. 219-240.
N. C. Rowe, Some links between turtle geometry and analytic geometry. International Journal of Mathematical Education in Science and Technology, 16, 1 (1985), pp. 101-112. Also technical report NPS52-84-002, Computer Science Department, Naval Postgraduate School.
N. C. Rowe, Modeling degrees of item interest for a general database query system. International Journal of Man-Machine Studies, 20, 5 (May 1984), pp. 421-443. An earlier version is Stanford Computer Science Department technical report STAN-CS-82-947, April 1982.
N. C. Rowe, Diophantine inferences on a statistical database. Information Processing Letters, 18 (1984), pp. 25-31. An earlier draft was part of Stanford Computer Science Department technical report STAN-CS-82-948.
N. C. Rowe, Inductive common ground tutoring. Computers and Education, 4, 2 (1980), pp. 177-187. (Reviewed in Computing Reviews.)
Refereed contributions to books
N. C. Rowe, Cyber deception. Chapter in Encyclopedia of Cryptography, Security, and Privacy, 3rd edition, ed. S. Jagodia, P. Samarati, and M. Young, Springer Berlin, Heidelberg, 2024. doi.org/10.1007/978-3-642-27739-9_1766-1
N. C. Rowe, Current privacy concerns with digital forensics. Chapter 8 in R. Croft and T. Bagwell, eds., Ethical Issues and Citizen Rights in the Era of Government Surveillance, 2nd edition, Information Science Reference, Hershey, PA, US, 2019, pp. 145-162 (revised version of the 2016 paper with new material). Reprinted as chapter 73 in Information Resources Management Association (Ed.), Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications. IGI Global, 2020, 1464-1481.
N. C. Rowe, Honeypot deception tactics. Chapter 3 in E. Al-Shaer, J. Wei, K. Hamlen, and C. Wang (Eds.), Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, Springer, Chaum, Switzerland, 2019, pp. 35-45.
N. C. Rowe, Challenges of civilian distinction in cyberwarfare. Chapter 3 in M. Taddeo and L. Glorioso (Eds.), Ethics and Policies for Cyber Warfare: A NATO Cooperative Cyber Defense Centre of Excellence Initiative, Philosophical Studies Series Vol. 124, Springer, 2017, pp. 33-48.
N. C. Rowe, Privacy concerns with digital forensics. Chapter 8 in R. Croft and T. Bagwell, eds., Ethical Issues and Citizen Rights in the Era of Government Surveillance, Information Science Reference, Hershey, PA, US, February 2016, pp. 145-162.
P. Lin, F. Allhoff, and N. C. Rowe, Ethical questions need to be answered about cyberweapons. CCCY-1-Current Controversies: Cybercrime, Cengage Learning, pp. 107-112, 2016. Reprint of "Is it possible to wage a just cyberwar" from The Atlantic, 2012.
N. C. Rowe, Attribution of cyberwarfare. Chapter 3 in J. Green (ed.), Cyber Warfare: A Multidisciplinary Analysis, Oxon, UK: Routledge, 2015, pp. 61-72.
N. C. Rowe, Distinctive ethical challenges of cyberweapons. Chapter 14 in N. Tsagourias and R. Buchan (eds.), The Research Handbook on International Law and Cyberspace, Cheltenham, UK: Edward Elgar Publishing, 2015, pp. 307-325. 2nd Edition published in 2021 with a revised chapter, now chapter 18.
N. C. Rowe, S. L. Garfinkel, R. Beverly, and P. Yannakogeorgos, Challenges in monitoring cyberarms compliance. Chapter 7 in P. Yannakogeogos and A. Lowther, Conflict and Cooperation in Cyberspace: The Challenge to National Security in Cyberspace, Taylor and Francis, pp. 81-100, 2014. (Revised version of Steps toward Monitoring Cyberarms Compliance in Proc. 10th European Conf. on Information Warfare and Security, Tallinn, Estonia, July 2011).
N. C. Rowe, Friend or foe? Perfidy in cyberwarfare. Chapter 29 in F. Allhoff, N. Evans, and A. Henschke (eds.), The Routledge Handbook of War and Ethics: Just War Theory in the Twenty-First Century, Oxon, UK: Routledge, 2013, pp. 394-404.
N. C. Rowe, The ethics of cyberweapons in warfare. Chapter 15 in Ethical Impact of Technological Advancements and Applications in Society, reprint of 2010 paper in International Journal of Technoethics, 2012, pp. 195-207.
N. Rowe, A. Reed, R. Schwamm, J. Cho, J. Flores, and A. Das, Networks of simple sensors for detecting emplacement of improvised explosive devices. Chapter 16 in F. Flammini (Ed.), Critical Infrastructure Protection, WIT Press, 2012, pp. 241-254.
N. C. Rowe, Towards reversible cyberattacks. Reprint of the July 2010 ECIW conference paper of the same name, in Leading Issues in Information Warfare and Security Research, Volume I, Academic Publishing, 2011, pp. 145-158.
N. C. Rowe, The ethics of deception in cyberspace. Chapter in The Handbook of Research in Technoethics, ed. R. Luppicini. Hershey, PA: Information Science Reference, 2008, pp. 529-540.
N. C. Rowe, Deception in defense of computer systems from cyber-attack. Chapter 13 in Cyber Warfare and Cyber Terrorism, ed. L. Janczewski and A. Colarik. Hershey PA: Information Science Reference, 2007, 97-104.
N. C. Rowe, Ethics of cyber-attacks. Chapter 14 in Cyber Warfare and Cyber Terrorism, ed. L. Janczewski and A. Colarik. Hershey PA: Information Science Reference, 2007, pp. 105-111.
N. C. Rowe, Automated content-management systems. Chapter in the Encyclopedia of Digital Government, ed. A. V. Anttiroiko & M. Malkia, Hershey, PA: The Idea Group, 2007, Vol. I, pp. 111-116.
N. C. Rowe, Cyber-attacks. Chapter in the Encyclopedia of Digital Government, ed. A. V. Anttiroiko & M. Malkia, Hershey, PA: The Idea Group, 2007, Vol. I, pp. 271-276.
N. C. Rowe, Digital multimedia. Chapter in the Encyclopedia of Digital Government, ed. A. V. Anttiroiko & M. Malkia, Hershey, PA: The Idea Group, 2007, Vol. I, pp. 382-386. Reprinted as Chapter 1.2 in S. Rahman (Ed.), Multimedia Technologies: Concepts, Methodologies, Tools, and Applications, IDG International, 2008, pp. 10-18.
N. C. Rowe, Trust in digital government. Chapter in the Encyclopedia of Digital Government, ed. A. V. Anttiroiko & M. Malkia, Hershey, PA: The Idea Group, 2007, Vol. III, pp. 1572-1576.
N. C. Rowe, Deception in electronic goods and services. Chapter in the Encyclopedia of E-Commerce, E-Government, and Mobile Commerce, ed. M. Khosrow-Pour, Hershey, PA: The Idea Group, 2006, pp. 177-181.
N. C. Rowe, Online deception types. Chapter in the Encyclopedia of Virtual Communities and Technologies, ed. S. Dasgupta, Hershey, PA: The Idea Group, 2006, 343-345.
N. C. Rowe, Ethics of deception in virtual communities. Chapter in the Encyclopedia of Virtual Communities and Technologies, ed. S. Dasgupta, Hershey, PA: The Idea Group, 2006, pp. 204-206.
N. C. Rowe, Detecting and responding to online deception. Chapter in the Encyclopedia of Virtual Communities and Technologies, ed. S. Dasgupta, Hershey, PA: The Idea Group, 2006, pp. 121-124.
N. C. Rowe, Electronic protection. Chapter 77 in Volume II of the Handbook of Information Security, ed. H. Bidgoli, New York: Wiley, 2005, pp. 101-109.
N. C. Rowe, Content repurposing for small devices. Chapter in the Encyclopedia of Multimedia Technology and Networking, ed. M. Pagani, Hershey, PA: Idea Group, 2005, Vol. 1, pp. 110-115. Revised for the second edition, 2008.
N. C. Rowe, Exploiting captions for multimedia data mining. Chapter in the Encyclopedia of Multimedia Technology and Networking, ed. M. Pagani, Hershey, PA: Idea Group, 2005, Vol. 1, pp. 302-307. Revised for the second edition, Vol. II, 546-551, 2009.
N. C. Rowe, Exploiting captions for Web data mining. Chapter 6 in Web Mining: Applications and Techniques, ed. A. Scime, Hershey, PA: Idea Group, 2005, 119-144. Reprinted as Chapter 3.11 in J. Wang (Ed.), Data warehousing and mining: concepts, methodologies, tools, and applications, Information Science Reference, 2008, pp. 1461-1485.
N. C. Rowe and B. Frew, Automatic classification of objects in captioned descriptive photographs for retrieval. Chapter 4 in Intelligent Multimedia Information Retrieval, ed. M. Maybury, Cambridge, MA: AAAI Press, 1997, pp. 65-79.
N. C. Rowe, Rotating cubes: a trigonometry project using Logo. In Logo in the Schools, C. Maddux (ed.), New York: Haworth, 1985, pp. 219-240. (Reprint of [28]).
N. C. Rowe, Naming in programming. In Logo in the Schools, C. Maddux (ed.), New York: Haworth, 1985, pp. 241-253. (Reprint of [27]).
N. C. Rowe, Some rules for good simulations. In Instructional Software: Principles and Perspectives for Design and Use, ed. D. Walker and R. Hess, Belmont CA: Wadsworth, 1984, pp. 181-186. (Reprint of [86]).
N. C. Rowe, Other applications of AI to education. Section IX.D of The Handbook of Artificial Intelligence, volume II, A. Barr and E. Feigenbaum, eds., Los Altos CA: William Kaufman Inc., 1982, pp. 291-294.
Refereed conference papers
J. Landsborough, T. Nguyen, and N. Rowe, Retrospectively using multilayer deception in depth against advanced persistent threats. Proc. Hawaii Intl. Conf. on System Sciences, Hawaii, HI, January 2024.
J. Green, S. Drew, C. Heinen, R. Bixler, N. Rowe, and A. Barton, Evaluating a planning product for active cyberdefense and cyberdeception. 22nd International Conference on Security and Management, Las Vegas, NV, US, July 2023.
J. Meier, T. Nguyen, and N. C. Rowe, Hardening honeypots for industrial control systems. Proc. Hawaii Intl. Conf. on Systems Sciences, Maui, HI, January 2023.
R. Ramirez, T. Nguyen, N. Rowe, and J. Meier, Classifying RDP remote attacks on user interfaces to industrial control systems. CSCI-RCTW (International Conference on Computational Science and Computational Intelligence, Research Track on Cyber Warfare, Cyber Defense, and Cyber Security), December 2022.
B. Foley, N. Rowe, and T. Nguyen, Analyzing attacks on client-side honeypots from representative malicious Web sites. CSCI-RCTW (International Conference on Computational Science and Computational Intelligence, Research Track on Cyber Warfare, Cyber Defense, and Cyber Security), December 2022.
