Method, systems, and computer program products for implementing function-parallel network firewall EW Fulp, RJ Farley US Patent 8,037,517, 2011 | 273 | 2011 |
Optimization of network firewall policies using directed acyclical graphs EW Fulp Proceedings of the IEEE Internet management conference, 4, 2005 | 188 | 2005 |
Analysis of network address shuffling as a moving target defense TE Carroll, M Crouse, EW Fulp, KS Berenhaut 2014 IEEE international conference on communications (ICC), 701-706, 2014 | 133 | 2014 |
Methods, systems, and computer program products for network firewall policy optimization EW Fulp, SJ Tarsa US Patent 8,042,167, 2011 | 128 | 2011 |
Computer network with microeconomic flow control EW Fulp, M Ott, D Reininger US Patent 6,055,571, 2000 | 123 | 2000 |
Predicting Computer System Failures Using Support Vector Machines. EW Fulp, GA Fink, JN Haack WASL 8, 5-5, 2008 | 121 | 2008 |
Preventing denial of service attacks on quality of service E Fulp, Z Fu, DS Reeves, SF Wu, X Zhang Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 91 | 2001 |
An independent function-parallel firewall architecture for high-speed networks (short paper) EW Fulp Information and Communications Security: 8th International Conference, ICICS …, 2006 | 85 | 2006 |
Network firewall policy tries E Fulp, SJ Tarsa Technical Report, Computer Science Department, Wake Forest University, 2004 | 75 | 2004 |
Paying for QoS: an optimal distributed algorithm for pricing network resources EW Fulp, M Ott, D Reininger, DS Reeves 1998 Sixth International Workshop on Quality of Service (IWQoS'98)(Cat. No …, 1998 | 74 | 1998 |
Evolutionary based moving target cyber defense DJ John, RW Smith, WH Turkett, DA Cañas, EW Fulp Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014 | 63 | 2014 |
Probabilistic performance analysis of moving target and deception reconnaissance defenses M Crouse, B Prosser, EW Fulp Proceedings of the Second ACM Workshop on Moving Target Defense, 21-29, 2015 | 60 | 2015 |
Bandwidth provisioning and pricing for networks with multiple classes of service EW Fulp, DS Reeves Computer Networks 46 (1), 41-52, 2004 | 56 | 2004 |
A moving target environment for computer configurations using genetic algorithms M Crouse, EW Fulp 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-7, 2011 | 52 | 2011 |
Defense on the move: ant-based cyber defense GA Fink, JN Haack, AD McKinnon, EW Fulp IEEE Security & Privacy 12 (2), 36-43, 2014 | 47 | 2014 |
A taxonomy of parallel techniques for intrusion detection P Wheeler, E Fulp Proceedings of the 45th annual southeast regional conference, 278-282, 2007 | 44 | 2007 |
Towards optimal firewall rule ordering utilizing directed acyclical graphs A Tapdiya, EW Fulp 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 43 | 2009 |
Ant-based cyber security JN Haack, GA Fink, WM Maiden, AD McKinnon, SJ Templeton, EW Fulp 2011 Eighth International Conference on Information Technology: New …, 2011 | 42 | 2011 |
On-line dynamic bandwidth allocation EW Fulp, DS Reeves Proceedings 1997 International Conference on Network Protocols, 134-141, 1997 | 38 | 1997 |
An initial framework for evolving computer configurations as a moving target defense B Lucas, EW Fulp, DJ John, D Canas Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 35 | 2014 |