Errin W. FulpAngel KodituwakkuClark XuDaniel RogersDavid K. AhnErrin W. FulpTemporal Aspects of Cyber Threat Intelligence.6207-62112023IEEE Big Datahttps://doi.org/10.1109/BigData59044.2023.10386664conf/bigdataconf/2023db/conf/bigdataconf/bigdataconf2023.html#KodituwakkuXRAF23Ariel José AizpurúaErrin W. FulpDaniel CañasUsing Diversity to Evolve More Secure and Efficient Virtual Local Area Networks.491-4952023ICNChttps://doi.org/10.1109/ICNC57223.2023.10074594conf/iccnc/2023db/conf/iccnc/icnc2023.html#AizpuruaFC23Nolan H. HamiltonErrin W. FulpBudgeted Classification with Rejection: An Evolutionary Method with Multiple Objectives.1-102022CEChttps://doi.org/10.1109/CEC55065.2022.9870382conf/cec/2022db/conf/cec/cec2022.html#HamiltonF22Nolan H. HamiltonErrin W. FulpBudgeted Classification with Rejection: An Evolutionary Method with Multiple Objectives.2022abs/2205.00570CoRRhttps://doi.org/10.48550/arXiv.2205.00570db/journals/corr/corr2205.html#abs-2205-00570Nolan H. HamiltonErrin W. FulpEvolutionary Optimization of High-Coverage Budgeted Classifiers.2021abs/2110.13067CoRRhttps://arxiv.org/abs/2110.13067db/journals/corr/corr2110.html#abs-2110-13067Bryan J. ProsserErrin W. FulpA Distributed Population Management Approach for Mobile Agent Systems.102-1082020ACSOShttps://doi.org/10.1109/ACSOS49614.2020.00031conf/acsos/2020db/conf/acsos/acsos2020.html#ProsserF20Alina Pacheco RodríguezErrin W. FulpDavid J. JohnJinku CuiUsing evolutionary algorithms and pareto ranking to identify secure virtual local area networks.1512-15192020GECCO Companionhttps://doi.org/10.1145/3377929.3398089conf/gecco/2020cdb/conf/gecco/gecco2020c.html#RodriguezFJC20Nolan H. HamiltonErrin W. FulpAn evolutionary approach for constructing multi-stage classifiers.1730-17382020GECCO Companionhttps://doi.org/10.1145/3377929.3398088conf/gecco/2020cdb/conf/gecco/gecco2020c.html#HamiltonF20Nolan H. HamiltonSteve McKinneyEddie AllanErrin W. FulpAn Efficient Multi-Stage Approach for Identifying Domain Shadowing.1-72020ICChttps://doi.org/10.1109/ICC40277.2020.9148945conf/icc/2020db/conf/icc/icc2020.html#HamiltonMAF20Arnav BhandariKatherine JuarezErrin W. FulpUsing Execution Profiles to Identify Process Behavior Classes.1-42020ISNCChttps://doi.org/10.1109/ISNCC49221.2020.9297303conf/isncc/2020db/conf/isncc/isncc2020.html#BhandariJF20Nolan H. HamiltonEddie AllanErrin W. FulpCluster Analysis of Passive DNS Features for Identifying Domain Shadowing Infrastructure.1-42020ISNCChttps://doi.org/10.1109/ISNCC49221.2020.9297256conf/isncc/2020db/conf/isncc/isncc2020.html#HamiltonAF20Ruidan LiErrin W. FulpUsing Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments.191-1962018TrustCom/BigDataSEhttps://doi.org/10.1109/TrustCom/BigDataSE.2018.00038https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00038conf/trustcom/2018db/conf/trustcom/trustcom2018.html#LiF18Errin W. FulpH. Donald GageUsing Feature Selection to Identify Chains of Insecure Software Configuration Parameters.825-8302018TrustCom/BigDataSEhttps://doi.org/10.1109/TrustCom/BigDataSE.2018.00118https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00118conf/trustcom/2018db/conf/trustcom/trustcom2018.html#FulpG18Ruidan LiErrin W. FulpEvolutionary Approaches for Resilient Surveillance Management.23-282017IEEE Symposium on Security and Privacy Workshopshttps://doi.org/10.1109/SPW.2017.27https://doi.ieeecomputersociety.org/10.1109/SPW.2017.27conf/sp/2017wdb/conf/sp/spw2017.html#LiF17Errin