N. Haynes, T. Nguyen, and N. C. Rowe, Creating synthetic attacks with evolutionary algorithms for proactive defense of industrial control systems. Proc. Hawaii Intl. Conf. on Systems Sciences, Maui, HI, January 2023.
M. Lidestri and N. C. Rowe, Quantifying the milestones of cyber vulnerabilities. 21st International Conference on Security and Management, Las Vegas, NV, U.S., July 2022.
A. Washofsky, N. C. Rowe, and T. Nguyen, Using cloud honeypot platforms for gathering industrial-control-system attack intelligence. Workshop on Industrial Control Systems Security, ACSAC, December 2021.
N. C. Rowe, T. D. Nguyen, J. T. Dougherty, M. C. Bieker, and D. Pilkington, Identifying anomalous industrial-control-system network flow activity using cloud honeypots. Springer Lecture Notes in Networks and Systems, Volume 310, Proc. National Cyber Summit (NCS) Research Track, Huntsville, Alabama, pp. 151-162, September 2021.
G. Harter and N. C. Rowe, Testing detection of K-ary code obfuscated by metamorphic and polymorphic techniques. Springer Lecture Notes in Networks and Systems, Volume 310, Proc. National Cyber Summit (NCS) Research Track, Huntsville, Alabama, pp. 151-162, September 2021.
Proc. National Cyber Summit, Huntsville, Alabama, pp. 110-123, September 2021.
N. C. Rowe, T. D. Nguyen, M. M. Kendrick, Z. A. Rucker, D. Hyun, and J. C. Brown, Creating effective industrial-control-systems honeypots. Proc. Hawaii Intl. Conf. on Systems Sciences, Wailea, HI, January 2020.
N. C. Rowe and C. E. Knight, Case-based reasoning for summarizing simulation results. Proc. Intl. Conf. on Computational Science and Computational Intelligence, Las Vegas, NV, USA, December 2019.
M. Atadika, K. Burke, and N. C. Rowe, Critical risk management practices to mitigate cloud migration misconfigurations. Proc. Intl. Conf. on Computational Science and Computational Intelligence, Las Vegas, NV, USA, August 2019.
N. C. Rowe, B. Allen, J. Zhou, A. Flores, and A. Das, Distributed combat identification of interesting aircraft. Poster at 3rd Naval Applications of Machine Learning Workshop, San Diego, CA, February 2019.
J. S. Dean and N. C. Rowe, Utility of user roles in comparing network flow behaviors. Proc. Intl. Conf. on Computational Science and Computational Intelligence, December 2018, Las Vegas, NV, USA, pp. 42-47.
E. E. Wanic and N. C. Rowe, Assessing deterrence options for cyber weapons. Proc. Intl. Conf. on Computational Science and Computational Intelligence, December 2018, Las Vegas, NV, USA, pp. 13-18.
B. T. Henderson, S. F. McKenna, and N. C. Rowe, Web honeypots for spies. Intl. Conf. on Computational Science and Computational Intelligence, December 2018, Las Vegas, NV, USA, pp. 1-6.
N. C. Rowe, Dynamic attacker reasoning about deception taxonomies (abstract). Cyber Shorelines: Workshop of Defensive Deception and Trust in Autonomy, San Diego, CA August 13-15, 2018.
A. Sollish, S. Everton, N. C. Rowe, and N. W. Porter, Finding correlations between ship positions. International Command and Control Research and Technology Symposium, Pensacola, FL, November 2018.
C. G. Hall and N. C. Rowe, Options for the persistence of cyberweapons. International Command and Control Research and Technology Symposium, Pensacola, FL, November 2018.
N. C. Rowe, B. Allen, J. Zhou, A. Flores, and A. Das, Distributed combat identification of interesting aircraft. International Command and Control Research and Technology Symposium, Pensacola, FL, November 2018.
N. C. Rowe, Associating drives based on their artifact and metadata distributions. Proc. 10th EAI International Conference on Digital Forensics and Computer Crime, New Orleans, LA, September 2018.
N. C. Rowe, Finding and rating personal names on drives for forensic needs, Proc. 9th EAI International Conference on Digital Forensics and Computer Crime, Prague, Czech Republic, October 2017. Springer Lecture Notes of the Institute for Computer Science, Social Informatics, and Telecommunications Engineering, Vol. 216.
C. B. Leopard, N. C. Rowe, and M. R. McCarrin, Memory forensics and the Macintosh OS X operating system. Proc. 9th EAI International Conference on Digital Forensics and Computer Crime, Prague, Czech Republic, October 2017. Springer Lecture Notes of the Institute for Computer Science, Social Informatics, and Telecommunications Engineering, Vol. 216.
A. Adams, N. C. Rowe, and A. Das, Data deception in stream processing. Poster in Proc. 15th European Conference on Cyber Warfare and Security, Munich, Germany, July 2016.
J. M. Park, N. C. Rowe, and M. Cisneros, Responding to North Korean cyberattacks. Proc. 15th European Conference on Cyber Warfare and Security, Munich, Germany, July 2016.
N. C. Rowe, Finding contextual clues to malware using a large corpus. ISCC-SFCS Third International Workshop on Security and Forensics in Communications Systems, Larnaca, Cyprus, July 2015.
A. Yahyaoui and N. C. Rowe, Testing simple deceptive honeypot tools. SPIE Defense and Security, Paper 9458-2, Baltimore MD USA, April 2015.
N. B. Carr and N. C. Rowe, A prototype forensic toolkit for industrial-control-systems incident response. SPIE Defense and Security, Paper 9458-31, Baltimore MD USA, April 2015.
D. Flemming and N. C. Rowe, Cyber coercion: cyber operations short of cyberwar. Proc. 10th International Conference on Cyber Warfare and Security, Skukuza, South Africa, March 2015.
K.-M. Tan, N. Rowe, C. Darken, and F.-W. Khong, A comparative evaluation of intrusion-alert prediction techniques. The 2014 International Conference on Security and Management, July 2014, Las Vegas, Nevada, USA.
N. C. Rowe, Identifying forensically uninteresting files using a large corpus, 5th International Conference on Digital Forensics and Computer Crime, Moscow, Russia, September 2013. Also published in Volume 132 of the Lecture Notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering series, Springer-Verlag, 2015.
D. Chang and N. C. Rowe, Model-driven requirements engineering (MDRE) for real-time ultra-wide instantaneous bandwidth signal simulation. Proc. SPIE vol. 8752, pp. 875204-1 to 875204-15, April 2013.
N. C. Rowe, Automated trend analysis for Navy-carrier landing attempts. Proc. Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC), Orlando, FL, December 2012.
N. C. Rowe and S. L. Garfinkel, Finding suspicious activity on computer systems. Proc. 11th European Conf. on Information Warfare and Security, Laval, France, July 2012.
E. E. Frederick, N. C. Rowe, and A. B. G. Wong, Testing deception tactics in response to cyberattacks. National Symposium on Moving Target Research, Annapolis, MD, June 2012.
R. Schwamm and N. C. Rowe, The Android phone as an inexpensive sentry ground sensor. Proc. SPIE Conf. on Unattended Ground, Sea, and Air Sensor Technologies and Applications XIV, Baltimore, MD, April 2012.
D. Chang and N. C. Rowe, A standardized way to select, evaluate, and test an analog-to-digital converter for ultra-wide bandwidth radiofrequency signals based on user's needs, ideal, published, and actual specifications. Proc. SPIE vol. 8355, 83551D, pp. 83551D-1 to 83551D-10, April 2012.
M. Kindl and N. C. Rowe, Evaluating simulated annealing for the weighted-region path-planning problem. The International Workshop on Bio and Intelligent Computing, Fukuoka, Japan, March 2012.
E. Albin and N. C. Rowe, A realistic experimental comparison of the Suricata and Snort intrusion-detection systems. Eighth International Symposium on the Frontiers of Information Systems and Network Applications, Fukuoka, Japan, March 2012.
X. Chen and N. C. Rowe, Saving energy by adjusting transmission power in wireless sensor networks. Proc. Ad-hoc and Sensor Network Symposium, IEEE Globecom, Houston, Texas, December 2011.
N. C. Rowe and S. L. Garfinkel, Finding anomalous and suspicious files from directory metadata on a large corpus. 3rd International ICST Conference on Digital Forensics and Cyber Crime, Dublin, Ireland, October 2011. In P. Gladyshev and M. K. Rogers (eds.), Lecture Notes in Computer Science LNICST 88, Springer-Verlag, 2012, pp. 115-130.
N. C. Rowe and A. L. Chan, Rating whole-body suspiciousness factors in automated surveillance of a public area. Proc. Intl. Conf. on Image Processing, Computer Vision, and Pattern Recognition, Las Vegas, NV, July 2011.
N. C. Rowe, S. L. Garfinkel, R. Beverly, and P. Yannakogeorgos, Steps towards monitoring cyberarms compliance. Proc. 10th European Conf. on Information Warfare and Security, Tallinn, Estonia, July 2011.
X. Chen and N. Rowe, An energy-efficient communication scheme in wireless cable sensor networks, Proc. IEEE Intl. Conf. on Communications, Kyoto, JP, June 2011.
N. Rowe, J. Houde, R. Osoteo, R. Schwamm, C. Kirk, A. Reed, S. Khan, C. Broaddus, and C. Meng, Visualizing performance ratings for instructors assessing physical-motion skills. Global Learning Conference, Melbourne, AU, March 2011 (awarded "Outstanding Paper" given to 6 of 120 papers).
N. Rowe, R. Schwamm, J. Cho, A. Reed, J. Flores, and A. Das, Detecting explosive-device emplacement at multiple granularities. National Symposium of the Military Sensing Society (MSS), Las Vegas, Nevada, U.S., July 2010.
P. Young, N. Rowe, T. Anderson, and G. Singh, A mobile phone-based sensor grid for distributed team operations. Symposium on Sensor and Data Fusion of the Military Sensing Society (MSS), Las Vegas, Nevada, US, July 2010.
X. Chen, N. Rowe, and G. Singh, Improving localization accuracy using spatio-temporal information of objects. IEEE Intl. Conf. on Communications, Cape Town, South Africa, May 2010.
N. C. Rowe, Towards reversible cyberattacks. Proc. 9th European Conference on Information Warfare and Security, Thessaloniki, Greece, July 2010.
N. C. Rowe and S. L. Garfinkel, Global analysis of disk file times. Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland CA, May 2010.
N. C. Rowe, A. A. Reed, and J. J. Flores, Detecting suspicious motion with nonimaging sensors. Third IEEE International Workshop on Bio and Intelligent Computing, Perth, Australia, April 2010.
N. C. Rowe, J. P. Houde, M. N. Kolsch, C. J. Darken, E. R. Heine, A. Sadagic, C. Basu, and F. Han, Automated assessment of physical-motion tasks for military integrative training. Second International Conference on Computer Supported Education, Valencia, Spain, April 2010.
G. Singh, P. Young, N. Rowe, and T. Anderson, Inexpensive seismic sensors for early warning of military sentries, Proceedings of SPIE Defense, Security, and Sensing Conference, Vol. 7693, Orlando, Florida, April 2010.
