iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/32/4938.xml
Errin W. Fulp Angel Kodituwakku Clark Xu Daniel Rogers David K. Ahn Errin W. Fulp Temporal Aspects of Cyber Threat Intelligence. 6207-6211 2023 IEEE Big Data https://doi.org/10.1109/BigData59044.2023.10386664 conf/bigdataconf/2023 db/conf/bigdataconf/bigdataconf2023.html#KodituwakkuXRAF23 Ariel José Aizpurúa Errin W. Fulp Daniel Cañas Using Diversity to Evolve More Secure and Efficient Virtual Local Area Networks. 491-495 2023 ICNC https://doi.org/10.1109/ICNC57223.2023.10074594 conf/iccnc/2023 db/conf/iccnc/icnc2023.html#AizpuruaFC23 Nolan H. Hamilton Errin W. Fulp Budgeted Classification with Rejection: An Evolutionary Method with Multiple Objectives. 1-10 2022 CEC https://doi.org/10.1109/CEC55065.2022.9870382 conf/cec/2022 db/conf/cec/cec2022.html#HamiltonF22
Nolan H. Hamilton Errin W. Fulp Budgeted Classification with Rejection: An Evolutionary Method with Multiple Objectives. 2022 abs/2205.00570 CoRR https://doi.org/10.48550/arXiv.2205.00570 db/journals/corr/corr2205.html#abs-2205-00570
Nolan H. Hamilton Errin W. Fulp Evolutionary Optimization of High-Coverage Budgeted Classifiers. 2021 abs/2110.13067 CoRR https://arxiv.org/abs/2110.13067 db/journals/corr/corr2110.html#abs-2110-13067
Bryan J. Prosser Errin W. Fulp A Distributed Population Management Approach for Mobile Agent Systems. 102-108 2020 ACSOS https://doi.org/10.1109/ACSOS49614.2020.00031 conf/acsos/2020 db/conf/acsos/acsos2020.html#ProsserF20 Alina Pacheco Rodríguez Errin W. Fulp David J. John Jinku Cui Using evolutionary algorithms and pareto ranking to identify secure virtual local area networks. 1512-1519 2020 GECCO Companion https://doi.org/10.1145/3377929.3398089 conf/gecco/2020c db/conf/gecco/gecco2020c.html#RodriguezFJC20 Nolan H. Hamilton Errin W. Fulp An evolutionary approach for constructing multi-stage classifiers. 1730-1738 2020 GECCO Companion https://doi.org/10.1145/3377929.3398088 conf/gecco/2020c db/conf/gecco/gecco2020c.html#HamiltonF20 Nolan H. Hamilton Steve McKinney Eddie Allan Errin W. Fulp An Efficient Multi-Stage Approach for Identifying Domain Shadowing. 1-7 2020 ICC https://doi.org/10.1109/ICC40277.2020.9148945 conf/icc/2020 db/conf/icc/icc2020.html#HamiltonMAF20 Arnav Bhandari Katherine Juarez Errin W. Fulp Using Execution Profiles to Identify Process Behavior Classes. 1-4 2020 ISNCC https://doi.org/10.1109/ISNCC49221.2020.9297303 conf/isncc/2020 db/conf/isncc/isncc2020.html#BhandariJF20 Nolan H. Hamilton Eddie Allan Errin W. Fulp Cluster Analysis of Passive DNS Features for Identifying Domain Shadowing Infrastructure. 1-4 2020 ISNCC https://doi.org/10.1109/ISNCC49221.2020.9297256 conf/isncc/2020 db/conf/isncc/isncc2020.html#HamiltonAF20 Ruidan Li Errin W. Fulp Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments. 191-196 2018 TrustCom/BigDataSE https://doi.org/10.1109/TrustCom/BigDataSE.2018.00038 https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00038 conf/trustcom/2018 db/conf/trustcom/trustcom2018.html#LiF18 Errin W. Fulp H. Donald Gage Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters. 825-830 2018 TrustCom/BigDataSE https://doi.org/10.1109/TrustCom/BigDataSE.2018.00118 https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00118 conf/trustcom/2018 db/conf/trustcom/trustcom2018.html#FulpG18 Ruidan Li Errin W. Fulp Evolutionary Approaches for Resilient Surveillance Management. 23-28 2017 IEEE Symposium on Security and Privacy Workshops https://doi.org/10.1109/SPW.2017.27 https://doi.ieeecomputersociety.org/10.1109/SPW.2017.27 conf/sp/2017w db/conf/sp/spw2017.html#LiF17 Errin W. Fulp H. Donald Gage Matthew R. McNiece Using Evolutionary Diversity to Identify Problematic Software Parameters. 35-40 2017 IEEE Symposium on Security and Privacy Workshops https://doi.org/10.1109/SPW.2017.28 https://doi.ieeecomputersociety.org/10.1109/SPW.2017.28 conf/sp/2017w db/conf/sp/spw2017.html#FulpGM17
