Stephanie Forrest

Affiliations:
  • University of New Mexico in Albuquerque, USA


According to our database1, Stephanie Forrest authored at least 141 papers between 1985 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation.
CoRR, 2022

Cutting Through the Noise to Infer Autonomous System Topology.
CoRR, 2022

2021
Spatially distributed infection increases viral load in a computational model of SARS-CoV-2 lung infection.
PLoS Comput. Biol., 2021

A biological perspective on evolutionary computation.
Nat. Mach. Intell., 2021

Challenges in cybersecurity: Lessons from biological defense systems.
CoRR, 2021

Preventing Extreme Polarization of Political Attitudes.
CoRR, 2021

MIMOSA: Reducing Malware Analysis Overhead with Coverings.
CoRR, 2021

Multiplicative Weights Algorithms for Parallel Automated Software Repair.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

Applying Automated Program Repair to Dataflow Programming Languages.
Proceedings of the 10th IEEE/ACM International Workshop on Genetic Improvement, 2021

MA-ABC: a memetic algorithm optimizing attractiveness, balance, and cost for capacitated Arc routing problems.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

2020
GEVO: GPU Code Optimization Using Evolutionary Computation.
ACM Trans. Archit. Code Optim., 2020

The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities.
Artif. Life, 2020

Confronting Domain Shift in Trained Neural Networks.
Proceedings of the NeurIPS 2020 Workshop on Pre-registration in Machine Learning, 2020

GEVO-ML: a proposal for optimizing ML code with evolutionary computation.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

MARTINI: Memory Access Traces to Detect Attacks.
Proceedings of the CCSW'20, 2020

2019
Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs.
IEEE Trans. Software Eng., 2019

Risky Business: Assessing Security with External Measurements.
CoRR, 2019

Understanding Automatically-Generated Patches Through Symbolic Invariant Differences.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Genetic improvement of GPU code.
Proceedings of the 6th International Workshop on Genetic Improvement, 2019

Evolutionary computation for improving malware analysis.
Proceedings of the 6th International Workshop on Genetic Improvement, 2019

Defeating denial-of-service attacks in a self-managing <i>N</i>-variant system.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

Genetic algorithms for affine transformations to existential <i>t</i>-restrictions.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Borders and gateways: measuring and analyzing national as chokepoints.
Proceedings of the Conference on Computing & Sustainable Societies, 2019

2018
Genetic Improvement of Software (Dagstuhl Seminar 18052).
Dagstuhl Reports, 2018

Neutrality and epistasis in program space.
Proceedings of the 4th International Genetic Improvement Workshop, 2018

The biology of software.
Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing, 2018

2017
Clarifications on the Construction and Use of the ManyBugs Benchmark.
IEEE Trans. Software Eng., 2017

Strategic aspects of cyberattack, attribution, and blame.
Proc. Natl. Acad. Sci. USA, 2017

Connecting Program Synthesis and Reachability: Automatic Program Repair Using Test-Input Generation.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017

Negative selection based anomaly detector for multimodal health data.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Automatically evolving a general controller for robot swarms.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

2016
Hype and heavy tails: A closer look at data breaches.
J. Cybersecur., 2016

Adaptive computation: the multidisciplinary legacy of John H. Holland.
Commun. ACM, 2016

Cactus Environment Machine - Shared Environment Call-by-Need.
Proceedings of the Trends in Functional Programming - 17th International Conference, 2016

Trusted Software Repair for System Resiliency.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs.
IEEE Trans. Software Eng., 2015

Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software Repair.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Volatility and spatial distribution of resources determine ant foraging strategies.
Proceedings of the Thirteenth European Conference Artificial Life, 2015

Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants.
ACM Trans. Softw. Eng. Methodol., 2014

Software mutational robustness.
Genet. Program. Evolvable Mach., 2014

Using dynamic analysis to generate disjunctive invariants.
Proceedings of the 36th International Conference on Software Engineering, 2014

Post-compiler software optimization for reducing energy.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
Moving Target Defenses in the Helix Self-Regenerative Architecture.
Proceedings of the Moving Target Defense II, 2013

Current challenges in automatic software repair.
Softw. Qual. J., 2013

Application and analysis of multidimensional negative surveys in participatory sensing applications.
Pervasive Mob. Comput., 2013

