Faculty
NPS - Faculty Profiles - Heading
Faculty Profile Directory
FacultyCV
Back
Neil C Rowe
Professor
Computer Science
Phone: (831) 656-2462
Email: ncrowe@nps.edu
Website: faculty.nps.edu/ncrowe
Overview
Neil C. Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since 1983. He has a Ph.D. in Computer Science from Stanford University (1983) and three degrees from the Massachusetts Institute of Technology. His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare. He has also worked on text processing, computational geometry, and intelligent tutoring systems.
NPS Experience
- 1983 - current: Professor
Research Interests
applied artificial intelligence
Teaching Interests
artificial intelligence, information security, data mining, digital forensics
Scholarly Work
Publications
- (2012). Finding suspicious activity on computer systems.
- (2012). The Android Smartphone as an Inexpensive Sentry Ground Sensor.
- (2012). A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems.
- (2012). Evaluating Simulated Annealing for the Weighted-Region Path-Planning Problem.
- (2011). Finding anomalous and suspicious files from directory metadata on a large corpus.
- Rowe, N. C, (2011). Using Android Smartphones as Inexpensive Sensors.
- Book Chapters
- Rowe, N. C, (2022). Cyber deception. Heidelberg Germany: Springer Berlin.
- Rowe, N. C, (2020). Current Privacy Concerns with Digital Forensics. Hershey, Pennsylvania United States: IGI Global.
- Rowe, N. C, (2019). Honeypot deception tactics. Chaum Switzerland: Springer.
- Rowe, N. C, (2017). Challenges of civilian distinction in cyberwarfare. New York, NY US: Springer.
- Rowe, N. C, (2016). Privacy concerns with digital forensics. Hershey, PA US: Information Science Reference.
- Rowe, N. C, (2015). Attribution of cyberwarfare. Oxon UK: Routledge.
- Rowe, N. C, (2015). Distinct ethical challenges of cyberweapons. Cheltenham UK: Edward Elgar.
- Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P, (2010). Taylor & Francis Group.
- Books
- Rowe, N. C., & Rrushi, J, (2016). Introduction to Cyberdeception. Switzerland: Springer.
- Conference Proceedings
- Meier, J., Nguyen, T. D., & Rowe, N. C, (2023). Hardening honeypots for industrial control systems.
- Haynes, N. J., Nguyen, T. D., & Rowe, N. C, (2023). Creating Synthetic Attacks with Evolutionary Algorithms for Proactive Defense of Industrial Control Systems.
- Ramirez, R., Nguyen, T. D., Rowe, N. C., & Meier, J, (2022). Classifying RDP remote attacks on user interfaces to industrial control systems.
- Foley, B., Rowe, N. C., & Nguyen, T. D, (2022). Analyzing attacks on client-side honeypots from representative malicious Web sites.
- Lidestri, M., & Rowe, N. C, (2022). Quantifying the milestones of cyber vulnerabilities.
- Washofsky, A., Rowe, N. C., & Nguyen, T. D, (2021). Using Cloud Honeypot Platforms for Gathering Industrial-Control-System Attack Intelligence.
- Rowe, N. C., & Das, A, (2021). Predicting Success in Training of Navy Aviators.
- Harter, G. T., & Rowe, N. C, (2021). Testing detection of K-ary code obfuscated by metamorphic and polymorphic techniques.
- Rowe, N. C., Nguyen, T. D., Dougherty, J. T., Bieker, M. C., & Pilkington, D, (2021). Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypot.
- Rowe, N. C., Nguyen, T. D., Kendrick, M., Rucker, Z., Hyun, D., & Brown, J. C, (2020). Creating Effective Industrial-Control-System Honeypots.
- Rowe, N. C., & Knight, C. E, (2019). Case-Based Reasoning for Summarizing Simulation Results.
- Atadika, M., Rowe, N. C., & Burke, K. L, (2019). Critical risk management practices to mitigate cloud migration misconfigurations.
- Rowe, N. C., Allen, B. D., Zhou, J., Flores, A., & Das, A, (2019). Distributed combat identification of interesting aircraft.
- Wanic, E. E., & Rowe, N. C, (2018). Assessing deterrence options for cyber weapons.
- Dean, J. S., & Rowe, N. C, (2018). Utility of user roles in comparing network flow behaviors.
- Rowe, N. C, (2018). Finding correlations between ship positions.
- Hall, C. G., & Rowe, N. C, (2018). Options for persistence of cyberweapons.
- Rowe, N. C, (2018). Associating drives based on their artifact and metadata distributions.
- Rowe, N. C, (2018). Dynamic attacker reasoning about deception taxonomies.
- Rowe, N. C, (2017). Finding and rating personal names on drives for forensic needs.