N. C. Rowe, Efficient employment of linear fiber-optic seismic sensors. Proc. of the Unattended Ground, Sea, and Air Sensor Technologies and Applications XII subconference of SPIE Defense, Security, and Sensing Conference, Orlando, FL, April 2010.
A. Sadagic, G. Welch, C. Basu, C. Darken, R. Kumar, H. Fuchs, H. Cheng, J.-M. Frahm, M. Kolsch, N. Rowe, H. Towles, J. Wachs, and A. Lastra, New generation of instrumented ranges: enabling automated performance analysis. Interservice/Industry Training, Simulation, and Education Conference, Orlando, FL, November 2009.
N. C. Rowe, Automated instantaneous performance assessment for Marine-squad urban-terrain training. Intl. Command and Control Research and Technology Symposium, Washington, DC, June 2009 (nominated for Best Paper).
N. C. Rowe, M. O'Hara, and G. Singh, Wireless sensor networks for detection of IED emplacement. Intl. Command and Control Research and Technology Symposium, Washington, DC, June 2009.
N. C. Rowe, Interpreting coordinated and suspicious behavior in a sensor field. Proceedings of the Meeting of the Military Sensing Symposium Specialty Group on Battlespace Acoustic and Seismic Sensing, Magnetic and Electric Field Sensors, Laurel, MD, August 2008.
E. J. Custy and N. Rowe, Conditional entropy for deception analysis. International Command and Control Research and Technology Symposium, Bellevue, WA, June 2008.
J. Sundram, P. P. Sim, N. C. Rowe, and G. Singh, Assessment of electromagnetic and passive diffuse infrared sensors in detection of suspicious behavior. International Command and Control Research and Technology Symposium, Bellevue, WA, June 2008.
N. C. Rowe, E. Sjoberg, and P. Adams, Automatically tracing information flow of vulnerability and cyber-attack information through text strings. International Command and Control Research and Technology Symposium, Bellevue, WA, June 2008.
N. C. Rowe, D. S. Barnes, M. McVicker, M. Egan, R. Betancourt, R. Toledo, D. Horner, D. Davis, L. Guiterrez, and C. Martell, Do word clues suffice in detecting spam and phishing? 8thIEEE Information Assurance Workshop, West Point, NY, June 2007, pp. 14-21.
N. C. Rowe and H. C. Goh, Thwarting cyber-attack reconnaissance with inconsistency and deception. 8th IEEE Information Assurance Workshop, West Point, NY, June 2007, pp. 151-158.
M. McVicker, P. Avellino, and N.C. Rowe, Automated retrieval of security statistics from the World Wide Web. 8th IEEE Information Assurance Workshop, West Point, NY, June 2007, pp. 355-356.
N. C. Rowe, Finding logically consistent resource-deception plans for defense in cyberspace. 3rd International Symposium on Security in Networks and Distributed Systems, Niagara Falls, Ontario, Canada, pp. 563-568, May 2007.
N. C. Rowe, Logical modeling for automated deceptive negative persuasion. 2nd Conference on Persuasive Technology, Stanford, CA, April 2007. In Y. Yvon, De Kort, W. Ijsselsteijn, C. Midden, B. Eggen, and B. Fogg (eds.), Springer Lecture Notes in Computer Science, LNCS 4744, Berlin, Germany: Spring-Verlag, pp. 105-108.
N. C. Rowe, H. C. Goh, S. L. Lim, & B. T. Duong, Experiments with a testbed for automated defensive deception planning for cyber-attacks. Second International Conference on I-Warfare and Security, Monterey, CA, March 2007.
N. C. Rowe, Planning cost-effective deceptive resource denial in defense to cyber-attacks. Second International Conference on I-Warfare and Security, Monterey, CA, March 2007.
N. C. Rowe, B. T. Duong, and E. J. Custy, Fake honeypots: a defensive tactic for cyberspace. 7th IEEE Workshop on Information Assurance, West Point, NY, June 2006, pp. 223-230.
K. G. Labbe, N. C. Rowe, and J. D. Fulp, A methodology for evaluation of host-based intrusion-prevention systems and its application. 7th IEEE Workshop on Information Assurance, West Point, NY, June 2006, pp. 378-379.
A. Armold, B. Hyla, and N. C. Rowe, Automatically building an information-security vulnerability database. 7th IEEE Workshop on Information Assurance, West Point, NY, June 2006, pp. 376-377.
L. Laribee, D. S. Barnes, N. C. Rowe, and C. H. Martell, Analysis and defensive tools for social-engineering attacks on computer systems. 7th IEEE Workshop on Information Assurance, West Point, NY, June 2006, pp. 388-389.
N. C. Rowe, A taxonomy of deception in cyberspace. International Conference on Information Warfare and Security, Princess Anne, MD, pp. 173-181, March 2006.
N. C. Rowe, Measuring the effectiveness of honeypot counter-counterdeception. Hawaii International Conference on Systems Sciences, Poipu, HI, January 2006.
N. C. Rowe, Detecting suspicious behavior from only positional data with distributed sensor networks. 5th International Conference on Multibody Systems, Nonlinear Dynamics and Control, Long Beach, California, September 2005.
N. C. Rowe, Detecting suspicious behavior from positional information. Workshop on Modeling Others from Observations, Intl. Joint Conference on Artificial Intelligence, Edinburgh, UK, July 2005, available at www.isi.edu/~pynadath/MOO-2005/7.pdf.
B. Ozkan, N. C. Rowe, S. H. Calfee, & J. E. Hiles, Three simulation models of naval air defense. International Command and Control Research and Technology Symposium, McLean, Virginia, June 2005, available at dodccrp.org.
N. C. Rowe, J. Wintrode, J. Sparks, J. Vorrath, & M. Lear, Deep versus broad methods for automatic extraction of intelligence information. International Command and Control Research and Technology Symposium, McLean, Virginia, June 2005, available at dodccrp.org.
N. C. Rowe, Automatic detection of fake file systems. International Conference on Intelligence Analysis Methods and Tools, McLean, Virginia, May 2005.
N. C. Rowe, Designing good deceptions in defense of information systems. Computer Security Applications Conference, Tucson, AZ, December 2004, 418-427.
N. C. Rowe, A model of deception during cyber-attacks on computer systems. Symposium on Multi-Agent Security and Survivability, Philadelphia, PA, August 2004.
N. C. Rowe, Using context to disambiguate Web captions. Internet Computing Conference, Las Vegas, NV, June 2004, Vol. 1: 109-115.
N. C. Rowe, M. Auguston, D. Drusinsky, and J. B. Michael, Research on deception in defense of information systems, Command and Control Research and Technology Symposium, San Diego, CA, June 2004, available at dodccrp.org.
N. C. Rowe, Understanding Navy technical language via statistical parsing, Command and Control Research and Technology Symposium, San Diego, CA, June 2004, available at dodccrp.org.
J. Alves, J. Herman, and N. C. Rowe, Robust recognition of ship types from an infrared silhouette, Command and Control Research and Technology Symposium, San Diego, CA, June 2004, available at dodccrp.org.
S. Hynes and N. C. Rowe, Multi-agent simulation for assessing massive sensor deployment, Command and Control Research and Technology Symposium, San Diego, CA, June 2004 (nominated for Best Student Paper), available at dodccrp.org.
N. C. Rowe, Counterplanning deceptions to foil cyber-attack plans. Proc. 2003 IEEE-SMC Workshop on Information Assurance, West Point, NY, June 2003, 203-211 (and also 221-228).
D. Julian, N. C. Rowe, and J. B. Michael, Experiments with deceptive software responses to buffer-based attacks. Proc. 2003 IEEE-SMC Workshop on Information Assurance, West Point, NY, June 2003, 43-44.
N. C. Rowe and S. F. Andrade, Counterplanning for multi-agent plans using stochastic means-ends analysis, IASTED Artificial Intelligence and Applications Conference, Malaga, Spain, September 2002, 405-410.
N. C. Rowe, Thorough indexing of images on the World Wide Web, IASTED Artificial Intelligence and Applications Conference, Malaga, Spain, September 2002, 192-197.
J. B. Michael, M. Auguston, N. C. Rowe, and R. Riehle, Software decoys: intrusion detection and countermeasures, IEEE Information Assurance Workshop, West Point, New York, June 2002, 130-138.
N. C. Rowe, Virtual multimedia libraries built from the Web, Second ACM-IEEE Joint Conference on Digital Libraries (JCDL02), Portland, OR, July 2002, 158-159.
N. C. Rowe, J. Coffman, Y. Degirmenci, S. Hall, S. Lee, and C. Williams, Automatic removal of advertising from Web-page display, Second ACM-IEEE Joint Conference on Digital Libraries (JCDL02), published poster and presentation, Portland, OR, July 2002, 406.
S. F. Andrade, N. C. Rowe, D. P. Gaver, and P. A. Jacobs, Analysis of shipboard firefighting-team efficiency using intelligent-agent simulation, Command and Control Research and Technology Symposium, Monterey CA, June 2002.
S. Calfee and N. C. Rowe, An expert system and tutor for maritime navigation rules, Command and Control Research and Technology Symposium, Monterey, CA, June 2002.
J. B. Michael, V. Ong, and N. C. Rowe, Natural-language processing support for developing policy-governed software systems, 39th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS '01), Santa Barbara, CA, July-August 2001, 263-274.
D. J. Ingram, H. S. Kremer, and N. C. Rowe, Distributed intrusion detection for computer systems using communicating agents, Sixth International Symposium on Research and Technology on Command and Control, Annapolis, MD, June 2001.
N. C. Rowe, L. Grewe, and W. Baer, A digital library of aerial photographs supporting change analysis. Poster and presentation at ACM Digital Libraries 2000, San Antonio, TX, June 2000.
D. J. Ingram, N. C. Rowe, and H. S. Kremer, Distributed intrusion detection for computer systems using communicating agents, Command and Control Research and Technology Symposium, Monterey, CA, June 2000. (Winner of "Best Paper" at the conference.)
G. K. Hunter and N. C. Rowe, Software design for a fault-tolerant communications satellite, Command and Control Research and Technology Symposium, Monterey, CA, June 2000.
D. L. L. Sicuro and N. C. Rowe, Automatic generation of best emergency routes and procedures on a Brazilian frigate, Command and Control Research and Technology Symposium, Monterey, CA, June 2000.
L. Grewe, N. Rowe, and W. Baer, AERICOMP: An aerial photo comparison system, SPIE Signal Processing, Sensor Fusion, and Target Recognition IX Conference, June 2000.
N. Rowe, A computer tutor for logic semantics. Frontiers in Education Conference (FIE 99), San Juan, PR, November 10-13, 1999, Proceedings ISBN 0-7803-5643-8.
N. Rowe, An intrusion-detection environment for information-security instruction. Frontiers in Education Conference (FIE 99), San Juan, PR, November 10-13, 1999, Proceedings ISBN 0-7803-5643-8.
