Christina Warrender

Learn More
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable— sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several different programs, we compare the ability of different data(More)
Infection with Mycobacterium tuberculosis (Mtb) is characterized by localized, roughly spherical lesions within which the pathogen interacts with host cells. Containment of the infection or progression of disease depends on the behavior of individual cells, which, in turn, depends on the local molecular environment and on contact with neighboring cells.(More)
In this paper, we use both mathematical modeling and simulation to explore homeostasis of peripheral immune system effector cells, particularly alveolar macrophages. Our interest is in the distributed control mechanisms that allow such a population to maintain itself. We introduce a multi-purpose simulator designed to study individual cell responses to(More)
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable— sequences of system calls into the kernel of an operating system. Using system-call data sets generated by several different programs, we compare the ability of different data(More)
The exponential increase in available neural data has combined with the exponential growth in computing ("Moore's law") to create new opportunities to understand neural systems at large scale and high detail. The ability to produce large and sophisticated simulations has introduced unique challenges to neuroscientists. Computational models in neuroscience(More)