W. FulpH. Donald GageMatthew R. McNieceUsing Evolutionary Diversity to Identify Problematic Software Parameters.35-402017IEEE Symposium on Security and Privacy Workshopshttps://doi.org/10.1109/SPW.2017.28https://doi.ieeecomputersociety.org/10.1109/SPW.2017.28conf/sp/2017wdb/conf/sp/spw2017.html#FulpGM17Wojciech MazurczykSean MooreErrin W. FulpHiroshi WadaKenji LeibnitzBio-inspired cyber security for communications and networking.58-59201654IEEE Commun. Mag.6https://doi.org/10.1109/MCOM.2016.7497767db/journals/cm/cm54.html#MazurczykMFWL16Michael B. CrouseBryan ProsserErrin W. FulpProbabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses.21-292015MTD@CCShttps://doi.org/10.1145/2808475.2808480conf/ccs/2015mtddb/conf/ccs/mtd2015.html#CrousePF15Errin W. FulpH. Donald GageDavid J. JohnMatthew R. McNieceWilliam H. Turkett Jr.Xin ZhouAn Evolutionary Strategy for Resilient Cyber Defense.1-62015GLOBECOMhttps://doi.org/10.1109/GLOCOM.2014.7417814conf/globecom/2015db/conf/globecom/globecom2015.html#FulpGJMTZ15Caroline A. OdellMatthew R. McNieceSarah K. GageHoward Donald GageErrin W. FulpUsing Probability Densities to Evolve more Secure Software Configurations.27-322015SafeConfig@CCShttps://doi.org/10.1145/2809826.2809831conf/safeconfig/2015db/conf/safeconfig/safeconfig2015.html#OdellMGGF15Jennifer BurgVictor Paúl PaucaWilliam H. Turkett Jr.Errin W. FulpSamuel S. ChoPeter SantagoDaniel A. CañasH. Donald GageEngaging Non-Traditional Students in Computer Science through Socially-Inspired Learning and Sustained Mentoring.639-6442015SIGCSEhttps://doi.org/10.1145/2676723.2677266conf/sigcse/2015db/conf/sigcse/sigcse2015.html#BurgPTFCSCG15Glenn A. FinkJereme N. HaackA. David McKinnonErrin W. FulpDefense on the Move: Ant-Based Cyber Defense.36-43201412IEEE Secur. Priv.2https://doi.org/10.1109/MSP.2014.21http://doi.ieeecomputersociety.org/10.1109/MSP.2014.21db/journals/ieeesp/ieeesp12.html#FinkHMF14Brian LucasErrin W. FulpDavid J. JohnDaniel A. CañasAn initial framework for evolving computer configurations as a moving target defense.69-722014CISRhttps://doi.org/10.1145/2602087.2602100conf/csiirw/2014db/conf/csiirw/cisr2014.html#LucasFJC14David J. JohnRobert W. Smith 0002William H. Turkett Jr.Daniel A. CañasErrin W. FulpEvolutionary based moving target cyber defense.1261-12682014GECCO (Companion)https://doi.org/10.1145/2598394.2605437conf/gecco/2014cdb/conf/gecco/gecco2014c.html#JohnSTCF14Thomas E. CarrollMichael B. CrouseErrin W. FulpKenneth S. BerenhautAnalysis of network address shuffling as a moving target defense.701-7062014ICChttps://doi.org/10.1109/ICC.2014.6883401conf/icc/2014db/conf/icc/icc2014.html#CarrollCFB14Zbigniew KalbarczykErrin W. FulpIICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid.xxx-xxxi2014IRIhttps://doi.org/10.1109/IRI.2014.7051727https://doi.ieeecomputersociety.org/10.1109/IRI.2014.7051727conf/iri/2014db/conf/iri/iri2014.html#KalbarczykF14Bryan ProsserNeal DawesErrin W. FulpA. David McKinnonGlenn A. FinkUsing Set-Based Heading to Improve Mobile Agent Movement.120-1282014SASOhttps://doi.org/10.1109/SASO.2014.24https://doi.ieeecomputersociety.org/10.1109/SASO.2014.24conf/saso/2014db/conf/saso/saso2014.html#ProsserDFMF14Neal DawesBryan ProsserErrin W. FulpA. David McKinnonUsing mobile agents and overlay networks to secure electrical networks.322013CSIIRWhttps://doi.org/10.1145/2459976.2460012conf/csiirw/2013db/conf/csiirw/csiirw2013.html#DawesPFM13A. David McKinnonSeth