- Rowe, N. C., Rowe, N. C., & McCarrin, M. R, (2017). Memory forensics and the Macintosh OS X operating system.
- Rowe, N. C., Rowe, N. C., & McCarrin, M. R, (2017). Memory forensics and the Macintosh OS X operating system.
- Adams, A., Rowe, N. C., & Das, A, (2016). Data deception in stream processing.
- Park, J. M., Rowe, N. C., & Cisneros, M, (2016). Responding to North Korean Cyberattacks.
- Rowe, N. C, (2015). Finding contextual clues to malware using a large corpus.
- Yahyaoui, A., & Rowe, N. C, (2015). Testing simple deceptive honeypot tools.
- Carr, N. B., & Rowe, N. C, (2015). A prototype forensic toolkit for industrial-control-systems incident response.
- Flemming, D., & Rowe, N. C, (2015). Cyber coercion: Cyber operations short of cyberwar.
- Rowe, N. C, (2011). Rating Whole-Body Suspiciousness Factors in Automated Surveillance of a Public Area.
- Sadagic, A., Welch, G., Basu, C., Darken, C. J., Kumar, R., Fuchs, H., Cheng, H., Frahm, J., Kolsch, M. N., Rowe, N. C., Towles, H., Wachs, J., & Lastra, A, (2009). New Generation of Instrumented Ranges: Enabling Automated Performance Analysis.
- Journal Articles
- Rowe, N. C, (2022). The comparative ethics of artificial-intelligence methods for military applications. Frontiers in Big Data: Cyber Security and Privacy.
- Rowe, N. C, (2022). Algorithms for artificial intelligence. IEEE Computer, 7(55), 87-102.
- Dijkstra, J., Rowe, N. C., Shimeall, T., Horneman, A., & Midler, M, (2021). Introduction to special issue on the nature of situational awareness in cybersecurity. Digital Treats: Research and Practice, 4(2), 1-3.
- Leopard, C. B., Rowe, N. C., & McCarrin, M. R, (2018). Testing memory forensics tools for the Macintosh OS X operating system. Journal of Digital Forensics, Security, and Law, 1(13), 31-42.
- Rowe, N. C, (2018). A taxonomy of norms in cyberconflict for government policymakers. Journal of Information Warfare, 1(17), 31-48.
- Park, J. M., Rowe, N. C., & Cisneros, M, (2016). South Korea's options in responding to North Korean cyberattacks. Journal of Information Warfare, 4(15), 86-99.
- Rowe, N. C, (2016). Identifying forensically uninteresting files in a large corpus. EAI Endorsed Transactions on Security and Safety, 7(16), e2.
- Rowe, N. C, (2016). South Korea’s options in responding to North Korean cyberattacks. Journal of Information Warfare, 4(15).
- Rowe, N. C., Schwamm, R., McCarrin, M. R., & Gera, R, (2016). Making Sense of Email Addresses on Drives. Journal of Digital Forensics, Security and Law, 2(11), 153-174.
- Rowe, N. C., SChwamm, R., McCarrin, M., & Gera, R, (2016). Making sense of email addresses on drives. Journal of Digital Forensics, Security, and Law, 2(11).
- Sadagic, A., Kolsch, M. N., Welch, G., Basu, C., Darken, C. J., Wachs, J. P., Fuchs, H., Towles, H., Rowe, N. C., Frahm, J., Li Guan, Kumar, R., & Cheng, H, (2013). Smart Instrumented Training Ranges: Bringing Automated System Solutions to Support Critical Domain Needs. Journal of Defense Modeling and Simulation, 3(10), 327-342.
- Rowe, N. C, (2012). Testing the National Software Reference Library.131-138.
- Sadagic, A., Kolsch, M. N., Welch, G., Basu, C., Darken, C. J., Wachs, J. P., Fuchs, H., Towles, H., Rowe, N. C., Frahm, J. M., Guan, L., Kumar, R., & Cheng, H, (2012). Smart Instrumented Training Ranges: Bringing Automated System Solutions to Support Critical Domain Needs. Journal of Defense Modeling and Simulation.
- Rowe, N. C, (2011). Recommended outline for M.S. theses.
- Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P, (2011). Challenges in Monitoring Cyberarms Compliance. International Journal of Cyber Warfare and Terrorism (IJCWT), 2(1), 35–48.
- Reprints
- Lin, P. A., Allhoff, F., & Rowe, N. C, (2016). Ethical questions need to be answered about cyberweapons.
- Technical Reports
- Dean, J., Xie, G. G., Rowe, N. C., & Beverly, R, (2013). Examining the Effect of Organizational Roles in Shaping Network Traffic Activity.