Stephanie Forrest


Automated Software Repair and Optimization

Genetic Optimization Algorithm (GOA)
Post-compiler Software Optimization for Reducing Energy

Computer Security

Intrusion Detection System
IDS Algorithm and Data Source modules for testing IDS algorithms
Sequence-based intrusion detection (s-tide)
STIDE implements the time-delay embedding method of anomaly detection.
Process Homeostasis (pH)
pH is a Linux kernel extension which detects and exponentially slows down unusual program behavior.
Network Intrusion Detection (lisys)
Lisys monitors TCP SYN packets to detect network traffic anomalies.
RISE: Randomized Instruction Set Emulation
Implements a binary translator providing a unique and private machine instruction set for each executing program.
Negative Representations of Information

Biological Modeling

A three-dimensional, discrete-time simulator for studying intercellular interactions through extracellular molecular signals.
T Cell Simulation
Models the cytotoxic T lymphocyte (CTL) response to antigen and the maintenance of immunological memory.
Allows the user to explore the phenomenon of cancer by simulating and visualizing cell growth and genetic mutation.
Echo (inactive)
Simulation tool developed to investigate mechanisms which regulate diversity and information-processing in systems comprised of many interacting adaptive agents, or complex adaptive systems (CA

Other Software

Adaptive Radio
Using negative preferences to achieve music consensus.
Soccer Data
Dataset of human soccer play. (Tarred & gzipped, 3.8 Meg