Wojciech Mazurczyk Sean Moore Errin W. Fulp Hiroshi Wada Kenji Leibnitz Bio-inspired cyber security for communications and networking. 58-59 2016 54 IEEE Commun. Mag. 6 https://doi.org/10.1109/MCOM.2016.7497767 db/journals/cm/cm54.html#MazurczykMFWL16
Michael B. Crouse Bryan Prosser Errin W. Fulp Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses. 21-29 2015 MTD@CCS https://doi.org/10.1145/2808475.2808480 conf/ccs/2015mtd db/conf/ccs/mtd2015.html#CrousePF15 Errin W. Fulp H. Donald Gage David J. John Matthew R. McNiece William H. Turkett Jr. Xin Zhou An Evolutionary Strategy for Resilient Cyber Defense. 1-6 2015 GLOBECOM https://doi.org/10.1109/GLOCOM.2014.7417814 conf/globecom/2015 db/conf/globecom/globecom2015.html#FulpGJMTZ15 Caroline A. Odell Matthew R. McNiece Sarah K. Gage Howard Donald Gage Errin W. Fulp Using Probability Densities to Evolve more Secure Software Configurations. 27-32 2015 SafeConfig@CCS https://doi.org/10.1145/2809826.2809831 conf/safeconfig/2015 db/conf/safeconfig/safeconfig2015.html#OdellMGGF15 Jennifer Burg Victor Paúl Pauca William H. Turkett Jr. Errin W. Fulp Samuel S. Cho Peter Santago Daniel A. Cañas H. Donald Gage Engaging Non-Traditional Students in Computer Science through Socially-Inspired Learning and Sustained Mentoring. 639-644 2015 SIGCSE https://doi.org/10.1145/2676723.2677266 conf/sigcse/2015 db/conf/sigcse/sigcse2015.html#BurgPTFCSCG15
Glenn A. Fink Jereme N. Haack A. David McKinnon Errin W. Fulp Defense on the Move: Ant-Based Cyber Defense. 36-43 2014 12 IEEE Secur. Priv. 2 https://doi.org/10.1109/MSP.2014.21 http://doi.ieeecomputersociety.org/10.1109/MSP.2014.21 db/journals/ieeesp/ieeesp12.html#FinkHMF14
Brian Lucas Errin W. Fulp David J. John Daniel A. Cañas An initial framework for evolving computer configurations as a moving target defense. 69-72 2014 CISR https://doi.org/10.1145/2602087.2602100 conf/csiirw/2014 db/conf/csiirw/cisr2014.html#LucasFJC14 David J. John Robert W. Smith 0002 William H. Turkett Jr. Daniel A. Cañas Errin W. Fulp Evolutionary based moving target cyber defense. 1261-1268 2014 GECCO (Companion) https://doi.org/10.1145/2598394.2605437 conf/gecco/2014c db/conf/gecco/gecco2014c.html#JohnSTCF14 Thomas E. Carroll Michael B. Crouse Errin W. Fulp Kenneth S. Berenhaut Analysis of network address shuffling as a moving target defense. 701-706 2014 ICC https://doi.org/10.1109/ICC.2014.6883401 conf/icc/2014 db/conf/icc/icc2014.html#CarrollCFB14 Zbigniew Kalbarczyk Errin W. Fulp IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid. xxx-xxxi 2014 IRI https://doi.org/10.1109/IRI.2014.7051727 https://doi.ieeecomputersociety.org/10.1109/IRI.2014.7051727 conf/iri/2014 db/conf/iri/iri2014.html#KalbarczykF14 Bryan Prosser Neal Dawes Errin W. Fulp A. David McKinnon Glenn A. Fink Using Set-Based Heading to Improve Mobile Agent Movement. 120-128 2014 SASO https://doi.org/10.1109/SASO.2014.24 https://doi.ieeecomputersociety.org/10.1109/SASO.2014.24 conf/saso/2014 db/conf/saso/saso2014.html#ProsserDFMF14 Neal Dawes Bryan Prosser Errin W. Fulp A. David McKinnon Using mobile agents and overlay networks to secure electrical networks. 