writing

Publications

Cyber Warfare and Cyber Defense

  • Game theory for adaptive defensive cyber deception. Fugate, S., Ferguson-Walter, K., Mauger, J., and Major, M. (2018). Technical report.
  • Removing the kitchen sink from software. Landsborough, J., Harding, S., and Fugate, S. (2015). In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, pages 833--838. ACM.
  • The human factors of cyber network defense. Gutzwiller, R. S., Fugate, S., Sawyer, B. D., and Hancock, P. (2015). In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 59, pages 322--326. SAGE Publications.
  • Learning from super-mutants: searching post-apocalyptic software ecosystems for novel semantics-preserving transforms. Landsborough, J., Harding, S., and Fugate, S. (2017). In Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 1529--1536. ACM.
  • Using prediction to improve network intrusion detection performance. Fugate, S. J. (2011). In 7th Student Conference, page 65.
  • Methods for speculatively bootstrapping better intrusion detection system performance. Fugate, S. (2012). Dissertation.
  • These go to eleven: Cranking up the knobs on ids scaling performance. Fugate, S. J. (2012). In 8th Student Conference, page 120.


Human-Machine Interfaces

  • Gesture-directed sensor-information fusion for protection and communication in hazardous environments. Ceruti, M. G., Ellen, J., Rogers, G., Fugate, S., Tran, N., Phan, H., Garcia, D., Berg, B., Medina, E., and Duffy, L. (2009). Technical report.
  • Application of maya hieroglyphic principles to military symbology and communication. Ceruti, M. G., Fugate, S., Ellen, J., Medina, E., Duffy, L., and Dinh, V. V. (2008). In Proceedings of the 2nd Annual Visual and Iconic Language Conference, pages 7--13.
  • Wireless communication glove apparatus for motion tracking, gesture recognition, data transmission, and reception in extreme environments.Ceruti, M. G., Dinh, V. V., Tran, N. X., Van Phan, H., Duffy, L. T., Ton, T.-A., Leonard, G., Medina, E., Amezcua, O., Fugate, S., et al. (2009). In Proceedings of the 2009 ACM symposium on Applied Computing, pages 172--176. ACM.
  • Wireless data glove for gesture-based robotic control. Tran, N. X., Phan, H., Dinh, V. V., Ellen, J., Berg, B., Lum, J., Alcantara, E., Bruch, M., Ceruti, M. G., Kao, C., et al. (2009). In International Conference on Human-Computer Interaction, pages 271--280. Springer.
  • Next generation Tactical-Situation-Assessment Technology (TSAT). Duffy, L., Wilson, E., Fugate, S., and Rogers, G.
  • Next-generation Tactical-Situation-Assessment Technology (TSAT): Chat. Medina, E. W., Fugate, S., Duffy, L., Magsombol, D., Amezcua, O., Rogers, G., and Ceruti, M. G. (2007). In International Conference on Web Engineering, pages 526--532. Springer.


Visual Communication

  • Rethinking cyberspace symbology. Fugate, S. J. and Gutzwiller, R. S.
  • Microformats for innovative lexicons. Fugate, S., Ellen, J., and Rubin, S. (2010). In Granular Computing (GrC), 2010 IEEE International Conference on, pages 172--177. IEEE.
  • Vischat multi-modal chat system for communication in hazardous environments. Fugate, S., Rogers, G., Ceruti, M. G., Garcia, D., Berg, B., Medina, E., Ellen, J., and Duffy, L.
  • Next-generation Tactical-Situation-Assessment Technology (TSAT): Iconic language. Fugate, S., Medina, E. W., Duffy, L., Magsombol, D., Amezcua, O., Rogers, G., and Ceruti, M. G. (2007). In Proceedings of the First Annual Visual and Iconic Language Conference, pages 1--5.


Augmented Reality

  • Proposing ambient visualization and pre-attentive processing for threat detection. Fugate, S., Lukos, J., Gutzwiller, R., and Lester, C. (2016a). In Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pages 87--92. ACM.
  • A GPS-based navigation system for the visually impaired. Fugate, S. and Hagan, T. (2002).

Patents

  • Ambient activity monitors for hidden computing system and process metadata. Fugate, S. J. (2016). US Patent 9,229,619.
  • Augmented reality cross-domain solution for physically disconnected security domains.Fugate, S. J., Peng, C.C., and Grady, D. C. (2017). US Patent 9,804,813.
  • Active capacitive control stylus. Tran, N. X., Phan, H. V., Fugate, S. J., and Bruch, M. H. (2014). US Patent 8,648,837.
  • RFID system for gesture recognition, information coding, and processing. Tran, N., Fugate, S., Ellen, J., Duffy, L., and Phan, H. (2012). US Patent 8,279,091.
  • Hall-effect sensor system for gesture recognition, information coding, and processing. Tran, N., Fugate, S., Ceruti, M., Duffy, L., and Phan, H. (2013). US Patent 8,421,448.

Patents Pending

  • Computer system anomaly detection using human responses to ambient representations of hidden computing system and process metadata. Fugate, S. J., Lukos, J. R., Gutzwiller, R. S., and Wiegand, K. P. (2016b). US Patent App. 14/976,225.

Articles