W. Baer, L. Grewe, and N. Rowe, Use of image feedback loops for real time terrain feature extraction. IS&T/SPIE Symposium on Real-Time Imaging IV, SPIE vol. 3645, January 1999, 12-23.
N. C. Rowe, Mapping between image regions and caption concepts of captioned depictive photographs. AAAI-98 Workshop on Representations for Multi-Modal Human-Computer Interaction, Madison WI, July 1998, 70-75.
J. Barrus and N. C. Rowe, A distributed autonomous-agent network-intrusion detection and response system. 1998 Command and Control Research and Technology Symposium, Monterey CA, June 1998, 577-586.
N. C. Rowe, C. Reed, W. Baer, and L. Jackson, A planner for constructing customized terrain databases. 1998 Command and Control Research and Technology Symposium, Monterey CA, June 1998, 481-486.
N. C. Rowe, An intrusion-detection simulator/tutor. Workshop on Intrusion Detection, 12th Computer Security Applications Conference, San Diego, CA, December 1996.
N. C. Rowe and B. [Brian] Frew, Distinguishing the picture captions on the World Wide Web. ACM Digital Libraries 97, Philadelphia PA, July 1997.
N. C. Rowe and B. [Brian] Frew, Finding photograph captions multimodally on the World Wide Web. AAAI Spring Symposium on Intelligent Integration and Use of Text, Image, Video, and Audio Corpora, Stanford CA, March 1997, 45-51.
N. C. Rowe, Efficient parallel information filtering. 1996 Command and Control Research and Technology Symposium, Monterey CA, June 1996, 413-414.
N. C. Rowe, Redundant processing as a solution to the mismatch between natural language and vision. AAAI Fall Symposium on Computational Models for Integrating Natural Language and Vision, Cambridge, MA, November 1995, 102-106.
N. C. Rowe, Retrieving captioned pictures using statistical correlations and a theory of caption-picture co-reference. Fourth Annual Symposium on Document Analysis and Retrieval, Las Vegas, NV, April 1995, 525-534.
N. C. Rowe, Universal mission planning for robotic vehicles. American Nuclear Society 6th Topical Meeting on Robotics and Remote Systems, Monterey CA, February 1995.
N. C. Rowe, Domain-independent rules relating captions and pictures. Proceedings of the AAAI-94 Workshop on Integration of Natural Language and Vision Processing, Seattle, WA, July 1994, 1-13.
N. C. Rowe, Statistical versus symbolic parsing for captioned-information retrieval. Proceedings of the ACL Workshop on The Balancing Act: Combining Symbolic and Statistical Approaches to Language, Las Cruces, NM, July 1994, 112-121.
N. C. Rowe, Optimal configuration of information filters for C3I applications. 1994 Symposium on C2 Research and Decision Aids, Monterey CA, June 1994, 413-414.
T. P. Galvin and N. C. Rowe, Using the A* search space to develop a general-purpose intelligent tutoring shell. Proceedings of ED-MEDIA 94, Vancouver, Canada, June 1994. Also published in the Educational Multimedia and Hypermedia Annual, 1994.
N. C. Rowe and F. Suwono, Aiding teachers in constructing virtual-reality tutors. Fourth Annual Conference on Artificial Intelligence, Simulation, and Planning in High Autonomy Systems, Tucson AZ, September 1993, 317-323.
E. J. Guglielmo, N. Ntoka, and N. C. Rowe, A prototype decision support system and multimedia database for command and control, 9th Annual Decision Aids Conference, Monterey CA, June 1992.
E. J. Guglielmo and N. C. Rowe, Natural language processing of captions for retrieving multimedia data, Conference on Applied Natural Language Processing, Trento, Italy, April 1992. An extended form was published as Naval Weapons Center technical publication NWC TP 7203, December 1991.
B. Holtkamp, V. Y. Lum, and N. C. Rowe, DEMOM: A description based media object data model, IEEE Computer Software and Applications Conference (COMPSAC), Chicago IL, October 1990, 57-63.
R. S. Alexander and N. C. Rowe, Path planning by optimal-path-map construction for homogeneous-cost two-dimensional regions. Proceedings of IEEE International Conference on Robotics and Automation, Cincinnati, OH, May 1990, 1924-1929.
N. C. Rowe, Plan fields and real-world uncertainty, Proceedings of the AAAI Spring Symposium on Planning in Uncertain, Unpredictable, or Changing Environments, Stanford CA, March 1990. Proceedings edited by J. Hendler and published as technical research report SRC TR 90-45, Systems Research Center, University of Maryland.
N. C. Rowe, Inference-security analysis using resolution theorem-proving. Fifth International Conference on Data Engineering, Los Angeles, CA, February 1989, 410-416. An earlier draft is Technical Report NPS52-87-053, Naval Postgraduate School, December 1987.
N. C. Rowe and D. H. Lewis, Vehicle path-planning using optics analogs for optimizing visibility and energy cost. NASA Conference on Space Telerobotics, Pasadena CA, January 1989, NASA Jet Propulsion Laboratory Publication 89-7, vol. IV, 217-226. Also Technical Report NPS52-89-019, Computer Science Dept., Naval Postgraduate School, December 1987.
R. S. Ross, N. C. Rowe, and R. B. McGhee, Dynamic multivariate terrain cost maps for automatic route planning. AAAI Workshop on Planning Systems for Autonomous Mobile Robots, July 1987.
R. S. Ross, R. B. McGhee, M. J. Zyda, and N. C. Rowe, A context-dependent terrain classification paradigm for land mobility problems. Third Annual Expert Systems in Government Conference, Washington D.C., October 1987, 2-5. Also Technical Report NPS-52-86-022, Computer Science Department, Naval Postgraduate School, October 1986.
R. F. Richbourg, N. C. Rowe, M. J. Zyda, and R. B. McGhee, Solving global, two-dimensional routing problems using Snell's law and A* search. Proceedings of the IEEE International Conference on Robotics and Automation, Raleigh, North Carolina, February 1987, 1631-1636. Also Technical report NPS-86-021, Computer Science Department, Naval Postgraduate School, October 1986.
R. F. Richbourg, N. C. Rowe, and M. J. Zyda, Exploiting capability constraints to solve global, two-dimensional path planning problems. Proceedings of the IEEE International Conference on Robotics and Automation, San Francisco, California, March 1986. Also Technical report NPS-86-006, Computer Science Department, U.S. Naval Postgraduate School, January 1986.
N. C. Rowe, Steps towards parsing of query sequences to a database. Proceedings of the First International Workshop on Expert Database Systems, Kiawah Island SC, October 1984, 786-797. Also technical report NPS52-84-015, Computer Science Department, Naval Postgraduate School, November 1984.
N. C. Rowe, Diophantine inferences from statistical aggregates on few-valued attributes. First International Conference on Data Engineering, Los Angeles, April 1984, 107-110. Also technical report NPS52-84-003, Computer Science Department, Naval Postgraduate School.
N. C. Rowe, Some experiments in evaluation of an expert system for statistical estimation on databases. Second International Workshop on Statistical Database Management, Los Altos CA, September 1983, 235-244 (Lawrence Berkeley Laboratory publication LBL-16321).
N. C. Rowe, Top-down statistical estimation on a database. Proceedings of the ACM-SIGMOD Annual Meeting, San Jose, California (May 1983), 135-145. Also technical report NPS52-84-001, Computer Science Department, Naval Postgraduate School.
N. C. Rowe, Inheritance of statistical properties. Proceedings of the National Conference, American Association for Artificial Intelligence, Pittsburgh, Pennsylvania (August 1982), 221-224. Also part of Stanford Computer Science Department technical report STAN-CS-82-948.
N. C. Rowe, Rule-based statistical calculations on a "database abstract". Proceedings of the First LBL Workshop on Statistical Database Management, Menlo Park CA, December 1981, 163-175 (Lawrence Berkeley Laboratory publication LBL-13851). Also part of Stanford Computer Science Department technical report STAN-CS-82-948.
Invited conference papers
N. C. Rowe, Discussion, FAIM 1990 (Forum on Artificial Intelligence in Management) conference, sponsored by Defense Systems Management College, Ft. Belvoir, VA, May 1990, 831-835.
N. C. Rowe, Subclasses equal instances, thanks to statistical databases. Third International Conference on Data Engineering, Los Angeles, CA, February 1987, 283-284. Also NPS technical report NPS52-87-015.
N. C. Rowe, Antisampling for estimation. In Computer science and statistics: Proceedings of the 16th Symposium on the Interface, Atlanta GA, March 1984, 213. Springer-Verlag, 1984.
Unrefereed articles accepted by editors
[CHIPS articles on Smith work and aviator training]
D. Chang and N. C. Rowe, The advantages and disadvantages of digitizing ultra-wide instantaneous bandwidth (IBW) radiofrequency signals, selected for publication in NAVAIR Journal for Scientists and Engineers, 5 June 2013.
P. Lin, F. Allhoff, and N. Rowe, Is it possible to wage a just cyberwar? The Atlantic, June 5, 2012, www.theatlantic.com/technology/achive/2012/06/is-it-possible-to-wage-a-just-cyberwar/258106.
J. B. Michael, N. Rowe, M. Auguston, D. Drusinsky, R. Riehle, H. Rothstein, V. Monteiro, M. Julian, C. Fragkos, G. Uzuncaova, & T. Wingfield, Intelligent software decoys. Naval Postgraduate School Research, Vol. 13, No. 1SE, February 2003, pp. 42-44.
N. C. Rowe, J. B. Michael, M. Auguston, and R. Riehle, Software decoys for software counterintelligence. IA Newsletter, 5, 1, Spring 2002, 10-12.
N. C. Rowe, Review of The Fifth Generation by E. Feigenbaum and P. McCorduck. SIGMOD Record, 14, 1 (March 1984), 64-65.
N. C. Rowe, Improving Logo programs. Accepted (but apparently not published) to The Computing Teacher, July 1984.
N. C. Rowe, More POLYs. Creative Computing, 8, 4 (April 1982), 132-137.
N. C. Rowe, Some rules for good simulations. Educational Computer, 1, November/December 1981, 37-40.
N. C. Rowe, Melody transformations. Recreational Computing, January/February 1981, 49-53.
N. C. Rowe, Property list structures. Creative Computing, 6, 10 (October 1980), 126-130.
N. C. Rowe, Sine POLYs: some geometric explorations. Creative Computing, 5, 12 (December 1979), 92-95.
N. C. Rowe, Grammar as a programming language. Creative Computing, 4, 1 (January/February 1978), 80-86. An extended version appeared as MIT Artificial Intelligence Laboratory Memo 391, October 1976.
Presentations not accompanied by conference papers
N. C. Rowe, presenter of 3-day seminar on artificial intelligence at NPS Hawaii (Honolulu, HI), May 2024.
N. C. Rowe, poster introduction at Winter Naval AI Summit, "The Effects of Adversarial Data Perturbation on Ship Classification", December 6. 2023.
N. C. Rowe, panelist at Spring Naval AI Summit, panel topic "Cybersecurity Issues in AI", March 16, 2023, Monterey, CA, US.