32 2013 CSIIRW https://doi.org/10.1145/2459976.2460012 conf/csiirw/2013 db/conf/csiirw/csiirw2013.html#DawesPFM13 A. David McKinnon Seth R. Thompson Ruslan A. Doroshchuk Glenn A. Fink Errin W. Fulp Bio-inspired cyber security for smart grid deployments. 1-6 2013 ISGT https://doi.org/10.1109/ISGT.2013.6497880 conf/isgt/2013 db/conf/isgt/isgt2013.html#McKinnonTDFF13 Jereme N. Haack Glenn A. Fink Wendy M. Maiden A. David McKinnon Steven J. Templeton Errin W. Fulp Ant-Based Cyber Security. 918-926 2011 ITNG https://doi.org/10.1109/ITNG.2011.159 https://doi.ieeecomputersociety.org/10.1109/ITNG.2011.159 conf/itng/2011 db/conf/itng/itng2011.html#HaackFMMTF11 Michael B. Crouse Errin W. Fulp A moving target environment for computer configurations using Genetic Algorithms. 2011 SafeConfig https://doi.org/10.1109/SafeConfig.2011.6111663 conf/safeconfig/2011 db/conf/safeconfig/safeconfig2011.html#CrouseF11 Glenn A. Fink Christopher S. Oehmen Jereme N. Haack A. David McKinnon Errin W. Fulp Michael B. Crouse Bio-Inspired Enterprise Security. 212-213 2011 SASO https://doi.org/10.1109/SASO.2011.33 https://doi.ieeecomputersociety.org/10.1109/SASO.2011.33 conf/saso/2011 db/conf/saso/saso2011.html#FinkOHMFC11 Brian C. Williams Errin W. Fulp A Biologically Modeled Intrusion Detection System for Mobile Networks. 453-458 2010 BWCCA https://doi.org/10.1109/BWCCA.2010.113 https://doi.ieeecomputersociety.org/10.1109/BWCCA.2010.113 conf/bwcca/2010 db/conf/bwcca/bwcca2010.html#WilliamsF10 R. Wesley Featherstun Errin W. Fulp Using Syslog Message Sequences for Predicting Disk Failures. 2010 LISA https://www.usenix.org/conference/lisa10/using-syslog-message-sequences-predicting-disk-failures conf/lisa/2010 db/conf/lisa/lisa2010.html#FeatherstunF10 Richard J. Hummel Errin W. Fulp High-speed packet filtering utilizing stream processors. 73440I 2009 Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security https://doi.org/10.1117/12.818389 conf/dmkdttt/2009 db/conf/dmkdttt/dmidisadns2009.html#HummelF09 Ashish Tapdiya Errin W. Fulp Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs. 1-6 2009 ICCCN https://doi.org/10.1109/ICCCN.2009.5235232 https://doi.ieeecomputersociety.org/10.1109/ICCCN.2009.5235232 conf/icccn/2009 db/conf/icccn/icccn2009.html#TapdiyaF09 William H. Turkett Jr. Andrew V. Karode Errin W. Fulp In-the-Dark Network Traffic Classification Using Support Vector Machines. 1745-1750 2008 AAAI conf/aaai/2008 db/conf/aaai/aaai2008.html#TurkettKF08 http://www.aaai.org/Library/IAAI/2008/iaai08-019.php Michael R. Horvath Errin W. Fulp Patrick S. Wheeler Policy Distribution Methods for Function Parallel Firewalls. 620-625 2008 ICCCN https://doi.org/10.1109/ICCCN.2008.ECP.121 conf/icccn/2008 db/conf/icccn/icccn2008.html#HorvathFW08 Errin W. Fulp Glenn A. Fink Jereme N. Haack Predicting Computer System Failures Using Support Vector Machines. 2008 WASL http://www.usenix.org/events/wasl/tech/full_papers/fulp/fulp.pdf conf/osdi/2008wasl db/conf/osdi/wasl2008.html#FulpFH08 Patrick S. Wheeler Errin W. Fulp A taxonomy of parallel techniques for intrusion detection. 278-282 2007 conf/ACMse/2007 ACM Southeast Regional Conference https://doi.org/10.1145/1233341.1233391 db/conf/ACMse/ACMse2007.html#WheelerF07 Errin W. Fulp Ryan J. Farley A Function-Parallel Architecture for High-Speed Firewalls. 2213-2218 2006 ICC https://doi.org/10.1109/ICC.2006.255099 conf/icc/2006 db/conf/icc/icc2006.html#FulpF06 Errin W. Fulp An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper). 292-301 2006 conf/icics/2006 ICICS https://doi.org/10.1007/11935308_21 db/conf/icics/icics2006.html#Fulp06 Errin W. Fulp Parallel Firewall Designs for High-Speed Networks. 