Tuesday, February 14, 2012

Genetics inspire cyber-security research at Wake Forest

The fight against computer viruses and other threats is taking a new direction at Wake Forest University.

Erinn Fulp and Michael Crouse are fighting the continual evolution of viruses, worms and malware with evolution. Together, they are developing the first-ever automated computer configurations that adjust as quickly as the threats.

Fulp is associate professor of computer science and Crouse is a computer science graduate student who was recently named one of the "nation's top new inventors" by Inventor's Digest magazine.

In refining a genetically inspired algorithm that proactively discovers more secure computer configurations, they are leveraging the concept of “survival of the fittest.”

See more.

14 comments:

  1. It may provide a organic bouncy appear and it is free of just about all unwanted effects. The majority of the brazilian hair sale can result in just about all kind of unwanted effects such as irritation along with other hair difficulties, however weaving associated with B razil locks doesn't trigger any type of hair difficulties or even don't leads to any type of irritation difficulties. They may be very easily fused and trigger any sort of brazilian hair uk. You are able to utilize just about all type of colours as well as tones based on the most recent pattern.

    ReplyDelete
  2. also we will take care of you immediately. Awaiting you online. tubidy mobile install musics, video clips as well as video games for free.

    ReplyDelete
  3. Be that as it may, the choices of the Tribunal can be challenged by the High Court. The Information Technology Act not just applies to the offense submitted in India, yet it can likewise be accustomed to convey guilty parties from outside nations to India for preliminary.veriato 360 pricing

    ReplyDelete
  4. Notwithstanding, battery-powered packs help to hold the expense down. As I would like to think, the advantages of the extensibility and convenience offered by remote home surveillance cameras far exceed the minor burden of sporadically changing the batteries. https://www.bestsecurityplace.com/

    ReplyDelete
  5. Moreover, such courses of action can exploit the time contrasts with the goal that critical ventures can be dealt with about nonstop. privacidadenlared

    ReplyDelete
  6. In basic terms, a Complex framework is any framework in which the pieces of the framework and their collaborations together speak to a particular conduct, with the end goal that an examination of all its constituent parts can't clarify the conduct. trust ecommerce

    ReplyDelete
  7. Southern New Hampshire University has a Bachelor of Science Degree in Information Technologies Cyber Security. cyber security training in hyderabad

    ReplyDelete
  8. By integrating your internal CRM with your event software you are able to manage customer/delegate data more efficiently. Internet of things tech events

    ReplyDelete
  9. I am jovial you take pride in what you write. It makes you stand way out from many other writers that can not push high-quality content like you. expert secrets Russell Brunson

    ReplyDelete
  10. Wow, What an Outstanding post. I found this too much informatics. It is what I was seeking for. I would like to recommend you that please keep sharing such type of info.If possible, Thanks. creare sito web

    ReplyDelete
  11. When you begin your career track with a CCNA training video the possibilities are endless since Cisco offers are wide array of certifications that the technician can achieve. CCNA Training in Pune

    ReplyDelete
  12. This one is a highly intriguing and timely post. I really appreciate the period of time you spent writing this. You must have done a lot of research and extraction to create your piece. The instructional examples and facts are extremely useful. keep sharing.
    Leesburg Divorce Lawyer
    protective order in virginia
    average cost of uncontested divorce in virginia

    ReplyDelete