R. ThompsonRuslan A. DoroshchukGlenn A. FinkErrin W. FulpBio-inspired cyber security for smart grid deployments.1-62013ISGThttps://doi.org/10.1109/ISGT.2013.6497880conf/isgt/2013db/conf/isgt/isgt2013.html#McKinnonTDFF13Jereme N. HaackGlenn A. FinkWendy M. MaidenA. David McKinnonSteven J. TempletonErrin W. FulpAnt-Based Cyber Security.918-9262011ITNGhttps://doi.org/10.1109/ITNG.2011.159https://doi.ieeecomputersociety.org/10.1109/ITNG.2011.159conf/itng/2011db/conf/itng/itng2011.html#HaackFMMTF11Michael B. CrouseErrin W. FulpA moving target environment for computer configurations using Genetic Algorithms.2011SafeConfighttps://doi.org/10.1109/SafeConfig.2011.6111663conf/safeconfig/2011db/conf/safeconfig/safeconfig2011.html#CrouseF11Glenn A. FinkChristopher S. OehmenJereme N. HaackA. David McKinnonErrin W. FulpMichael B. CrouseBio-Inspired Enterprise Security.212-2132011SASOhttps://doi.org/10.1109/SASO.2011.33https://doi.ieeecomputersociety.org/10.1109/SASO.2011.33conf/saso/2011db/conf/saso/saso2011.html#FinkOHMFC11Brian C. WilliamsErrin W. FulpA Biologically Modeled Intrusion Detection System for Mobile Networks.453-4582010BWCCAhttps://doi.org/10.1109/BWCCA.2010.113https://doi.ieeecomputersociety.org/10.1109/BWCCA.2010.113conf/bwcca/2010db/conf/bwcca/bwcca2010.html#WilliamsF10R. Wesley FeatherstunErrin W. FulpUsing Syslog Message Sequences for Predicting Disk Failures.2010LISAhttps://www.usenix.org/conference/lisa10/using-syslog-message-sequences-predicting-disk-failuresconf/lisa/2010db/conf/lisa/lisa2010.html#FeatherstunF10Richard J. HummelErrin W. FulpHigh-speed packet filtering utilizing stream processors.73440I2009Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Securityhttps://doi.org/10.1117/12.818389conf/dmkdttt/2009db/conf/dmkdttt/dmidisadns2009.html#HummelF09Ashish TapdiyaErrin W. FulpTowards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs.1-62009ICCCNhttps://doi.org/10.1109/ICCCN.2009.5235232https://doi.ieeecomputersociety.org/10.1109/ICCCN.2009.5235232conf/icccn/2009db/conf/icccn/icccn2009.html#TapdiyaF09William H. Turkett Jr.Andrew V. KarodeErrin W. FulpIn-the-Dark Network Traffic Classification Using Support Vector Machines.1745-17502008AAAIconf/aaai/2008db/conf/aaai/aaai2008.html#TurkettKF08http://www.aaai.org/Library/IAAI/2008/iaai08-019.phpMichael R. HorvathErrin W. FulpPatrick S. WheelerPolicy Distribution Methods for Function Parallel Firewalls.620-6252008ICCCNhttps://doi.org/10.1109/ICCCN.2008.ECP.121conf/icccn/2008db/conf/icccn/icccn2008.html#HorvathFW08Errin W. FulpGlenn A. FinkJereme N. HaackPredicting Computer System Failures Using Support Vector Machines.2008WASLhttp://www.usenix.org/events/wasl/tech/full_papers/fulp/fulp.pdfconf/osdi/2008wasldb/conf/osdi/wasl2008.html#FulpFH08Patrick S. WheelerErrin W. FulpA taxonomy of parallel techniques for intrusion detection.278-2822007conf/ACMse/2007ACM Southeast Regional Conferencehttps://doi.org/10.1145/1233341.1233391db/conf/ACMse/ACMse2007.html#WheelerF07Errin W. FulpRyan J. FarleyA Function-Parallel Architecture for High-Speed Firewalls.2213-22182006ICChttps://doi.org/10.1109/ICC.2006.255099conf/icc/2006db/conf/icc/icc2006.html#FulpF06Errin W. FulpAn Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper).292-3012006conf/icics/2006ICICShttps://doi.org/10.1007/11935308_21db/conf/icics/icics2006.html#Fulp06Errin W. FulpParallel Firewall Designs for High-Speed