Stephanie Forrest
#12,736
Most Influential Person Now
American computer scientist
Stephanie Forrest's AcademicInfluence.com Rankings
Stephanie Forrestcomputer-science Degrees
Computer Science
#810
World Rank
#838
Historical Rank
#440
USA Rank
Artificial Intelligence
#172
World Rank
#176
Historical Rank
#76
USA Rank
Database
#1504
World Rank
#1579
Historical Rank
#392
USA Rank
Download Badge
Computer Science
Stephanie Forrest's Degrees
- Bachelors Computer Science University of South Carolina
Similar Degrees You Can Earn
Why Is Stephanie Forrest Influential?
(Suggest an Edit or Addition)According to Wikipedia, Stephanie Forrest is an American computer scientist and director of the Biodesign Center for Biocomputing, Security and Society at the Biodesign Institute at Arizona State University. She was previously Distinguished Professor of Computer Science at the University of New Mexico in Albuquerque. She is best known for her work in adaptive systems, including genetic algorithms, computational immunology, biological modeling, automated software repair, and computer security.
Stephanie Forrest's Published Works
Published Works
- A sense of self for Unix processes (1996) (2097)
- Self-nonself discrimination in a computer (1994) (1920)
- Intrusion Detection Using Sequences of System Calls (1998) (1430)
- Detecting intrusions using system calls: alternative data models (1999) (1265)
- Computer immunology (1997) (1032)
- Architecture for an Artificial Immune System (2000) (948)
- Genetic algorithms: principles of natural selection applied to computation. (1993) (884)
- GenProg: A Generic Method for Automatic Software Repair (2012) (861)
- Fitness Distance Correlation as a Measure of Problem Difficulty for Genetic Algorithms (1995) (827)
- Email networks and the spread of computer viruses. (2002) (778)
- Automatically finding patches using genetic programming (2009) (602)
- The royal road for genetic algorithms: Fitness landscapes and GA performance (1991) (600)
- Building diverse computer systems (1997) (579)
- A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each (2012) (574)
- Relative Building-Block Fitness and the Building Block Hypothesis (1992) (467)
- An immunological approach to change detection: algorithms, analysis and implications (1996) (440)
- When will a Genetic Algorithm Outperform Hill Climbing (1993) (433)
- Immunity by design: an artificial immune system (1999) (388)
- Variable efficacy of repeated annual influenza vaccination. (1999) (365)
- Principles of a computer immune system (1998) (339)
- Novelty detection in time series data using ideas from immunology (1996) (319)
- Searching for Diverse, Cooperative Populations with Genetic Algorithms (1993) (311)
- An immunological model of distributed detection and its application to computer security (1999) (304)
- Using Genetic Algorithms to Explore Pattern Recognition in the Immune System (1993) (293)
- Automated response using system-call delays (2000) (292)
- Emergent computation: self-organizing, collective, and cooperative phenomena in natural and artificial computing networks (1990) (288)
- Technological Networks and the Spread of Computer Viruses (2004) (270)
- Leveraging program equivalence for adaptive program repair: Models and first results (2013) (258)
- Emergent computation (1991) (243)
- The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs (2015) (235)
- A genetic programming approach to automated software repair (2009) (234)
- Genetic Algorithms and Artificial Life (1994) (232)
- A formal framework for positive and negative detection schemes (2004) (222)
- Pretty Good BGP: Improving BGP by Cautiously Adopting Routes (2006) (197)
- Proceedings of the 5th International Conference on Genetic Algorithms (1993) (195)
- The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities (2018) (191)
- Automatic program repair with evolutionary computation (2010) (188)
- Current challenges in automatic software repair (2013) (181)
- Randomized instruction set emulation (2005) (179)
