John Hurley

Learn More
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the design of AIS-based IDSs can be improved through the use of evolutionary hackers in the form of GENERTIA red teams (GRTs) to discover holes (in the form of type II errors) found in(More)
Coronary artery fistulae (CAF) are rare anomalies. They are vascular communications between the coronary arteries and other cardiac structures, either cardiac chambers or great vessels. There can be considerable variation in the course of a coronary artery fistula. We report a case of a coronary artery fistula between the left circumflex coronary artery and(More)
Data identification and classification is a key task for any Internet Service Provider (ISP) or network administrator. As port fluctuation and encryption become more common in P2P applications wishing to avoid identification, new strategies must be developed to detect and classify their flows. This article introduces a method of separating P2P and standard(More)
1. Present rationale and legislative requirement for Safety and Violence Prevention Curriculum 2. Define who should conduct the Safety and Violence Prevention Curriculum and how it should be used 3. Understand the concept of non-academic barriers to academic achievement; 4. Identify the cultural considerations indicative of student behavioral health(More)