NPS - Faculty Profiles - Heading

Academic Directory


FacultyCV
Back

Neil C Rowe

Professor
Computer Science

Phone: (831) 656-2462
Website:

Overview

Neil C. Rowe is Professor of Computer Science at the U.S. ºÚÁϳԹÏÍø where he has been since 1983. He has a Ph.D. in Computer Science from Stanford University (1983) and three degrees from the Massachusetts Institute of Technology. His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare. He has also worked on text processing, computational geometry, and intelligent tutoring systems.
NPS Experience
  • 1983 - current: Professor
Research Interests
applied artificial intelligence
Teaching Interests
artificial intelligence, information security, data mining, digital forensics

Scholarly Work

Publications
  • (2012).
  • (2012).
  • (2012).
  • (2012).
  • (2011).
  • Rowe, N. C, (2011).
  • Book Chapters
  • Rowe, N. C, (2022). Heidelberg Germany: Springer Berlin.
  • Rowe, N. C, (2020). Current Privacy Concerns with Digital Forensics. Hershey, Pennsylvania United States: IGI Global.
  • Rowe, N. C, (2019). Chaum Switzerland: Springer.
  • Rowe, N. C, (2017). New York, NY US: Springer.
  • Rowe, N. C, (2016). Privacy concerns with digital forensics. Hershey, PA US: Information Science Reference.
  • Rowe, N. C, (2015). Attribution of cyberwarfare. Oxon UK: Routledge.
  • Rowe, N. C, (2015). Distinct ethical challenges of cyberweapons. Cheltenham UK: Edward Elgar.
  • Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P, (2010). Taylor & Francis Group.
  • Books
  • Rowe, N. C., & Rrushi, J, (2016). Introduction to Cyberdeception. Switzerland: Springer.
  • Conference Proceedings
  • Meier, J., Nguyen, T. D., & Rowe, N. C, (2023).
  • Haynes, N. J., Nguyen, T. D., & Rowe, N. C, (2023).
  • Ramirez, R., Nguyen, T. D., Rowe, N. C., & Meier, J, (2022).
  • Foley, B., Rowe, N. C., & Nguyen, T. D, (2022).
  • Lidestri, M., & Rowe, N. C, (2022).
  • Washofsky, A., Rowe, N. C., & Nguyen, T. D, (2021).
  • Rowe, N. C., & Das, A, (2021).
  • Harter, G. T., & Rowe, N. C, (2021).
  • Rowe, N. C., Nguyen, T. D., Dougherty, J. T., Bieker, M. C., & Pilkington, D, (2021).
  • Rowe, N. C., Nguyen, T. D., Kendrick, M., Rucker, Z., Hyun, D., & Brown, J. C, (2020).
  • Rowe, N. C., & Knight, C. E, (2019). Case-Based Reasoning for Summarizing Simulation Results.
  • Atadika, M., Rowe, N. C., & Burke, K. L, (2019). Critical risk management practices to mitigate cloud migration misconfigurations.
  • Rowe, N. C., Allen, B. D., Zhou, J., Flores, A., & Das, A, (2019). Distributed combat identification of interesting aircraft.
  • Wanic, E. E., & Rowe, N. C, (2018).
  • Dean, J. S., & Rowe, N. C, (2018).
  • Rowe, N. C, (2018).
  • Hall, C. G., & Rowe, N. C, (2018).
  • Rowe, N. C, (2018).
  • Rowe, N. C, (2018). Dynamic attacker reasoning about deception taxonomies.
  • Rowe, N. C, (2017).
  • Rowe, N. C., Rowe, N. C., & McCarrin, M. R, (2017).
  • Rowe, N. C., Rowe, N. C., & McCarrin, M. R, (2017).
  • Adams, A., Rowe, N. C., & Das, A, (2016).
  • Park, J. M., Rowe, N. C., & Cisneros, M, (2016).
  • Rowe, N. C, (2015). Finding contextual clues to malware using a large corpus.
  • Yahyaoui, A., & Rowe, N. C, (2015). Testing simple deceptive honeypot tools.
  • Carr, N. B., & Rowe, N. C, (2015). A prototype forensic toolkit for industrial-control-systems incident response.
  • Flemming, D., & Rowe, N. C, (2015). Cyber coercion: Cyber operations short of cyberwar.
  • Rowe, N. C, (2011).
  • Sadagic, A., Welch, G., Basu, C., Darken, C. J., Kumar, R., Fuchs, H., Cheng, H., Frahm, J., Kolsch, M. N., Rowe, N. C., Towles, H., Wachs, J., & Lastra, A, (2009). New Generation of Instrumented Ranges: Enabling Automated Performance Analysis.
  • Journal Articles
  • Rowe, N. C, (2022). Frontiers in Big Data: Cyber Security and Privacy.
  • Rowe, N. C, (2022). IEEE Computer, 7(55), 87-102.
  • Dijkstra, J., Rowe, N. C., Shimeall, T., Horneman, A., & Midler, M, (2021). Digital Treats: Research and Practice, 4(2), 1-3.
  • Leopard, C. B., Rowe, N. C., & McCarrin, M. R, (2018). Journal of Digital Forensics, Security, and Law, 1(13), 31-42.
  • Rowe, N. C, (2018). Journal of Information Warfare, 1(17), 31-48.
  • Park, J. M., Rowe, N. C., & Cisneros, M, (2016). South Korea's options in responding to North Korean cyberattacks. Journal of Information Warfare, 4(15), 86-99.
  • Rowe, N. C, (2016). Identifying forensically uninteresting files in a large corpus. EAI Endorsed Transactions on Security and Safety, 7(16), e2.
  • Rowe, N. C, (2016). South Korea’s options in responding to North Korean cyberattacks. Journal of Information Warfare, 4(15).
  • Rowe, N. C., SChwamm, R., McCarrin, M., & Gera, R, (2016). Making sense of email addresses on drives. Journal of Digital Forensics, Security, and Law, 2(11).
  • Rowe, N. C., Schwamm, R., McCarrin, M. R., & Gera, R, (2016). Journal of Digital Forensics, Security and Law, 2(11), 153-174.
  • Sadagic, A., Kolsch, M. N., Welch, G., Basu, C., Darken, C. J., Wachs, J. P., Fuchs, H., Towles, H., Rowe, N. C., Frahm, J., Li Guan, Kumar, R., & Cheng, H, (2013). Smart Instrumented Training Ranges: Bringing Automated System Solutions to Support Critical Domain Needs. Journal of Defense Modeling and Simulation, 3(10), 327-342.
  • Sadagic, A., Kolsch, M. N., Welch, G., Basu, C., Darken, C. J., Wachs, J. P., Fuchs, H., Towles, H., Rowe, N. C., Frahm, J. M., Guan, L., Kumar, R., & Cheng, H, (2012). Smart Instrumented Training Ranges: Bringing Automated System Solutions to Support Critical Domain Needs. Journal of Defense Modeling and Simulation.
  • Rowe, N. C, (2012).131-138.
  • Rowe, N. C, (2011).
  • Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P, (2011). Challenges in Monitoring Cyberarms Compliance. International Journal of Cyber Warfare and Terrorism (IJCWT), 2(1), 35–48.
  • Reprints
  • Lin, P. A., Allhoff, F., & Rowe, N. C, (2016). Ethical questions need to be answered about cyberweapons.
  • Technical Reports
  • Dean, J., Xie, G. G., Rowe, N. C., & Beverly, R, (2013).