N. C. Rowe, presenter of 2-day seminar in artificial intelligence (in "Senior Leaders: Artificial Intelligence Lecture Series") at U.S. Army Yuma Proving Ground, Yuma, AZ, August 2022.
N. C. Rowe, 3-hour use case session at Create AI workshop for Joint Artificial Intelligence Center, online, October 28, 2021 and March 16, 2022.
N. C. Rowe, panelist at USARPAC AI Discovery Panel, July 13, 2021.
N. C. Rowe, "A survey of DoD adoption of commercial-style artificial intelligence for procurement", presentation at the Fifth Navy Applications of Machine Learning Workshop, March 25, 2021.
N. C. Rowe, China's "Artificial-Intelligence Strategy: Human Neural Networks", poster at the Fifth Navy Applications of Machine Learning Workshop, March 24, 2021.
N. C. Rowe, invited panelist for "The Human Factors Surrounding Trust and Deception for Cybersecurity" at the ErgoX Conference, Cybersecurity Track, Human Factors and Ergonomics Society (hfes.com), October 6, 2020.
N. C. Rowe, "Empirical Digital Forensics", CERIAS Security Seminar, Purdue University, April 1, 2020.
N. C. Rowe, "Using an Evolutionary Algorithm to Anticipate Technological Surprises", presentation at the Fourth Navy Applications of Machine Learning Workshop, February 24, 2020.
N. C. Rowe, "Software Engineering of Artificial Intelligence", panelist at ITU/ASQ (American Society for Quality) meeting on future directions in artificial intelligence, International Technological University, San Jose, CA, January 23, 2020.
N. C. Rowe, "Eliminating Uninteresting Files and Email Addresses", Digital Forensics Forum, Mclean, VA, March 8, 2016.
N. C. Rowe, "Challenges of Civilian Distinction in Cyberwarfare", invited presentation at the NATO Coordinated Cyber Defence Center of Excellence Workshop on Ethics and Policies for Cyber Warfare, Oxford, UK, November 2014.
N. C. Rowe, "Comments on Law of Armed Conflict / Rules of Engagement", invited panelist at Harvard-MIT-University of Toronto Cyber Norms Workshop 2.0, Cambridge, MA, September 13, 2012.
N. C. Rowe, "Layered Deceptions for Defense of Computer Systems", invited presentation at Dynamic Defense Workshop, Sandia National Laboratories, Albuquerque, NM, September 5, 2012.
N. C. Rowe, "Layered Deceptions for Defense of Computer Systems", AFRL Workshop on Biologically Inspired Cyber Defense, August 29, 2012.
N. C. Rowe, "Experimenting with Live Cyberattackers for Testing Deceptions," invited talk at Workshop on Experimental Security Panoramas for Critical System Protection, 5th International Symposium on Resilient Control Systems, Salt Lake City, UT, August 14, 2012.
N. C. Rowe, "New Directions: Sensor Networks for Detection of IED Emplacement," invited talk at 7th Annual Counter IED Summit: Logistics Tracking Solution for Mission Success and Efficiency, IDGA (Institute for Defense and Government Advancement), Tampa, FL, July 25, 2012.
N. C. Rowe, "Problems of Cyberwarfare", invited talk at STRATCOM Science Advisory Group, Science and Technology Panel Meeting, Livermore, CA, July 11, 2012.
N. C. Rowe, "Wireless Sensor Networks for Detecting IED Emplacement," invited talk at Marcus Evans 8th Annual Countering IEDs Conference, Arlington, VA, June 20, 2012.
N. C. Rowe, "Why Cyberattack Attribution Is Hard", Panelist at the McCain Conference 2012, Ethics of Military Cyber Operations, Annapolis, MD, April 25, 2012.
N. C. Rowe, "Comment for Technology Panel: Cyber Warfare", invited discussant at National Academy of Sciences for the Committee on Ethical and Societal Issues in National Security Applications of Emerging Technologies, Washington, DC, January 12, 2012.
N. C. Rowe, "Forensics of Directory and File Metadata", BIT's 2nd World Congress of Forensics 2011, Chongqing, China, October 17, 2011.
N. C. Rowe, panelist in session on "Cyber Intersection with Deception", InfowarCon Cyber: Maneuvering in Cyberspace and IO Conference, Linthicum Heights, Maryland, September 14, 2011.
N. C. Rowe and R. Schwamm, "Using Android Smartphones as Inexpensive Sensors", Workshop on Military Wireless Communications, Monterey CA, July 2011.
N. C. Rowe, "Using Smartphones as Inexpensive Sensors", Workshop on Military Wireless Communications, Monterey CA, January 2011.
N. C. Rowe, "Deception in Cyberspace", invited talk at the Workshop on "Formally Modeling the Human Element and Its Impact on Control Systems Resiliency" at the International Symposium on Resilient Control Systems, Idaho Falls, ID, August 2010.
N. C. Rowe, "Information about Cyber-Vulnerabilities and Cyberattacks", invited talk at the Symposium on Emergent Threats in the 21st Century: Searching for a Common Methodology, Rutgers University, Newark, NJ, March 2010.
N. C. Rowe, Cyberweapons, invited talk at the Workshop on Emerging Technologies, Military Operations, and National Security, sponsored by the Consortium on Emerging Technologies, Military Operations, and National Security, Carefree, AZ, February 2010.
N. C. Rowe, The ethics of cyberweapons, California Polytechnic University, Technology and Ethics invited lecture, April 10, 2009.
N. C. Rowe, Invited discussant on international policy for cybersecurity, Workshop on International Strategy and Policy for Cyber Security, Cambridge, MA, June 13, 2008.
N. C. Rowe, Invited participant in Cyber Fest 08 (Workshop on metaphors for cybersecurity), Sandia Laboratories, Albuquerque, NM, May 27-30, 2008.
N. C. Rowe, The ethics of cyberweapons. Technology in Warfare Conference, Computer Professionals for Social Responsibility, Stanford, CA, January 26, 2008.
N. C. Rowe, Deception in defense of computer systems. Wayne State University, Detroit, MI, November 2007.
N. C. Rowe, Deception in defense of computer systems. Battelle Pacific Northwest National Laboratory, Richland, WA, September 2007.
N. C. Rowe, Deception in defense of computer systems. Dartmouth College, Hanover, NH, May 2007.
N. C. Rowe, Detecting suspicious behavior in public spaces and classifying it. Tutorial on Security Informatics, Hawaii International Conference on System Sciences, Waikoloa, HI, January 2007.
N. C. Rowe, E. J. Custy, D. S. Barnes, M. Egan, M. McVicker, R. Betacourt, B. M. Hyla, R. Toledo, D. P. Horner, J. Wintrode, D. T. Davis, J. S. Correia, L. Guiterrez, and C. Martell, Detecting deceptive text in cyberspace. Symposium on Deception Detection, Hawaii International Conference on System Sciences, Waikoloa, HI, January 2007.
N.C. Rowe, Software decoys: Automated deception strategies for information operations, Active Network Defense Workshop, Linthicum Heights, MD, August 2002 (invited).
N. C. Rowe, Distributed intrusion detection in software decoys, ARL/AHPCRC Workshop on Network Intrusion Detection, Aberdeen, MD, March 2002 (invited).
N. C. Rowe, The MARIE project: A testbed for military AI natural-language and vision techniques. Presentation at Army Artificial Intelligence Center PROPCON96 Conference, Washington DC, June 1996.
N. C. Rowe, Progress on the MARIE project. Presentation at DARPA I3 (Intelligent Integration of Information) Project workshop, Atlanta, GA, June 1994.
N. C. Rowe, Tutoring of intrusion detection. Presentation at 13th Intrusion Detection Workshop, Menlo Park, CA, May 1994.
N. C. Rowe, The MARIE project. Presentation at DARPA I3 (Intelligent Integration of Information) Project workshop, Marina del Rey, CA, September 1993.
N. C. Rowe, Accessing multimedia via captions. Presentation at Fourth Navy R&D Information Exchange Conference, San Diego CA, April 1993.
N. C. Rowe, Reasoning about statistical aggregates. Presentation at the Navy AI Technical Review, NPS, September 1985.
N. C. Rowe, Artificial intelligence at NPS. Presentation at ONR meeting to coordinate artificial intelligence research in the Navy, August 1984.
Non-refereed publications
N. C. Rowe, T. D. Nguyen, and J. T. Dougherty, Identifying anomalous network flow activity using cloud honeypots, NPS Technical Report NPS_CS-20-003, October 2020.
N. C. Rowe and A. Das, Machine learning for analysis of Naval aviator training, NPS Technical Report NPS-CS-20-002, October 2020.
N. C. Rowe, R. Schwamm, B. D. Allen, and P. Kalinowski, Analysis of AUV signals. Technical report NPS-CS-19-001, Naval Postgraduate School, Monterey, California, February 2019.
B. Michael, N. C. Rowe, M. Auguston, D. Drusinsky, H. S. Rothstein, & T. C. Wingfield, Phase II report on intelligent software decoys: intelligent software decoy tools for cyber counterintelligence and security countermeasures. Technical report NPS-CS-04-001, Naval Postgraduate School, Department of Computer Science, Monterey, California, April 28, 2004.
J. B. Michael, N. C. Rowe, H. S. Rothstein, M. Auguston, D. Drusinsky, and R. D. Riehle, Phase I report on intelligent software decoys: Technical feasibility and institutional issues in the context of homeland security. Technical report NPS-CS-03-001, U.S. Naval Postgraduate School, December 10, 2002.
N. C. Rowe and R. S. Alexander, Path planning across weighted regions using optimal-path maps. Technical report, U. S. Naval Postgraduate School, January 1997. (More detailed version of [97].)
E. J. Guglielmo and N. C. Rowe, Natural language lexicon design in support of multimedia content search. Naval Air Warfare Center Weapons Division, China Lake, CA, NAWCWPNS TM 7207.
N. C. Rowe and S. H. Yee, Compression of terrain elevation and vegetation data by polyhedral modeling. Technical report NPS52-90-027, Computer Science Department, Naval Postgraduate School, May 1990.
R. S. Alexander and N. C. Rowe, Finding optimal paths in homogeneous-cost polygonal terrain by construction of optimal path maps, Technical Report NPS52-90-002, Computer Science Department, U. S. Naval Postgraduate School, February 1990.
N. C. Rowe, Means-ends tutoring, multi-tutoring, and meta-tutoring, Technical Rep NPS52-90-003, Computer Science Department, U. S. Naval Postgraduate School, February 1990.
N. C. Rowe, Multimedia systems. Invited chapter for the Encyclopedia of Distributed Computing, eds. J. Urban and P. Dasgupta, submitted 1/98, but Encyclopedia was never published.
N. C. Rowe, Digital libraries. Invited chapter for the Encyclopedia of Distributed Computing, eds. J. Urban and P. Dasgupta, submitted 4/00, but Encyclopedia was never published.
N. C. Rowe, Image processing. Invited chapter for the Encyclopedia of Distributed Computing, eds. J. Urban and P. Dasgupta, submitted 4/00, but Encyclopedia was never published.