Empirical and theoretical lower bounds on energy consumption for networks on chip.
Proceedings of the Network on Chip Architectures, 2013

Leveraging program equivalence for adaptive program repair: Models and first results.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Automated repair of binary and assembly programs for cooperating embedded devices.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

2012
GenProg: A Generic Method for Automatic Software Repair.
IEEE Trans. Software Eng., 2012

Software Mutational Robustness: Bridging The Gap Between Mutation Testing and Evolutionary Biology
CoRR, 2012

Internet Topology over Time
CoRR, 2012

Enhancing privacy in participatory sensing applications with multidimensional data.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Beyond the blacklist: modeling malware spread and the effect of interventions.
Proceedings of the New Security Paradigms Workshop, 2012

Using dynamic analysis to discover polynomial and array invariants.
Proceedings of the 34th International Conference on Software Engineering, 2012

A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each.
Proceedings of the 34th International Conference on Software Engineering, 2012

Reconstructing Spatial Distributions from Anonymized Locations.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Representations and operators for improving evolutionary software repair.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

Evolutionary software repair.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

2011
Modeling Internet-Scale Policies for Cleaning up Malware.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Reducing energy and increasing performance with traffic optimization in many-core systems.
Proceedings of the 2011 International Workshop on System Level Interconnect Prediction, 2011

KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

The Value of Inflammatory Signals in Adaptive Immune Responses.
Proceedings of the Artificial Immune Systems - 10th International Conference, 2011

2010
Automatic program repair with evolutionary computation.
Commun. ACM, 2010

Hybrid network on chip (HNoC): local buses with a global mesh architecture.
Proceedings of the International Workshop on System Level Interconnect Prediction Workshop, 2010

Modeling NoC traffic locality and energy consumption with rent's communication probability distribution.
Proceedings of the International Workshop on System Level Interconnect Prediction Workshop, 2010

The case for software evolution.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

The case for evolvable software.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

Automated program repair through the evolution of assembly code.
Proceedings of the ASE 2010, 2010

Designing better fitness functions for automated program repair.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

2009
Negative representations of information.
Int. J. Inf. Sec., 2009

Nation-State Routing: Censorship, Wiretapping, and BGP
CoRR, 2009

Using Execution Paths to Evolve Software Patches.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Automatically finding patches using genetic programming.
Proceedings of the 31st International Conference on Software Engineering, 2009

A genetic programming approach to automated software repair.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

2008
Autonomous security for autonomous systems.
Comput. Networks, 2008

An Integrated Model of Traffic, Geography and Economy in the Internet.
Comput. Commun. Rev., 2008

The ecology of Malware.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Negative Ternary Set-Sharing.
Proceedings of the Logic Programming, 24th International Conference, 2008

The Evolution of System-Call Monitoring.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Protecting data privacy through hard-to-reverse negative databases.
Int. J. Inf. Sec., 2007

Learning DFA representations of HTTP for protecting web applications.
Comput. Networks, 2007

Anonymous Data Collection in Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

2006
On the Prediction of Java Object Lifetimes.
IEEE Trans. Computers, 2006

Modeling Somatic Evolution in Tumorigenesis.
PLoS Comput. Biol., 2006

Radial Structure of the Internet
CoRR, 2006

Simulating the Hallmarks of Cancer.
Artif. Life, 2006

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Modeling Influenza Viral Dynamics in Tissue.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

2005
Randomized instruction set emulation.
ACM Trans. Inf. Syst. Secur., 2005

On-line Negative Databases.
Int. J. Unconv. Comput., 2005

A Machine Learning Evaluation of an Artificial Immune System.
Evol. Comput., 2005

Adaptive radio: achieving consensus using negative preferences.
Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, 2005

Computation in the Wild.
Proceedings of the Internet as a Large-Scale Complex System., 2005

2004
A formal framework for positive and negative detection schemes.
IEEE Trans. Syst. Man Cybern. Part B, 2004

Technological networks and the spread of computer viruses
CoRR, 2004

Online Negative Databases.
Proceedings of the Artificial Immune Systems, Third International Conference, 2004