- Hype and Heavy Tails: A Closer Look at Data Breaches (2016) (173)
- Coverage and Generalization in an Artificial Immune System (2002) (167)
- What Makes a Problem Hard for a Genetic Algorithm? Some Anomalous Results and Their Explanation (2004) (157)
- What Is a Learning Classifier System? (1999) (145)
- The Evolution of System-Call Monitoring (2008) (131)
- Parallel Problem Solving from Nature - PPSN XII (2012) (126)
- KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks (2011) (120)
- The Ecology of Echo (1997) (118)
- The Evolution of Emergent Organization in Immune System Gene Libraries (1995) (114)
- Immunology as Information Processing (2001) (113)
- A stochastic model of cytotoxic T cell responses. (2004) (112)
- Learning DFA representations of HTTP for protecting web applications (2007) (110)
- Adaptive radio: achieving consensus using negative preferences (2005) (110)
- Revisiting LISYS: parameters and normal behavior (2002) (109)
- Modeling Somatic Evolution in Tumorigenesis (2006) (106)
- Genetic algorithms, operators, and DNA fragment assembly (1995) (103)
- Simulating the Hallmarks of Cancer (2006) (100)
- Genetic Algorithms and the Immune System (1990) (99)
- Post-compiler software optimization for reducing energy (2014) (98)
- Modeling Complex Adaptive Systems with Echo (1994) (96)
- Operating system stability and security through process homeostasis (2002) (94)
- Software mutational robustness (2012) (88)
- Genetic algorithms (1996) (88)
- Cancer prevention strategies that address the evolutionary dynamics of neoplastic cells: simulating benign cell boosters and selection for chemosensitivity. (2004) (87)
- Autonomous security for autonomous systems (2008) (83)
- Automated program repair through the evolution of assembly code (2010) (82)
- Population Diversity in an Immune System Model: Implications for Genetic Search (1992) (82)
- Finite Markov Chain Analysis of Genetic Algorithms with Niching (1993) (82)
- Using dynamic analysis to discover polynomial and array invariants (2012) (81)
- Anonymous Data Collection in Sensor Networks (2007) (80)
- Deriving shape space parameters from immunological data. (1997) (78)
- Representations and operators for improving evolutionary software repair (2012) (77)
- Protecting data privacy through hard-to-reverse negative databases (2006) (75)
- The Baldwin effect in the immune system: learning by somatic hypermutation (1996) (74)
- Enhancing privacy in participatory sensing applications with multidimensional data (2012) (73)
- Information Immune Systems (2003) (73)
- What makes a problem hard for a genetic algorithm? Some anomalous results and their explanation (1993) (72)
- Designing better fitness functions for automated program repair (2010) (72)
- Reconstructing gene networks from large scale gene expression data (2000) (69)
- Higher Level of Replication Efficiency of 2009 (H1N1) Pandemic Influenza Virus than Those of Seasonal and Avian Strains: Kinetics from Epithelial Cell Culture and Computational Modeling (2010) (66)
- Automated repair of binary and assembly programs for cooperating embedded devices (2013) (64)
- A Machine Learning Evaluation of an Artificial Immune System (2005) (64)
- Negative representations of information (2009) (63)
- Tool Breakage Detection in Milling Operations using a Negative-Selection Algorithm (1995) (61)
- A History and Survey of Network Firewalls (2014) (57)
- Real-Time Process Management for Materials Composition in Chemical Manufacturing (1987) (53)
- Enhancing Privacy through Negative Representations of Data (2004) (50)
- Genetic Algorithms for DNA Sequence Assembly (1993) (50)
- Online Negative Databases (2004) (49)
- Nation-State Routing: Censorship, Wiretapping, and BGP (2009) (48)
- How the immune system generates diversity: pathogen space coverage with random and evolved antibody libraries (1999) (46)
- Modeling Intercellular Interactions in Early Mycobacterium Infection (2006) (45)
- An Anomaly Entection Algorithm Inspired by the Immune Syste (1999) (45)