Networks.2006conf/infocom/2006INFOCOMhttps://doi.org/10.1109/INFOCOM.2006.27db/conf/infocom/infocom2006.html#Fulp06Stephen J. TarsaErrin W. FulpBalancing Trie-Based Policy Representations for Network Firewalls.755-7602006conf/iscc/2006ISCChttps://doi.org/10.1109/ISCC.2006.44https://doi.ieeecomputersociety.org/10.1109/ISCC.2006.44db/conf/iscc/iscc2006.html#TarsaF06Ryan J. FarleyErrin W. FulpEffects of Processing Delay on Function-Parallel Firewalls.136-1412006conf/pdcn/2006Parallel and Distributed Computing and Networksdb/conf/pdcn/pdcn2006.html#FarleyF06Errin W. FulpStephen J. TarsaTrie-Based Policy Representations for Network Firewalls.434-4412005conf/iscc/2005ISCChttps://doi.org/10.1109/ISCC.2005.149https://doi.ieeecomputersociety.org/10.1109/ISCC.2005.149db/conf/iscc/iscc2005.html#FulpT05Joseph V. AntrosioErrin W. FulpMalware Defense Using Network Security Authentication.43-542005conf/iwia/2005IWIAdb/conf/iwia/iwia2005.html#AntrosioF05https://doi.org/10.1109/IWIA.2005.11https://doi.ieeecomputersociety.org/10.1109/IWIA.2005.11Errin W. FulpDouglas S. ReevesBandwidth provisioning and pricing for networks with multiple classes of service.41-52200446Comput. Networks1https://doi.org/10.1016/j.comnet.2004.03.018db/journals/cn/cn46.html#FulpR04Errin W. FulpDouglas S. ReevesThe Economic Impact of Network Pricing Intervals.315-324https://doi.org/10.1007/3-540-45859-X_302002conf/qofis/2002QofISdb/conf/qofis/qofis2002.html#FulpR02Errin W. FulpDouglas S. ReevesOptimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion.144-1502001conf/gi/2001-1GI Jahrestagung (1)db/conf/gi/gi2001-1.html#FulpR01Errin W. FulpDouglas S. ReevesOptimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets.409-4182001conf/icn/2001-1ICN (1)https://doi.org/10.1007/3-540-47728-4_40db/conf/icn/icn2001-1.html#FulpR01Errin W. FulpDouglas S. ReevesQoS Rewards and Risks: A Multi-market Approach to Resource Allocation.945-956https://doi.org/10.1007/3-540-45551-5_792000conf/networking/2000NETWORKINGdb/conf/networking/networking2000.html#FulpR00Errin W. FulpDouglas S. ReevesDistributed Network Flow Control based on Dynamic Competitive Markets.119-1281998conf/icnp/1998ICNPhttps://doi.org/10.1109/ICNP.1998.723732https://doi.ieeecomputersociety.org/10.1109/ICNP.1998.723732db/conf/icnp/icnp1998.html#FulpR98Errin W. FulpDouglas S. ReevesOn-line Dynamic Bandwidth Allocation.134-1411997conf/icnp/1997ICNPhttps://doi.org/10.1109/ICNP.1997.643704https://doi.ieeecomputersociety.org/10.1109/ICNP.1997.643704db/conf/icnp/icnp1997.html#FulpR97David K. AhnAriel José AizpurúaEddie AllanJoseph V. AntrosioKenneth S. BerenhautArnav BhandariJennifer J. BurgJennifer BurgDaniel CañasDaniel A. CañasThomas E. CarrollSamuel S. ChoMichael B. CrouseJinku CuiNeal DawesRuslan A. DoroshchukRyan J. FarleyR. Wesley FeatherstunGlenn A. FinkH. Donald GageHoward Donald GageSarah K. GageJereme HaackJereme N. HaackNolan H. HamiltonMichael R. HorvathRichard J. HummelDavid J. JohnKatherine JuarezZbigniew T. KalbarczykZbigniew KalbarczykAndrew V. KarodeAngel KodituwakkuKenji LeibnitzRuidan LiBrian LucasWendy M. MaidenWojciech MazurczykSteve McKinneyA. David McKinnonMatthew R. McNieceSean MooreCaroline A. OdellChristopher S. OehmenVictor Paúl PaucaBryan ProsserBryan J. ProsserDouglas S. ReevesAlina Pacheco RodríguezDaniel RogersPeter Santago IIPeter SantagoRobert W. Smith 0002Ashish TapdiyaStephen J. TarsaSteven J. TempletonSeth R. ThompsonWilliam H. Turkett Jr.Hiroshi WadaPatrick S. WheelerBrian C. WilliamsClark XuXin Zhou