Articles and Interviews

Meet the Scientist: Dr Sunny Fugate, Armed with Science Blog, July 2014.

We really do live in an era where we need everyday cyber weapons, like the small arms that you might carry to a frontier. Currently, our everyday cyber weapons are not very sophisticated and they are not very intuitive. You kind of have to be the hacker type to understand most of them. We all have one weapon that we can always use, but it is like the nuclear option. I can always just turn off my computer or unplug it from the network, but this is unacceptable. We can do better.”

Hand Signals, CHIPS Magazine, Patric Petrie and Sunny Fugate, July 2014.

In the future, the eGlove technology may be used by Navy divers, NASA astronauts, firefighters, or police for computer control while driving, or even providing intuitive control of autonomous vehicles such as ground robotics or unmanned aerial vehicles, all using simple hand-gestures.


Cyber Warfare and Cyber Defense

  • Artificial Ingelligence and Game Theory Models for Defending Critical Networks with Cyber Deception. Fugate, S., Ferguson-Walter, K. (2019). AI Magazine 40(1), 49-62. [Download PDF]
  • Game theory for adaptive defensive cyber deception. Fugate, S., Ferguson-Walter, K., Mauger, J., and Major, M. (2018). Technical report.
  • Removing the kitchen sink from software. Landsborough, J., Harding, S., and Fugate, S. (2015). In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, pages 833--838. ACM.
  • The human factors of cyber network defense. Gutzwiller, R. S., Fugate, S., Sawyer, B. D., and Hancock, P. (2015). In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 59, pages 322--326. SAGE Publications.
  • Learning from super-mutants: searching post-apocalyptic software ecosystems for novel semantics-preserving transforms. Landsborough, J., Harding, S., and Fugate, S. (2017). In Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 1529--1536. ACM.
  • Using prediction to improve network intrusion detection performance. Fugate, S. J. (2011). In 7th Student Conference, page 65.
  • Methods for speculatively bootstrapping better intrusion detection system performance. Fugate, S. (2012). Dissertation.
  • These go to eleven: Cranking up the knobs on ids scaling performance. Fugate, S. J. (2012). In 8th Student Conference, page 120.

Human-Machine Interfaces

  • Gesture-directed sensor-information fusion for protection and communication in hazardous environments. Ceruti, M. G., Ellen, J., Rogers, G., Fugate, S., Tran, N., Phan, H., Garcia, D., Berg, B., Medina, E., and Duffy, L. (2009). Technical report.
  • Application of maya hieroglyphic principles to military symbology and communication. Ceruti, M. G., Fugate, S., Ellen, J., Medina, E., Duffy, L., and Dinh, V. V. (2008). In Proceedings of the 2nd Annual Visual and Iconic Language Conference, pages 7--13.
  • Wireless communication glove apparatus for motion tracking, gesture recognition, data transmission, and reception in extreme environments.Ceruti, M. G., Dinh, V. V., Tran, N. X., Van Phan, H., Duffy, L. T., Ton, T.-A., Leonard, G., Medina, E., Amezcua, O., Fugate, S., et al. (2009). In Proceedings of the 2009 ACM symposium on Applied Computing, pages 172--176. ACM.
  • Wireless data glove for gesture-based robotic control. Tran, N. X., Phan, H., Dinh, V. V., Ellen, J., Berg, B., Lum, J., Alcantara, E., Bruch, M., Ceruti, M. G., Kao, C., et al. (2009). In International Conference on Human-Computer Interaction, pages 271--280. Springer.
  • Next generation Tactical-Situation-Assessment Technology (TSAT). Duffy, L., Wilson, E., Fugate, S., and Rogers, G.
  • Next-generation Tactical-Situation-Assessment Technology (TSAT): Chat. Medina, E. W., Fugate, S., Duffy, L., Magsombol, D., Amezcua, O., Rogers, G., and Ceruti, M. G. (2007). In International Conference on Web Engineering, pages 526--532. Springer.

Visual Communication

  • Rethinking cyberspace symbology. Fugate, S. J. and Gutzwiller, R. S.
  • Microformats for innovative lexicons. Fugate, S., Ellen, J., and Rubin, S. (2010). In Granular Computing (GrC), 2010 IEEE International Conference on, pages 172--177. IEEE.
  • Vischat multi-modal chat system for communication in hazardous environments. Fugate, S., Rogers, G., Ceruti, M. G., Garcia, D., Berg, B., Medina, E., Ellen, J., and Duffy, L.
  • Next-generation Tactical-Situation-Assessment Technology (TSAT): Iconic language. Fugate, S., Medina, E. W., Duffy, L., Magsombol, D., Amezcua, O., Rogers, G., and Ceruti, M. G. (2007). In Proceedings of the First Annual Visual and Iconic Language Conference, pages 1--5.

Augmented Reality

  • Proposing ambient visualization and pre-attentive processing for threat detection. Fugate, S., Lukos, J., Gutzwiller, R., and Lester, C. (2016). In Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pages 87--92. ACM. [Download PDF]
  • A GPS-based navigation system for the visually impaired. Fugate, S. and Hagan, T. (2002).


  • Ambient activity monitors for hidden computing system and process metadata. Fugate, S. J. (2016). US Patent 9,229,619.
  • Augmented reality cross-domain solution for physically disconnected security domains.Fugate, S. J., Peng, C.C., and Grady, D. C. (2017). US Patent 9,804,813.
  • Active capacitive control stylus. Tran, N. X., Phan, H. V., Fugate, S. J., and Bruch, M. H. (2014). US Patent 8,648,837.
  • RFID system for gesture recognition, information coding, and processing. Tran, N., Fugate, S., Ellen, J., Duffy, L., and Phan, H. (2012). US Patent 8,279,091.
  • Hall-effect sensor system for gesture recognition, information coding, and processing. Tran, N., Fugate, S., Ceruti, M., Duffy, L., and Phan, H. (2013). US Patent 8,421,448.

Patents Pending

  • Computer system anomaly detection using human responses to ambient representations of hidden computing system and process metadata. Fugate, S. J., Lukos, J. R., Gutzwiller, R. S., and Wiegand, K. P. (2016b). US Patent App. 14/976,225.