2006 conf/infocom/2006 INFOCOM https://doi.org/10.1109/INFOCOM.2006.27 db/conf/infocom/infocom2006.html#Fulp06 Stephen J. Tarsa Errin W. Fulp Balancing Trie-Based Policy Representations for Network Firewalls. 755-760 2006 conf/iscc/2006 ISCC https://doi.org/10.1109/ISCC.2006.44 https://doi.ieeecomputersociety.org/10.1109/ISCC.2006.44 db/conf/iscc/iscc2006.html#TarsaF06 Ryan J. Farley Errin W. Fulp Effects of Processing Delay on Function-Parallel Firewalls. 136-141 2006 conf/pdcn/2006 Parallel and Distributed Computing and Networks db/conf/pdcn/pdcn2006.html#FarleyF06 Errin W. Fulp Stephen J. Tarsa Trie-Based Policy Representations for Network Firewalls. 434-441 2005 conf/iscc/2005 ISCC https://doi.org/10.1109/ISCC.2005.149 https://doi.ieeecomputersociety.org/10.1109/ISCC.2005.149 db/conf/iscc/iscc2005.html#FulpT05 Joseph V. Antrosio Errin W. Fulp Malware Defense Using Network Security Authentication. 43-54 2005 conf/iwia/2005 IWIA db/conf/iwia/iwia2005.html#AntrosioF05 https://doi.org/10.1109/IWIA.2005.11 https://doi.ieeecomputersociety.org/10.1109/IWIA.2005.11
Errin W. Fulp Douglas S. Reeves Bandwidth provisioning and pricing for networks with multiple classes of service. 41-52 2004 46 Comput. Networks 1 https://doi.org/10.1016/j.comnet.2004.03.018 db/journals/cn/cn46.html#FulpR04
Errin W. Fulp Douglas S. Reeves The Economic Impact of Network Pricing Intervals. 315-324 https://doi.org/10.1007/3-540-45859-X_30 2002 conf/qofis/2002 QofIS db/conf/qofis/qofis2002.html#FulpR02 Errin W. Fulp Douglas S. Reeves Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion. 144-150 2001 conf/gi/2001-1 GI Jahrestagung (1) db/conf/gi/gi2001-1.html#FulpR01 Errin W. Fulp Douglas S. Reeves Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets. 409-418 2001 conf/icn/2001-1 ICN (1) https://doi.org/10.1007/3-540-47728-4_40 db/conf/icn/icn2001-1.html#FulpR01 Errin W. Fulp Douglas S. Reeves QoS Rewards and Risks: A Multi-market Approach to Resource Allocation. 945-956 https://doi.org/10.1007/3-540-45551-5_79 2000 conf/networking/2000 NETWORKING db/conf/networking/networking2000.html#FulpR00 Errin W. Fulp Douglas S. Reeves Distributed Network Flow Control based on Dynamic Competitive Markets. 119-128 1998 conf/icnp/1998 ICNP https://doi.org/10.1109/ICNP.1998.723732 https://doi.ieeecomputersociety.org/10.1109/ICNP.1998.723732 db/conf/icnp/icnp1998.html#FulpR98 Errin W. Fulp Douglas S. Reeves On-line Dynamic Bandwidth Allocation. 134-141 1997 conf/icnp/1997 ICNP https://doi.org/10.1109/ICNP.1997.643704 https://doi.ieeecomputersociety.org/10.1109/ICNP.1997.643704 db/conf/icnp/icnp1997.html#FulpR97 David K. Ahn Ariel José Aizpurúa Eddie Allan Joseph V. Antrosio Kenneth S. Berenhaut Arnav Bhandari Jennifer J. BurgJennifer Burg Daniel Cañas Daniel A. Cañas Thomas E. Carroll Samuel S. Cho Michael B. Crouse Jinku Cui Neal Dawes Ruslan A. Doroshchuk Ryan J. Farley R. Wesley Featherstun Glenn A. Fink H. Donald GageHoward Donald Gage Sarah K. Gage Jereme HaackJereme N. Haack Nolan H. Hamilton Michael R. Horvath Richard J. Hummel David J. John Katherine Juarez Zbigniew T. KalbarczykZbigniew Kalbarczyk Andrew V. Karode Angel Kodituwakku Kenji Leibnitz Ruidan Li Brian Lucas Wendy M. Maiden Wojciech Mazurczyk Steve McKinney A. David McKinnon Matthew R. McNiece Sean Moore Caroline A. Odell Christopher S. Oehmen Victor Paúl Pauca Bryan ProsserBryan J. Prosser Douglas S. Reeves Alina Pacheco Rodríguez Daniel Rogers Peter Santago IIPeter Santago Robert W. Smith 0002 Ashish Tapdiya Stephen J. Tarsa Steven J. Templeton Seth R. Thompson William H. Turkett Jr. Hiroshi Wada Patrick S. Wheeler Brian C. Williams Clark Xu Xin Zhou