2003
Information Immune Systems.
Genet. Program. Evolvable Mach., 2003

The Crossover Closure and Partial Match Detection.
Proceedings of the Artificial Immune Systems, Second International Conference, 2003

Stochastic Stage-structured Modeling of the Adaptive Immune System.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003

2002
Anomaly intrusion detection in dynamic execution environments.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Coverage and Generalization in an Artificial Immune System.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

Revisiting LISYS: parameters and normal behavior.
Proceedings of the 2002 Congress on Evolutionary Computation, 2002

2001
Review of The Computational Beauty of Nature by Gary William Flake.
Artif. Intell., 2001

2000
Architecture for an Artificial Immune System.
Evol. Comput., 2000

Exploring the Relationship Between Neutral and Selective Mutations in Cancer.
Artif. Life, 2000

Automated Response Using System-Call Delay.
Proceedings of the 9th USENIX Security Symposium, 2000

1999
Detecting Intrusions using System Calls: Alternative Data Models.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

What Is a Learning Classifier System?
Proceedings of the Learning Classifier Systems, From Foundations to Applications, 1999

1998
Intrusion Detection Using Sequences of System Calls.
J. Comput. Secur., 1998

Simulated evolution of antibody gene libraries under pathogen selection.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

1997
Computer Immunology.
Commun. ACM, 1997

The Ecology of Echo.
Artif. Life, 1997

Principles of a computer immune system.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

Building Diverse Computer Systems.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

Genetic Algorithms.
Proceedings of the Computer Science and Engineering Handbook, 1997

1996
Genetic Algorithms.
ACM Comput. Surv., 1996

A Sense of Self for Unix Processes.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1995
Genetic Algorithms, Operators, and DNA Fragment Assembly.
Mach. Learn., 1995

Fitness Distance Correlation as a Measure of Problem Difficulty for Genetic Algorithms.
Proceedings of the 6th International Conference on Genetic Algorithms, 1995

The Evolution of Emergent Organization in Immune System Gene Libraries.
Proceedings of the 6th International Conference on Genetic Algorithms, 1995

1994
Genetic Algorithms and Artificial Life.
Artif. Life, 1994

Self-nonself discrimination in a computer.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

1993
What Makes a Problem Hard for a Genetic Algorithm? Some Anomalous Results and Their Explanation.
Mach. Learn., 1993

Searching for Diverse, Cooperative Populations with Genetic Algorithms.
Evol. Comput., 1993

Using Genetic Algorithms to Explore Pattern Recognition in the Immune System.
Evol. Comput., 1993

When will a Genetic Algorithm Outperform Hill Climbing.
Proceedings of the Advances in Neural Information Processing Systems 6, 1993

Genetic Algorithms for DNA Sequence Assembly.
Proceedings of the 1st International Conference on Intelligent Systems for Molecular Biology, 1993

1992
Population Diversity in an Immune System Model: Implications for Genetic Search.
Proceedings of the Second Workshop on Foundations of Genetic Algorithms. Vail, 1992

Relative Building-Block Fitness and the Building Block Hypothesis.
Proceedings of the Second Workshop on Foundations of Genetic Algorithms. Vail, 1992

1991
The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation.
Proceedings of the 4th International Conference on Genetic Algorithms, 1991

1990
Concepts, Methods, and Languages for Building Timely Intelligent Systems.
Real Time Syst., 1990

Genetic Algorithms and the Immune System.
Proceedings of the Parallel Problem Solving from Nature, 1st Workshop, 1990

1989
The Dynamical Behavior of Classifier Systems.
Proceedings of the 3rd International Conference on Genetic Algorithms, 1989

1988
Learning and Programming in Classifier Systems.
Mach. Learn., 1988

1987
Real-Time Process Management for Materials Composition in Chemical Manufacturing.
IEEE Expert, 1987

1986
The Classifier System: A Computational Model that Supports Machine Intelligence.
Proceedings of the International Conference on Parallel Processing, 1986

1985
A Study of Parallelism in the Classifier System and Its Application to Classification in Kl-One Semantic Networks (Artificial Intelligence, Fine-Grained).
PhD thesis, 1985

Implementing Semantic Network Structures Using the Classifier System.
Proceedings of the 1st International Conference on Genetic Algorithms, 1985


  Loading...