174 results on '"W. Fulp"'
Search Results
2. Using Diversity to Evolve More Secure and Efficient Virtual Local Area Networks.
3. Budgeted Classification with Rejection: An Evolutionary Method with Multiple Objectives.
4. An Efficient Multi-Stage Approach for Identifying Domain Shadowing.
5. A Distributed Population Management Approach for Mobile Agent Systems.
6. Cluster Analysis of Passive DNS Features for Identifying Domain Shadowing Infrastructure.
7. Using Execution Profiles to Identify Process Behavior Classes.
8. Using evolutionary algorithms and pareto ranking to identify secure virtual local area networks.
9. An evolutionary approach for constructing multi-stage classifiers.
10. Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters.
11. Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments.
12. Evolutionary Optimization of High-Coverage Budgeted Classifiers.
13. Using Evolutionary Diversity to Identify Problematic Software Parameters.
14. Evolutionary Approaches for Resilient Surveillance Management.
15. Using Probability Densities to Evolve more Secure Software Configurations.
16. An Evolutionary Strategy for Resilient Cyber Defense.
17. Engaging Non-Traditional Students in Computer Science through Socially-Inspired Learning and Sustained Mentoring.
18. Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses.
19. Using Set-Based Heading to Improve Mobile Agent Movement.
20. Analysis of network address shuffling as a moving target defense.
21. An initial framework for evolving computer configurations as a moving target defense.
22. Evolutionary based moving target cyber defense.
23. Bio-inspired cyber security for smart grid deployments.
24. Ant-Based Cyber Security.
25. A Biologically Modeled Intrusion Detection System for Mobile Networks.
26. Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs.
27. Defense on the Move: Ant-Based Cyber Defense.
28. Policy Distribution Methods for Function Parallel Firewalls.
29. In-the-Dark Network Traffic Classification Using Support Vector Machines.
30. A taxonomy of parallel techniques for intrusion detection.
31. Effects of Processing Delay on Function-Parallel Firewalls.
32. Balancing Trie-Based Policy Representations for Network Firewalls.
33. A Function-Parallel Architecture for High-Speed Firewalls.
34. An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper).
35. Malware Defense Using Network Security Authentication.
36. Trie-Based Policy Representations for Network Firewalls.
37. The Economic Impact of Network Pricing Intervals.
38. Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets.
39. Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion.
40. QoS Rewards and Risks: A Multi-market Approach to Resource Allocation.
41. Distributed Network Flow Control based on Dynamic Competitive Markets.
42. On-line Dynamic Bandwidth Allocation.
43. Bandwidth provisioning and pricing for networks with multiple classes of service.
44. A moving target environment for computer configurations using Genetic Algorithms.
45. Bio-inspired cyber security for communications and networking.
46. IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid.
47. Using Syslog Message Sequences for Predicting Disk Failures.
48. Predicting Computer System Failures Using Support Vector Machines.
49. Parallel Firewall Designs for High-Speed Networks.
50. Bio-Inspired Enterprise Security.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.