Learn More
A Moving Target (MT) defense constantly changes a system's attack surface, in an attempt to limit the usefulness of the reconnaissance the attacker has collected. One approach to this defense strategy is to intermittently change a system's configuration. These changes must maintain functionality and security, while also being diverse. Finding suitable(More)
This paper describes an architecture for enabling robust autonomous decision making and task execution. A key feature of the architecture is that agent behavior is constrained by sets of agent societal laws similar to Asimov's laws of robotics. In accordance with embedded philosophical principles, agents use decision theory in their negotiations to evaluate(More)
This work addresses the problem of in-the-dark traffic classification for TCP sessions, an important problem in network management. An innovative use of support vector machines (SVMs) with a spectrum representation of packet flows is demonstrated to provide a highly accurate, fast, and robust method for classifying common application protocols. The use of a(More)
MOTIVATION In the event of an outbreak of a disease caused by an initially unknown pathogen, the ability to characterize anonymous sequences prior to isolation and culturing of the pathogen will be helpful. We show that it is possible to classify viral sequences by genome type (dsDNA, ssDNA, ssRNA positive strand, ssRNA negative strand, retroid) using amino(More)
This paper describes a new program for attracting non-traditional students into computer science and retaining them through sustained peer and faculty mentoring. The program is centered on socially-inspired learning, - learning <i>in</i> and <i>for</i> a community. It consists of a STEM Incubator course, hands-on projects with real-world applications, a(More)
Reconstructing networks from time series data is a difficult inverse problem. We apply two methods to this problem using co-temporal functions. Co-temporal functions capture mathematical invariants over time series data. Two modeling techniques for co-temporal networks, one based on algebraic techniques and the other on Bayesian inference, are compared and(More)
The advent and ubiquity of mass-market portable computational devices has opened up new opportunities for the development of assistive technologies for disabilities, especially within the domain of augmentative and alternative communications (AAC) devices. Word prediction can facilitate everyday communication on mobile devices by reducing the physical(More)
This paper describes the development of a STEM Incubator program to engage students in hand-on, relevant projects that draw student interest toward computer science and other STEM fields. The program is implemented via one-credit courses allowing students to collaborate on projects in various areas (such as digital sound and music, 3D design, robotics,(More)