NPS - Faculty Profiles - Heading

Faculty Profile Directory


FacultyCV
Back

Neil C Rowe

Professor
Computer Science

Phone: (831) 656-2462

Overview

Neil C. Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since 1983. He has a Ph.D. in Computer Science from Stanford University (1983) and three degrees from the Massachusetts Institute of Technology. His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare. He has also worked on text processing, computational geometry, and intelligent tutoring systems.
NPS Experience
  • 1983 - current: Professor
Research Interests
applied artificial intelligence
Teaching Interests
artificial intelligence, information security, data mining, digital forensics

Scholarly Work

Publications
  • Book Chapters
  • Rowe, N. C, (2022). Cyber deception. Heidelberg Germany: Springer Berlin.
  • Rowe, N. C, (2020). Current Privacy Concerns with Digital Forensics. Hershey, Pennsylvania United States: IGI Global.
  • Rowe, N. C, (2019). Honeypot deception tactics. Chaum Switzerland: Springer.
  • Rowe, N. C, (2017). Challenges of civilian distinction in cyberwarfare. New York, NY US: Springer.
  • Rowe, N. C, (2016). Privacy concerns with digital forensics. Hershey, PA US: Information Science Reference.
  • Rowe, N. C, (2015). Attribution of cyberwarfare. Oxon UK: Routledge.
  • Rowe, N. C, (2015). Distinct ethical challenges of cyberweapons. Cheltenham UK: Edward Elgar.
  • Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P, (2010). Taylor & Francis Group.
  • Books
  • Rowe, N. C., & Rrushi, J, (2016). Introduction to Cyberdeception. Switzerland: Springer.
  • Journal Articles
  • Rowe, N. C, (2022). The comparative ethics of artificial-intelligence methods for military applications. Frontiers in Big Data: Cyber Security and Privacy.
  • Rowe, N. C, (2022). Algorithms for artificial intelligence. IEEE Computer, 7(55), 87-102.
  • Dijkstra, J., Rowe, N. C., Shimeall, T., Horneman, A., & Midler, M, (2021). Introduction to special issue on the nature of situational awareness in cybersecurity. Digital Treats: Research and Practice, 4(2), 1-3.
  • Leopard, C. B., Rowe, N. C., & McCarrin, M. R, (2018). Testing memory forensics tools for the Macintosh OS X operating system. Journal of Digital Forensics, Security, and Law, 1(13), 31-42.
  • Rowe, N. C, (2018). A taxonomy of norms in cyberconflict for government policymakers. Journal of Information Warfare, 1(17), 31-48.
  • Park, J. M., Rowe, N. C., & Cisneros, M, (2016). South Korea's options in responding to North Korean cyberattacks. Journal of Information Warfare, 4(15), 86-99.
  • Rowe, N. C, (2016). Identifying forensically uninteresting files in a large corpus. EAI Endorsed Transactions on Security and Safety, 7(16), e2.
  • Rowe, N. C, (2016). South Korea’s options in responding to North Korean cyberattacks. Journal of Information Warfare, 4(15).
  • Rowe, N. C., Schwamm, R., McCarrin, M. R., & Gera, R, (2016). Making Sense of Email Addresses on Drives. Journal of Digital Forensics, Security and Law, 2(11), 153-174.
  • Rowe, N. C., SChwamm, R., McCarrin, M., & Gera, R, (2016). Making sense of email addresses on drives. Journal of Digital Forensics, Security, and Law, 2(11).
  • Sadagic, A., Kolsch, M. N., Welch, G., Basu, C., Darken, C. J., Wachs, J. P., Fuchs, H., Towles, H., Rowe, N. C., Frahm, J., Li Guan, Kumar, R., & Cheng, H, (2013). Smart Instrumented Training Ranges: Bringing Automated System Solutions to Support Critical Domain Needs. Journal of Defense Modeling and Simulation, 3(10), 327-342.
  • Rowe, N. C, (2012). Testing the National Software Reference Library.131-138.
  • Sadagic, A., Kolsch, M. N., Welch, G., Basu, C., Darken, C. J., Wachs, J. P., Fuchs, H., Towles, H., Rowe, N. C., Frahm, J. M., Guan, L., Kumar, R., & Cheng, H, (2012). Smart Instrumented Training Ranges: Bringing Automated System Solutions to Support Critical Domain Needs. Journal of Defense Modeling and Simulation.
  • Rowe, N. C, (2011). Recommended outline for M.S. theses.
  • Rowe, N. C., Garfinkel, S. L., Beverly, R., & Yannakogeorgos, P, (2011). Challenges in Monitoring Cyberarms Compliance. International Journal of Cyber Warfare and Terrorism (IJCWT), 2(1), 35–48.
  • Reprints
  • Lin, P. A., Allhoff, F., & Rowe, N. C, (2016). Ethical questions need to be answered about cyberweapons.