2003 |
9 | EE | Kevin P. Anchor,
Jesse B. Zydallis,
Gregg H. Gunsch,
Gary B. Lamont:
Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks.
EMO 2003: 707-721 |
8 | EE | David P. Biros,
Gregory Fields,
Gregg H. Gunsch:
The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment.
HICSS 2003: 62 |
7 | EE | Jacob T. Jackson,
Gregg H. Gunsch,
Roger L. Claypoole Jr.,
Gary B. Lamont:
Novel steganography detection using an artificial immune system approach.
IEEE Congress on Evolutionary Computation (1) 2003: 139-145 |
6 | | Jacob T. Jackson,
Gregg H. Gunsch,
Roger L. Claypoole Jr.,
Gary B. Lamont:
Wavelet-based steganalysis using a computational immune system approach.
VCIP 2003: 1884-1894 |
5 | EE | Jacob T. Jackson,
Gregg H. Gunsch,
Gary B. Lamont,
Roger L. Claypoole Jr.:
Blind Stenanography Detection Using a Computational Immune System: A Work in Progress.
IJDE 1(4): (2003) |
2002 |
4 | | Paul K. Harmer,
Paul D. Williams,
Gregg H. Gunsch,
Gary B. Lamont:
An artificial immune system architecture for computer security applications.
IEEE Trans. Evolutionary Computation 6(3): 252-280 (2002) |
3 | EE | Mark Reith,
Clint Carr,
Gregg H. Gunsch:
An Examination of Digital Forensic Models.
IJDE 1(3): (2002) |
2001 |
2 | EE | Paul D. Williams,
Kevin P. Anchor,
John L. Bebo,
Gregg H. Gunsch,
Gary B. Lamont:
CDIS: Towards a Computer Immune System for Detecting Network Intrusions.
Recent Advances in Intrusion Detection 2001: 117-133 |
1991 |
1 | | Gregg H. Gunsch,
Larry A. Rendell:
Opportunistic Constructive Induction.
ML 1991: 147-152 |