- Evolution and somatic learning in V-region genes. (1996) (45)
- Parallelism and programming in classifier systems (1990) (43)
- The Performance of Genetic Algorithms on Walsh Polynomials: Some Anomalous Results and Their Explanation (1991) (42)
- Anomaly intrusion detection in dynamic execution environments (2002) (41)
- Implementing Semantic Network Structures Using the Classifier System (1985) (40)
- Antibody repertoires and pathogen recognition: the role of germline diversity and somatic hypermutation (1999) (39)
- Strategic aspects of cyberattack, attribution, and blame (2017) (39)
- Simulated evolution of antibody gene libraries under pathogen selection (1998) (38)
- Computation in the Wild (2005) (37)
- An integrated model of traffic, geography and economy in the internet (2008) (37)
- Modeling Influenza Viral Dynamics in Tissue (2006) (37)
- Automated Response Using System-Call Delay (2000) (36)
- Emergent behavior in classifier systems (1990) (35)
- Liquid brains, solid brains (2019) (34)
- Using dynamic analysis to generate disjunctive invariants (2014) (33)
- Using lazy evaluation to simulate realistic-size repertoires in models of the immune system (1997) (32)
- DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants (2014) (32)
- A biological perspective on evolutionary computation (2021) (32)
- Exploring the Relationship between Neutral and Selective Mutations in Cancer (2000) (32)
- On-line Negative Databases (2005) (32)
- Stochastic stage-structured modeling of the adaptive immune system (2003) (31)
- Use of a Genetic Algorithm to Analyze Robust Stability Problems (1991) (30)
- Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software Repair (2015) (29)
- Engineering an Immune System 1 (2001) (29)
- The effects of thymic selection on the range of T cell cross‐reactivity (2005) (28)
- Genetic Algorithms and Heuristic Search (1995) (28)
- On the prediction of Java object lifetimes (2006) (28)
- A spatial model of the efficiency of T cell search in the influenza-infected lung. (2016) (28)
- Modeling NoC traffic locality and energy consumption with rent's communication probability distribution (2010) (28)
- CHAPTER THIRTY-FOUR – Stochastic Optimization Tools for Genomic Sequence Assembly (1994) (26)
- Hybrid network on chip (HNoC): local buses with a global mesh architecture (2010) (25)
- A Relational Algebra for Negative Databases (2007) (25)
- Preventing extreme polarization of political attitudes (2021) (25)
- Using Execution Paths to Evolve Software Patches (2009) (25)
- An Introduction to SFI Echo (1993) (24)
- Reconstructing Spatial Distributions from Anonymized Locations (2012) (24)
- Modeling intercellular interactions in the peripheral immune system (2004) (22)
- Internet Topology over Time (2012) (22)
- The ecology of Malware (2009) (22)
- The Crossover Closure and Partial Match Detection (2003) (22)
- A Change-Detection Algorithm Inspired by the Immune System (1995) (21)
- Modeling Internet-Scale Policies for Cleaning up Malware (2012) (21)
- A Distributed Approach to Anomaly Detection (1998) (21)
- Dynamics, emergent computation, and evolution in cellular automata (1999) (20)
- The Evolution of Secondary Organization in Immune System Gene Libraries (1993) (20)
- Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery (2016) (19)
- Neutrality and epistasis in program space (2018) (19)
- The Value of Inflammatory Signals in Adaptive Immune Responses (2011) (18)
- Beyond the blacklist: modeling malware spread and the effect of interventions (2012) (18)
- Genetic Algorithms and Artiicial Life (1993) (18)
- Generating biomorphs with an aesthetic immune system (2002) (18)
- Scaling theory for information networks (2008) (17)
- Moving Target Defenses in the Helix Self-Regenerative Architecture (2013) (17)
- A Study of Parallelism in the Classifier System and Its Application to Classification in Kl-One Semantic Networks (Artificial Intelligence, Fine-Grained) (1985) (16)
- Connecting Program Synthesis and Reachability: Automatic Program Repair Using Test-Input Generation (2017) (15)