N. C. Rowe and R. F. Richbourg, An efficient Snell's-law method for optimal-path planning across homogeneous-cost regions. Technical Report NPS52-87-003, Department of Computer Science, Naval Postgraduate School, Monterey CA, February 1987.
N. C. Rowe, Rule-based statistical calculations on a database abstract. Report STAN-CS-83-975, Stanford University Computer Science Department, June 1983 (168 pages) (Ph.D. thesis).
N. C. Rowe, Sprite Logo Manual. Logo Computer Systems Inc., Pointe Claire, Quebec, 9/82 (about 100 pages). (A draft for a manual; was later reworked by other authors into published material.)
Published computer programs
N. C. Rowe, Software to accompany Rowe, Artificial Intelligence through Prolog. Prentice-Hall, 1988. (A diskette containing 34 programs.)
Patent
M. Ross, M. McCauley, M. Kolsch, A. Das, T. Norbraten, and N. Rowe, "Landing Signal Officer (LSO) Information Management and Trend Analysis (IMTA) System", U.S. patent number 9,489,851, granted 11/8/16. This patent and the associated software were used by InnovaSystems in their SHARP project for management of pilot data on carriers.
Book drafts
N. C. Rowe, Information Security. About 70,000 words in eight chapters, including about 100 exercises. An introduction to information security.
N. C. Rowe, An Empirical Introduction to Digital Forensics. About 80,000 words in thirteen chapters, including about 120 exercises. An introduction to digital forensics that focuses on analysis of data.
Papers being reviewed
N. C. Rowe, Designing deceptions for industrial-control systems. Draft book chapter, submitted March 1, 2024.
IV. Teaching and thesis advising
IV.2. Thesis supervision
Degrees are in Computer Science unless noted. Since graduate students at the Naval Postgraduate School are not generally supported by grants, thesis supervision has covered a wide range of subjects.
IV.3.a Advising
Ph.D. dissertations and Ph.D. committees
J. Landsborough, "Multilayered Deception in Depth", Ph.D. in Computer Science, expected 9/26.
J. S. Dean, "Systematic Assessment of the Impact of User Roles on Network Flow Patterns", Ph.D. in Computer Science, 9/17. Dissertation supervisor and doctoral committee chairman.
B. Harder, "Automated Multi-Echelon Battle Planning for Combat Simulations" (Ph.D. in Modeling, Simulation, and Virtual Environments, 12/16). Member of the doctoral committee.
D. Chang, "A Systematic Software, Firmware, and Hardware Codesign Methodology for Digital Signal Processing" (Ph.D. in Software Engineering, 3/14). Dissertation supervisor and doctoral committee chairman.
T. Tan, "Learning and Predicting of Relational Time Series" (Ph.D. in Modeling, Simulation, and Virtual Environments, 3/13). Member of the doctoral committee.
D. Davis, "Design, Implementation, and Testing of a Common Data Model Supporting Autonomous Vehicle Compatibility and Interoperability," 9/06, Ph.D. in Computer Science. Member of the doctoral committee.
M. Van Putte, "Modeling of Information Security Threats", 6/02, Ph.D. in Computer Science. Member of the doctoral committee.
T.-C. Yeh, "Effects of Taiwan Orography on the Motion and Structure of Typhoons", Ph.D. in Meteorology, 12/92. Member of the doctoral committee.
E. J. Guglielmo, "Intelligent Information Retrieval for a Multimedia Database Using Captions" (Ph.D., 9/92). Dissertation supervisor and doctoral committee chairman.
M. Kindl, "A Stochastic Approach to Path Planning in the Weighted Region Problem", Ph.D., 3/91. Member of the doctoral committee.
R. S. Alexander, "Construction of Optimal-Path Maps for Homogeneous-Cost-Region Path-Planning Problems" (Ph.D. 9/89). Dissertation supervisor and doctoral committee chairman.
R. S. Ross, "Planning Minimum-Energy Paths in an Off-Road Environment with Anisotropic Traversal Costs and Motion Constraints", Ph.D., 6/89, published as technical report NPS52-89-040. Member of the doctoral committee.
R. F. Richbourg, "Solving a Class of Spatial Reasoning Problems: Minimal-Cost Path Planning in the Cartesian Plane" (Ph.D. 6/87), also published as technical reports NPS52-87-021 and NPS52-87-022. Dissertation supervisor. This was the first Ph.D. completed in the Computer Science department.
M.S. theses as sole advisor
M. Williams, "Russian Disinformation Campaigns in the United States and Possible Countermeasures" (M.S. in Cyber Systems and Operations, 6/23)
Z. Swiatlowski, "Potential Employment of Offesnive Reversible Cyberattacks for Strategic and Ethical Purposes" (M.S. in Cyber Systems and Operations, 6/23)
M. Bridgeman, A Survey of Methods for Detecting Intentional Insider Threats against Digital Systems (M.S. in Cyber Systems and Operations, 6/21)
J. Green, "The Fifth Masquerade: An Integration Experiment of Military Deception Theory and the Emergent Cyber Domain" (M.S. in Cyber Operations, 9/20)
B. James and J. Rincon, "Threat Detection and Correlations with Distributed Deception Platforms" (M.S. in Information Sciences, 6/20)
G. Harter, "Metamorphic and Polymorphic Techniques for Obfuscation of K-Ary Malicious Codes" (M.S. in Computer Science, 6/20)
T. S. Wierzbicki, "Forensic Examination of Potential Data Exfiltration in Commercial Off the Shelf Unmanned Aircraft Systems" (M.S. in Computer Science, 6/20)
J. P. Erwert, "Frequency-Based Feature Extraction for Malware Classification" (M.S. in Computer Science, 12/18)
B. T. Henderson, "A Honeypot for Spies: Understanding Internet-Based Data Theft" (M.S. in Cyber Systems and Operations, 12/18)
E. C. Hosgor, "Detection and Mitigation of Anti-Forensics Using Forensic Tools" (M.S. in Computer Science, 12/18)
W. Chong and C. Koh, "Learning Cyberattack Patterns with Active Honeypots" (M.S. in Computer Science, 9/18)
E. Wanic, "Cyber Weapons and Deterrence" (M.S. in Computer Science, 9/18, Hopper Award winner)
J. Zhou, "Using Apache Spark to Speed Analysis of ADS-B Aircraft Data" (M.S. in Computer Science, 6/18)
C. G. Hall, "Impact of Perishability on the Effectiveness of Cyberweapons (M.S. in Cyber Systems and Operations, 12/17)
J. Johnson, "Database Creation and Statistical Analysis: Finding Connections between Two or More Secondary Storage Devices", (M.S. in Computer Science, 9/17)
R. McCaughey, "Deception Using an SSH Honeypot" (M.S. in Cyber Systems and Operations, 9/17)
R. Goldberg, "Testing the Forensic Interestingness of Image Files Based on Size and Type" (M.S. in Cyber Systems and Operations, 9/17)
B. Chainourov, "Log Analysis Using Splunk Hadoop Connect" (M.S. in Computer Science, 6/17)
A. Ambriz, "Database Management System Design and Implementation for Marine Air Traffic Controller Training" (M.S. in Computer Science, 3/17)
J. S. O'Rourke, "Navigating the Shared Software-Hardware Design Space Using Software Connectors," (M.S. in Software Engineering, 3/17)
C. Martin, "Comparing the Analysis of Two Mobile Device Forensics Tools" (M.S. in Computer Science, 12/16)
S. McKenna, "The Detection and Classification of Covert Web Crawlers for Military Websites (M.S. in Computer Science 3/16)
J. Park, "Finding Effective Responses against Cyber Attacks for Divided Nations" (M.S. in Computer Science 12/15)
J. Macy, "Patterns and Geolocation of Secure Shell Activity" (M.S. in Cyber Systems and Operations, 9/15)
C. Woods, "Implementing Cyber Coercion" (M.S. in Computer Science 3/15)
M. Cisneros, "Cyber Warfare: Jus Post Bellum" (M.S. in Cyber Systems and Operations, 3/15)
A. Adams, "Navy Data Deception Using Apache Storm Real-Time Computations" (M.S. in Cyber Systems and Operations, 3/15)
A. Yahyaoui, "Testing Deceptive Honeypots" (M.S. in Computer Science 9/14)
N. Carr, "Development of a Tailored Methodology and Forensic Toolkit for Industrial Control Systems Incident Response" (M.S. in Cyber Systems and Operations, 6/14)
D. Smith, "Preventing Point-of-Sale System Intrusions" (M.S. in Cyber Systems and Operations, 6/14)
D. Flemming, "Offense-in-Depth: An Analysis of Cyber Coercion" (M.S. in Cyber Systems and Operations, 3/14)
R. Schwamm, "Effectiveness of the Factory Reset on a Mobile Device" (M.S. in Computer Science 3/14)
F. Krenson, "Open-Source Data Collection Techniques for Weapons Transfer Information" (M.S. in Computer Science 3/12)
E. Frederick, "Testing a Low-Interaction Honeypot against Live Cyberattackers" (M.S. in Computer Science 9/11)
E. Albin, "A Comparative Study of the Snort and Suricata Intrusion-Detection Systems" (M.S. in Information Technology Management, 9/11)
T. Le, "Efficiency and Effectiveness Analysis of Spectrum XXI Frequency Management Software in the U.S. Air Force," (M.S. in Computer Science 9/10)
M. Rost, "The Value of Numerical Forecast Products in Improving Tactical Air Delivery Methods" (M.S. in Computer Science, 6/07)
H. C. Goh, "Intrusion Deception in Defense of Computer Systems" (M.S. in Computer Science, 3/07)
S. H. Lim, "Assessing the Effects of Honeypots on Cyber-Attackers" (M.S. in Computer Science, 12/06)
B. Duong, "Comparisons of Attacks on Honeypots with Those on Real Networks" (M.S. in Computer Science, 3/06)
K. Macklin, "Suitability of the SRC-6E Reconfigurable Computing System for Generating False Radar Images" (M.S. in Computer Science 6/04)
K. L. G. Tan, "Confronting Cyberterrorism with Cyber Deception" (M.S. in Computer Science 12/03)
V. B. Ross, "Integration of the Navy Tactical Environment Database Services with the Joint Effects Model" (M.S. in Computer Science 12/03)
S. Hynes, "Multi-Agent Simulations (MAS) for Assessing Massive Sensor Coverage and Deployment" (M.S. in Computer Science, 9/03, Hopper Award winner)
S. Siripala, "An Open-Source and Java-Technologies Approach to Web Applications" (M.S. in Computer Science 9/03)
V. Monteiro, "How Intrusion Detection Can Improve Software Decoy Applications", (M.S. in Computer Science 3/03)
P. A. Wu, "A Methodology for the Development of Secure Vertical Web Portals" (M.S. in Computer Science, 12/02)
S. Hall, "Automatic Text Categorization Applied to E-Mail" (M.S. in Computer Science, 9/02)
