Errin W. Fulp

According to our database1, Errin W. Fulp authored at least 52 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Using Diversity to Evolve More Secure and Efficient Virtual Local Area Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Temporal Aspects of Cyber Threat Intelligence.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Budgeted Classification with Rejection: An Evolutionary Method with Multiple Objectives.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

2021
Evolutionary Optimization of High-Coverage Budgeted Classifiers.
CoRR, 2021

2020
Cluster Analysis of Passive DNS Features for Identifying Domain Shadowing Infrastructure.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Using Execution Profiles to Identify Process Behavior Classes.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

An Efficient Multi-Stage Approach for Identifying Domain Shadowing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Using evolutionary algorithms and pareto ranking to identify secure virtual local area networks.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

An evolutionary approach for constructing multi-stage classifiers.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

A Distributed Population Management Approach for Mobile Agent Systems.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

2018
Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Evolutionary Approaches for Resilient Surveillance Management.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Using Evolutionary Diversity to Identify Problematic Software Parameters.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

2016
Bio-inspired cyber security for communications and networking.
IEEE Commun. Mag., 2016

2015
Engaging Non-Traditional Students in Computer Science through Socially-Inspired Learning and Sustained Mentoring.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Using Probability Densities to Evolve more Secure Software Configurations.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

An Evolutionary Strategy for Resilient Cyber Defense.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Defense on the Move: Ant-Based Cyber Defense.
IEEE Secur. Priv., 2014

Using Set-Based Heading to Improve Mobile Agent Movement.
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2014

IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Analysis of network address shuffling as a moving target defense.
Proceedings of the IEEE International Conference on Communications, 2014

Evolutionary based moving target cyber defense.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

An initial framework for evolving computer configurations as a moving target defense.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Bio-inspired cyber security for smart grid deployments.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Using mobile agents and overlay networks to secure electrical networks.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Bio-Inspired Enterprise Security.
Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2011

A moving target environment for computer configurations using Genetic Algorithms.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Ant-Based Cyber Security.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Using Syslog Message Sequences for Predicting Disk Failures.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

A Biologically Modeled Intrusion Detection System for Mobile Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

High-speed packet filtering utilizing stream processors.
Proceedings of the Data Mining, 2009

2008
Predicting Computer System Failures Using Support Vector Machines.
Proceedings of the First USENIX Workshop on the Analysis of System Logs, 2008

Policy Distribution Methods for Function Parallel Firewalls.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

In-the-Dark Network Traffic Classification Using Support Vector Machines.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
A taxonomy of parallel techniques for intrusion detection.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Effects of Processing Delay on Function-Parallel Firewalls.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

Balancing Trie-Based Policy Representations for Network Firewalls.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Parallel Firewall Designs for High-Speed Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

A Function-Parallel Architecture for High-Speed Firewalls.
Proceedings of IEEE International Conference on Communications, 2006

2005
Malware Defense Using Network Security Authentication.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Trie-Based Policy Representations for Network Firewalls.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2004
Bandwidth provisioning and pricing for networks with multiple classes of service.
Comput. Networks, 2004

2002
The Economic Impact of Network Pricing Intervals.
Proceedings of the From QoS Provisioning to QoS Charging, 2002

2001
Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets.
Proceedings of the Networking, 2001

Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
QoS Rewards and Risks: A Multi-market Approach to Resource Allocation.
Proceedings of the NETWORKING 2000, 2000

1998
Distributed Network Flow Control based on Dynamic Competitive Markets.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

1997
On-line Dynamic Bandwidth Allocation.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997


  Loading...