- Application and analysis of multidimensional negative surveys in participatory sensing applications (2013) (15)
- The Dynamical Behavior of Classifier Systems (1989) (15)
- Modeling the effects of updating the influenza vaccine on the efficacy of repeated vaccination (2000) (14)
- Distributed Adaptive Search in T Cells: Lessons From Ants (2019) (14)
- Radial structure of the Internet (2006) (14)
- John Holland’s Invisible Hand: An Artificial Immune System (1999) (14)
- Detector coverage under the r-contiguous bits matching rule (2002) (14)
- Automatically Exploring Tradeoffs Between Software Output Fidelity and Energy Costs (2019) (13)
- Understanding Automatically-Generated Patches Through Symbolic Invariant Differences (2019) (12)
- Energy and time determine scaling in biological and computer designs (2016) (12)
- How does mobility help distributed systems compute? (2019) (12)
- Computation and the immune system (1992) (12)
- Immunizing Computer Networks : Getting All the Machines in Your Network to Fight the Hacker Disease (1998) (12)
- Modeling the effects of prior infection on vaccine efficacy (1997) (12)
- Learning and programming in classifier systems (1988) (11)
- Adaptive computation (2016) (11)
- Risky Business: Assessing Security with External Measurements (2019) (11)
- Anomaly detection in dynamic execution environments (2005) (11)
- Object Lifetime Prediction in Java (2003) (10)
- Homeostasis of peripheral immune effectors (2004) (10)
- Modelling the impact of antigen kinetics on T‐cell activation and response (2004) (9)
- The Classifier System: A Computational Model that Supports Machine Intelligence (1986) (9)
- Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls (2015) (9)
- Spatially distributed infection increases viral load in a computational model of SARS-CoV-2 lung infection (2021) (9)
- The case for software evolution (2010) (8)
- Concepts, methods, and languages for building timely intelligent systems (1990) (8)
- Using genetic algorithms for controller design - Simultaneous stabilization and eigenvalue placement in a region (1992) (8)
- GEVO: GPU Code Optimization using Evolutionary Computation (2020) (8)
- Borders and gateways: measuring and analyzing national as chokepoints (2019) (8)
- Volatility and spatial distribution of resources determine ant foraging strategies (2015) (7)
- Architecture for an Arti cial Immune System (2001) (7)
- Automatically evolving a general controller for robot swarms (2017) (7)
- Deriving Shape Space Parameters from Immunological Data for a Model of Cross-Reactive Memory (1997) (7)
- Trusted Software Repair for System Resiliency (2016) (7)
- Energy consumption in networks on chip: efficiency and scaling (2012) (7)
- A dual assortative measure of community structure (2008) (7)
- Genetic Improvement of GPU Code (2019) (7)
- Lightweight Intrusion Detection for Networked Operating Systems (1998) (6)
- Negative Ternary Set-Sharing (2008) (6)
- Proceedings of the Fifth International Conference on Genetic Algorithms : University of Illinois at Urbana-Champaign, July 17-21, 1993 (1993) (6)
- Adaptive Computation : The Multidisciplinary Legacy of (2018) (6)
- MIMOSA: Reducing Malware Analysis Overhead with Coverings (2021) (6)
- Clarifications on the Construction and Use of the ManyBugs Benchmark (2017) (6)
- The Evolution of Cooperation in Immune System Gene Libraries (5)
- Automated methods for creating diversity in computer systems (2005) (5)
- Software Mutational Robustness: Bridging The Gap Between Mutation Testing and Evolutionary Biology (2012) (5)
- Defeating Denial-of-Service Attacks in a Self-Managing N-Variant System (2019) (4)
- GEVO-ML: a proposal for optimizing ML code with evolutionary computation (2020) (4)
- Fundamental Concepts of Evolutionary Computation (1997) (4)
- Applying Automated Program Repair to Dataflow Programming Languages (2021) (4)
- Phosphorylations of Serines 21/9 in Glycogen Synthase Kinase 3α/β Are Not Required for Cell Lineage Commitment or WNT Signaling in the Normal Mouse Intestine (2016) (4)