Y. Degirmenci, "Reasoning by Analogy Using Holographic Conceptual Projection", (M.S. in Computer Science, 9/02)
A. Aragon, "Agent-Based Simulation of a Marine Infantry Squad in an Urban Environment", (M.S. in Computer Science, 9/01)
J. Alves, "Recognition of Ship Types from an Infrared Image Using Moment Invariants and Neural Networks" (M.S. in Computer Science, 3/01)
M. Niedert, "Static-Task Scheduling Incorporating Precedence Constraints and Deadlines in a Heterogeneous-Computing Environment", (M.S. in Computer Science, 6/00)
J. Herman, "Target Identification Algorithm for the AN/AAS-44V Forward-Looking Infrared (FLIR)" (M.S. in Computer Science 6/00, Hopper Award winner for best Computer Technology student)
L. Cardoso, "Computer-Aided Identification of Man-Made Structures in Aerial Photographs" (M.S. in Computer Science 12/99)
D. Ingram, "Autonomous Agents for Distributed Intrusion Detection in a Multi-Host Environment" (M.S. in Computer Science 9/99)
S. Kremer, "Real-Time Intrusion Detection for Windows NT Based on Navy IT-21 Audit Policy" (M.S. in Software Engineering, 9/99)
J. Barrus, "Intrusion Detection in Real Time in a Multi-Node, Multi-Host Environment" (M.S. in Software Engineering, 9/97)
S. Schiavo, "An Intrusion-Detection Tutoring System Using Means-Ends Analysis" (M.S. in Computer Science, 3/95)
C. Roberts, "Plan-Based Simulation of Malicious Intruders on a Computer System" (M.S. in Computer Science, 3/95)
T. Galvin, "MEBUILDER: An Object-Oriented Lesson Authoring System for Procedural Skills (M.S. in Computer Science, 9/94, Hopper Award winner for best Computer Technology Student)
D. Seem, "The Application of Artificial-Intelligence Techniques to the Automatic Identification of Sounds Received at Hydrophones and to the Correlation of These Sounds Between Hydrophones" (M.S. in Computer Science, 12/93)
F. Suwono, "A Graphical User-Interface Development Tool for Intelligent Computer-Assisted Instruction Systems" (M.S. in Computer Science, 9/93)
M.-H. Kang, "Pilot Emergency Tutoring System for F-4 Aircraft Fuel System Malfunction Using Means-Ends Analysis" (M.S. in Computer Science, 6/90)
G. Teevan, "An Optimization Plan for Scheduling Flight Training" (M.S. in Computer Science, 6/90)
S. Johansson, "Interpretation of Enemy Ground Communications Using Constraint Propagation" (M.S. in Computer Science, 9/89)
D. Bernier, "An Intelligent Computer-Aided Instruction System for Naval Ship Recognition" (M.S. in Computer Science, 6/89)
M. Bizer, "A Picture-Descriptor Extraction Program Using Ship Silhouettes" (M.S. in Computer Science, 6/89)
R. Powell, "Code Optimization and Hierarchical Scheduling Techniques for Implementing the Commander Patrol Wing Ten, Moffett Field, California (M.S. in Computer Science, COMPATWING TEN) Training Schedule on Microcomputers" (M.S. in Computer Science, 6/89)
P. Salgado, "An Intelligent Computer-Assisted Instruction System for Underway Replenishment" (M.S. in Computer Science, 6/89)
R. Wade, "A Split-and-Merge Method for Creating Polygonal Homogeneous-Vegetation Regions from Digitized Terrain Data" (M.S. in Computer Science, 6/89)
L. Wrenn, "Three-Dimensional Route Planning for a Cruise Missile for Minimal Detection by Observers" (M.S. in Computer Science, 6/89) (M.S. in Computer Science, issued as Technical Report NPS52-090-002)
E. Velez, "Communications-Equipment Distribution Planning Using Search Techniques" (M.S. in Computer Science, 3/89)
D. H. Lewis, "Optimal Three-Dimensional Path Planning Using Visibility Constraints" (M.S. in Computer Science, 12/88) (M.S. in Computer Science, issued as Technical Report NPS52-090-001)
J. Wolfe, "Determining the Location of an Observer With Respect to Aerial Photographs" (M.S. in Computer Science, 12/88)
D. S. Campbell, "An Intelligent Computer-Assisted Instruction System for Cardiopulmonary Resuscitation" (M.S. in Computer Science, 6/88)
D. V. Hutson, "A Program for Scheduling a Patrol Air Wing Training Plan" (M.S. in Computer Science, 6/88)
T. W. Kim, "A Computer-Aided Instruction Program for Teaching the TOP20-MM Facility on the DDN" (M.S. in Computer Science, 6/88)
S. H. Yee, "Three Algorithms for Planar-Patch Terrain Modeling" (M.S. in Computer Science, 6/88) (M.S. in Computer Science, issued as Technical Report NPS52-089-018)
J. L. A. Cleveland, "A Methodology for Designing a Local Area Network for the Air Force" (M.S. in Computer Science, 3/88)
C. Selek, "An Expert System for the Diagnosis of Vehicle Malfunctions" (M.S. in Computer Science, 12/87)
S. Camacho, "An Expert System to Assist a Navy Damage Control Assistant with Chemical, Biological, and Radiological Defense" (M.S. in Computer Science, 6/87)
R. Chadwick, "An Expert System for Logistics Force Development" (M.S. in Computer Science, 6/87)
M. Davis, "Automated Logistics Planning Using Historical Analogies" (M.S. in Computer Science, 6/87)
Y. Rugsumruad, "A Prototype of Pilot Knowledge Evaluation by an Intelligent CAI System Using a Bayesian Diagnostic Model" (M.S. in Computer Science, 6/87)
T. Lewallen, "A Collision-Prevention Expert System for a Navy Officer of the Deck" (M.S. in Computer Science, 3/87)
F. Ulug, "EMYCIN-Prolog Expert System Shell" (M.S. in Computer Science, 12/86), also published as technical report NPS52-87-008
B. Gogel, "An Expert System to Provide Guidance on the Operation of Installed Damage Control Systems Aboard Naval Ships in Emergency Situations" (M.S. in Computer Science, 12/86)
O. Porter, "A Decision Support System for the Diagnosis of Aircraft Emergencies" (M.S. in Computer Science, 12/86), also published as technical report NPS52-86-027
S. Weingart, "Development of a Shipboard Damage Control Fire Team Leader Intelligent Computer Aided Instructional System" (M.S. in Computer Science, 6/86)
A. Saraydin, "An Implementation in Pascal: Translation of Prolog to Pascal" (M.S. in Computer Science, 6/85)
B. Tilden, "A Hierarchy of Knowledge Levels Implemented in a Rule-Based Production System to Calculate Bounds on the Size of Intersections and Unions of Simple Sets" (M.S. in Computer Science, 12/84)
K. S. Baek, "Database Design for Personnel Management in the Republic of Korea Army" (M.S. in Computer Science, 6/84)
IV.3.b. M.S. theses as co-advisor
E. Chamberlin, "Characterizing the Differences of Software Versions Released for Multiple Operating Systems" (M.S. in Computer Science, expected 6/24, co-advisor with B. Michael)
B. McGuire, "Improving Electrical Controls of a Power Microgrid Honeypot" (M.S. in Computer Science, expected 4/24, co-advisor with T. Nguyen)
S. Colvin, "Implementing a High-Interaction Hybrid Honeypot for Facility Automation Systems" (M.S. in Computer Science, 12/23, co-advisor with T. Nguyen)
A. Sill, "Developing a Dual-Purpose Web Honeypot for Characterizing Attacks on a Simulated Power Grid" (M.S. in Cyber Systems and Operations, 12/23, co-advisor with T. Nguyen)
J. Sciuto, "Implementation of Security Implementation and Event Management (SIEM) Software in a Honeypot" (M.S. in Cyber Systems and Operations, 12/23, co-advisor with T. Nguyen)
A. Benn and S. Benn, "Application of Game Theory for Adaptive Cyber Defense against Advanced Persistent Threats" (joint thesis, M.S. in Computer Science, 9/23, co-advisor with W. Huntley)
K. Abramson, "Enhancing Decoy Deception Functionality Using Virtual Network Computer Technology" (M.S. in Cyber Systems and Operations, 12/22, co-advisor with T. Nguyen)
C. Rance, "Defeating Cyber Deception Capability of a Hardened Network Environment" (M.S. in Cyber Systems and Operations, 12/22, co-advisor with T. Nguyen)
B. Foley, "Analysis of Client-Side Attacks by Drive-By Honeypots" (M.S. in Cyber Systems and Operations, 12/22, co-advisor with T. Nguyen)
R. Ramirez, "Behavioral Characterization of Attacks on the Remote Desktop Protocol" (M.S. in Computer Science, 9/22, co-advisor with T. Nguyen)
W. Frazier, "Predictive Maintenance Using Machine Learning and Existing Data Sources" (M.S. in Computer Science, 9/22, co-advisor with Y. Zhao)
N. Haynes, "Creating Synthetic Attacks with Evolutionary Algorithms for Industrial-Control-System Security Testing" (M.S. in Computer Science 9/22, co-advisor with T. Nguyen)
M. Lidestri, "Incorporating Perishability and Obsolescence into Cyberweapon Scheduling" (M.S. in Cyber Systems and Operations, 6/22, co-advisor with W. Huntley)
J. Meier, "Hardening Windows-Based Honeypots to Protect Collected Data", (M.S. in Computer Science, 6/22, co-advisor with T. Nguyen)
S. Drew and C. Heinen, "Testing Deception with a Commercial Tool Simulating Cyberspace" (M.S. in Cyber Systems and Operations, 3/22, co-advisor with A. Barton)
B. Smith, "A DevSecOps Approach for Developing and Deploying Containerized Cloud-Based Software on Submarines" (M.S. in Cyber Systems and Operations, 12/21)
A. Washofsky, "Deploying and Analyzing Containerized Honeypots in the Cloud with T-Pot" (M.S. in Computer Science, 9/21)
M. Bieker and D. Pilkington, "Deploying an ICS Honeypot in a Cloud Computing Environment and Comparatively Analyzing Results against Physical Network Deployment" (M.S. in Cyber Systems and Operations and M.S. in Computer Science, 12/20, co-advisor with T. Nguyen)
A. Bovino, "Special Operations Forces Unilateral Conduct of Cyberspace Operations" (M.S. in Cyber Systems and Operations, 12/20, co-advisor with R. Maness)
J. Purser, "Using Generative Adversarial Networks for Intrusion Detection in Industrial Control Systems" (M.S. in Computer Science, 9/20, co-advisor with T. Nguyen)
A. Nelson, "Comparison of AI Paradigms to Enhance an Automated Peer Evaluation Suite" (M.S. in Computer Science, 9/20, co-advisor with A. Das)
J. Dougherty, "Evasion of Honeypot Detection Mechanisms through Improved Interactivity of ICS-Based Systems" (M.S. in Computer Science, 9/20, co-advisor with T. Nguyen) (winner of the NPS Outstanding Academic Achievement Award for a DoD Student)
K. Krebs, "How Can the DoD Adopt Commercial-Style Artificial Intelligence for Procurement?" (MBA Final Project, 6/20, co-advisor with E. Yoder)
J. Smith and N. Hughes, "Honor Among Thieves: Analyzing Language Features of Dark Net Market Vendors" (M.S. in Computer Science, 6/20, co-advisor with V. Monaco)
T. Ayuob, "Change Detection of Marine Environments Using Machine Learning" (M.S. in Computer Science, 6/20, co-advisor with Mara Orescanin)
B. Allen, "Using Texture Vector Analysis to Measure Computer and Device File Similarity" (M.S. in Computer Science, 3/20, co-advisor with J. B. Michael)
C. Palmer, "Human-Machine Teaming Framework for Mitigation of False Data Injects in Networked Ship Defense Systems" (M.S. in Information Sciences, 12/19, co-advisor with G. Dinolt)
J. Brown, "Improving Remote Fingerprinting for Real-Time and Embedded Systems" (M.S. in Computer Science, 9/19, co-advisor with R. Beverly)
M. Kendrick and Z. Rucker, "Energy-Grid Threat Analysis Using Honeypots" (M.S. in Computer Science, 6/19, co-advisor with T. Nguyen)
D. Blauwkamp, "Network-Traffic Analysis in Maritime Cyber-Physical Systems" (M.S. in Computer Science, 12/18, co-advisor with G. Dinolt)
P. Kalinowski, "Neural Networks for Malware Detection Using Static Analysis" (M.S. in Computer Science, 12/18, co-advisor with C. Eagle)
J. Mooring, "Navy Watchstander Training and Testing Tool" (M.S. in Computer Science, 6/18, co-advisor with L. Peitso)
D. Hyun, "Extraction and Analysis of IOCs Using Honeypots" (M.S. in Computer Science, 3/18, co-advisor with T. Nguyen)
A. Sollish, "Spatiotemporal Co-Occurrence in the Maritime Domain" (M.S. 12/15 in both Computer Science and Defense Analysis, co-advisor with W. Porter and S. Everton)
K. W. Nelson, "Artificial Intelligence for Tactical Cyber Systems Maintenance" (M.S., 12/17, co-advisor with R. Maule)
S.-C. Kang, "Development of a Machine Learning Model for Demand Forecasting" (M.S.in Computer Science, 9/15, co-advisor with C. T. Otani, Hopper Award winner)
J. Shaver, "Exposing Vital Forensic Artifacts of USB Devices in the Windows 10 Registry" (M.S. in Cyber Systems and Operations, 6/15, co-advisor with Michael McCarrin)
C. Leopard, "Memory Forensics and the Macintosh OS X Operating System" (M.S. in Cyber Systems and Operations, 6/15, co-advisor with Michael McCarrin)
J. Peacock, "Marine Corps IT Hardware: A Method for Categorizing and Determining Technology Refreshment Cycles" (M.S. in Systems Technology, 6/15, co-advisor with D. Nussbaum)
J. Khong, "Performance Assessment of Network Intrusion-Alert Prediction" (M.S. in Computer Science, 9/12, co-advisor with Christian Darken, M.S. in Modeling, Simulation, and Virtual Environments
J. Alston, " Protecting Mobile Cellular Networks from Adversary Influence," (M.S. in Computer Science, 3/11, co-advisor John Gibson)
J. Sundram and P. P. Sim, "Using Wireless Sensor Networks in Improvised Explosive Device Detection" (M.S. in Computer Science, 12/07, co-advisor with G. Singh)
D. Barnes, "A Defense-in-Depth Approach to Phishing", (M.S. in Computer Science, 9/06, co-advisor with Craig Martell)
L. Laribee, "Development of Methodical Social Engineering Project" (M.S. in Computer Science, 6/06, co-advisor with Craig Martell)
K. Labbe, "An Evaluation of Two Host Based Intrusion Prevention Systems," (M.S. in Computer Science, 6/05, co-advisor with J. D. Fulp)
V. Papaliakos, "Content Repurposing of Electrical Diagrams for Handheld Devices" (M.S. in Computer Science, 9/05, co-advisor with G. Singh)
B. Powers, "An Evaluation of Performance Characteristics of Collaborative Tools Used in Department of Defense Operations", (M.S. in Software Engineering, 9/04, co-advisor with M. Shing)
B. Ozkan, "Modeling of Naval Air Defense using Blending and Connectors" (M.S. in Computer Science, 3/04, co-advisor with J. Hiles)
J. Custy, "An Architecture for the Semantic Processing of Natural Language Input to a Policy Workbench" (M.S. in Software Engineering, 3/03, co-advisor with B. Michael)
S. Calfee, "Simulation of AEGIS Cruiser CIC Team Performing Battle Group Air Defense Commander Duties" (M.S. in Computer Science, 3/03, co-advisor with J. Hiles) (G. Phillips Award winner for MOVES Institute)
A. Guven, "Speeding Up A Path-Based Policy Language Compiler" (M.S. in Computer Science, 3/03, co-advisor with G. Xie)
D. Julian, "Delaying-Type Responses for Use by Software Decoys" (M.S. in Computer Science, 9/02, co-advisor with B. Michael)
C. Carroll, "Population and Maintenance of an Intelligence Database Utilizing Intelligent Agent Technologies" M.S. in Information Systems and Operations, 3/02, co-advisor with M. Nissen)
V. Ong, "An Architecture and Prototype System for Automatically Processing Natural-Language Statements of Policy" (M.S. in Computer Science, 3/01, co-advisor with B. Michael)
M. Lisowski, "Development of a Target Recognition System Using Formal and Semiformal Methods" (M.S. in Software Engineering, 12/00, co-advisor with M. Shing)
E. Stierna, "Requirements Reuse in Support of Aviation Mission Planning" (M.S. in Computer Science, 9/00, co-advisor with M. Shing)
S. Andrade, "An Intelligent Agent Simulation of Shipboard Damage Control" (M.S. in Operations Research, 6/00, co-advisor with D. Gaver)
J. Mades, "Quantum Computers and Their Impact on DoD in the 21st Century" (M.S. in Computer Science, 9/99, co-advisor with W. Baer)
M. Balci, "Design and Implementation of a Graphical User Interface for a Multimedia Database Management System" (joint thesis with E. Saridogan) (M.S. in Computer Science, 9/92).
E. Saridogan, "Design and Implementation of a Graphical User Interface for a Multimedia Database Management System" (joint thesis with M. Balci), (M.S. in Computer Science, 9/92, co-advisor with C. T. Wu
A. Steed, "A Heuristic Search Method of Selecting Range-Range Sites for Hydrographic Surveys" (M.S. in Computer Science, 9/91, co-advisor with E. Carter)
J. Dulle, "A Caption-Based Natural Language Interface Handling Descriptive Captions for a Multimedia Database System" (M.S. in Computer Science, 6/90, co-advisor with V. Lum, 6/90)
K. Jennings, "Design Guidelines for a Rule-Based Passive Surveillance System" (M.S. in Computer Science, 9/86, co-advisor with T. Otani [Wu])
IV.3.c. Second Reader and similar roles
S. Kallis, "Combatting Adversarial Attacks on Machine Learning with Additional Classes" (M.S. in Computer Science, 6/23)
L.-M. Neagu, "Intelligent Tutoring Systems for Psychomotor Development in Open Environments", University Polytehnica of Bucharest, RO, and MINES Paris – PSL University, FR, Ph.D. in Automatic Control and Computers, external reviewer of dissertation (9/22)
R. Hranicky, "Digital Forensics: The Acceleration of Password Cracking", Ph.D. in Information Sciences, Brno University of Technology, Brno, Czech Republic, Ph.D. in Information Systems, external examiner (4/22)
C. de Faveri, "Modeling Deception for Cyber Security", NOVA University of Lisbon, Portugal, Ph.D. in Computer Science and Informatics, voting member of the evaluation panel (3/22)
B. Whitham, "Automating the Generation of Honeyfile Text Content Using Natural Language Processing", PhD. in Information Technology, University of New South Wales Australian Defence Force Academy, external examiner (12/18).
M. Atadika, "Applying U.S. Military Cybersecurity Architectures to Cloud Computing", second reader (M.S. in Computer Science, 9/18)
E. S. Anderson, "Evaluation of Marine Corps' Manpower Computer Simulation Model", second reader (M.S. in Computer Science, 12/16)
B. J. Williford, "Mobile Phones Coupled with Remote Sensors for Surveillance" (M.S. in Computer Science, 3/12)
A. A Reed, "Detecting Suspicious Behavior with Low-Cost Sensors," Outside Reader (M.S. in Computer Science, California Polytechnic University / San Luis Obispo, CA, 6/11)
P. J. Young, "A Mobile Phone-Based Sensor Grid for Distributed Team Operations" (M.S. in Computer Science, 9/10).
K. N. Phillips, "Correlating Personal Information between DOD411, LinkedIn, Facebook, and Myspace with Uncommon Names" (M.S. in Computer Science, 9/10).
B. Lee and E. Powers, "Implementation and Testing of a Semantic Web Browser", second reader, 12/06
J. Vorrath, "Implementing METOC Transformation: Applying Autonomous Agents" (M.S. in Meteorology, 9/04).
V. B. Ross, "Using Rapid Environmental Assessment to Improve the Hazard Prediction and Assessment Capability for Weapons of Mass Destruction", (M.S. in Meteorology, 12/03).
N. West, Ph.D. in Engineering, 9/96, University of Witwatersrand, Johannesburg, South Africa, external examiner (who reviewed the thesis and wrote a detailed report).
K. P. Scheffel, "Improving Two Dimensional Manipulator Path Planning Speed by Optimising Computational Geometry and Traditional Search Strategies", M.S. in Computer Science external examiner (writing detailed report), 3/96, University of the Witwatersrand, Johannesburg, South Africa
G. Lawrence, "Preliminary PANSAT ground station software design and use of an expert system to analyze telemetry", M.S. in Computer Science 3/94
K. Petersen, "Visual Navigation for an Autonomous Mobile Vehicle", 3/92
C. Hilton, "A Stochastic Approach to Solving the 2 1/2 Dimensional Weighted Region Problem", M.S. in Computer Science 6/91
W. Decker, "Application of Artificial Intelligence to Improve Aircraft Survivability", 12/85
J. Pasion, "Utilizing Splunk and Hadoop for Log Analysis" (M.S. in Computer Science, expected 12/20, co-advisor with A. Das)
D. Dulo, "A Knowledge-Based Ontological Framework for the Development of Safe and Resilient Aircraft Avionics" (Ph.D. in Software Engineering, expected 12/19). Dissertation supervisor and doctoral committee chairman.
B. Mall, "A Framework for Detecting Russian Disinformation Campaigns: From Cold War to 2016 US Presidential Election" (M.S. in Computer Science, expected 12/22)
Interns
Prof. Rowe has sponsored summer interns from the Hartnell College program (9 total from 2010 through 2017) and from the ONR NREIP program (19 total from 2013 through 2024), plus students from California Polytechnic University and California State University Monterey Bay.