- Protecting BGP from Invalid Paths (2007) (4)
- Beyond Biology (2012) (3)
- Evolutionary Computation for Improving Malware Analysis (2019) (3)
- The Challenges of Sensing and Repairing Software Defects in Autonomous Systems (2014) (3)
- Modeling the cytotoxic t cell response (2004) (3)
- Uncovering Performance Opportunities by Relaxing Program Semantics of GPGPU Kernels (2019) (3)
- Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation (2022) (3)
- Increasing Communications Security through Protocol Parameter Diversity ∗ (3)
- Modeling the role of neutral and selective mutations in cancer (2000) (3)
- Reducing energy and increasing performance with traffic optimization in many-core systems (2011) (3)
- Genetic Algorithms, Operators, and DNA Fragment Assembly (2004) (3)
- Evolutionary software repair (2012) (2)
- Learning and Programming in Classifier Systems (2005) (2)
- Cooperative, Trusted Software Repair for Cyber Physical System Resiliency (2018) (2)
- Analysis of Results (1990) (2)
- MA-ABC: a memetic algorithm optimizing attractiveness, balance, and cost for capacitated Arc routing problems (2021) (2)
- Implications of Security Enhancements and Interventions for Core Internet Infrastructure (2014) (2)
- Negative selection based anomaly detector for multimodal health data (2017) (2)
- Cactus Environment Machine - Shared Environment Call-by-Need (2016) (2)
- 4 – Classifier Systems (1991) (2)
- ective Feedback in the Immune System y (2001) (2)
- START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report) (2022) (1)
- Back to the future: N-Versioning of Microservices (2022) (1)
- A spatial model of the ef fi ciency of T cell search in the in fl uenza-infected lung (2016) (1)
- Genetic Improvement of Software (Dagstuhl Seminar 18052) (2018) (1)
- Exploring the Relationship between Neutral andSele tive Mutations in Can erC (2000) (1)
- Emergent behaviors of classifier systems (1989) (1)
- The evolution of cooperation in immune system libraries (1992) (1)
- Simulating the Hallmarks of Cancer Robert G. Abbott (2006) (1)
- Efficient representations for set-sharing analysis (2008) (1)
- The Triton Branch Predictor (2004) (1)
- MARTINI: Memory Access Traces to Detect Attacks (2020) (1)
- Trusted and Resilient Mission Operations (2020) (1)
- Genetic algorithms for affine transformations to existential t-restrictions (2019) (1)
- The case for evolvable software (2010) (1)
- Proceedings of the ninth annual international conference of the Center for Nonlinear Studies on Self-organizing, Collective, and Cooperative Phenomena in Natural and Artificial Computing Networks on Emergent computation (1990) (1)
- Analogies with immunology represent an important step toward the vision of robust, distributed protection for computers. (1997) (1)
- Challenges in cybersecurity: Lessons from biological defense systems (2021) (1)
- Review of The Computational Beauty of Nature by Gary William Flake (2001) (1)
- Distributed internet security and measurement (2009) (0)
- Biologically inspired approaches for biosurveillance anomaly detection and data fusion. (2018) (0)
- Benign Cell Boosters: Exploring Novel Cancer Therapies Through Simulation (1976) (0)
- Software mutational robustness (2013) (0)
- Digging into Semantics: Where Do Search-Based Software Repair Methods Search? (2022) (0)
- Author ' s personal copy Autonomous security for autonomous systems (2008) (0)
- Mutational Robustness and Automatic Program Repair (2010) (0)
- Leveraging positive and negative representations of information (2008) (0)
- Energy conserving privacy enhancing algorithms for resource-constrained devices (2012) (0)
- Genetic Algorithms for Finding Polynomial Orderings (2001) (0)
- Proceedings of the 5th International Conference on Genetic Algorithms, Urbana-Champaign, IL, USA, June 1993 (1993) (0)
- GEVO (2020) (0)
- Proceedings of the 12th international conference on Parallel Problem Solving from Nature - Volume Part II (2012) (0)
- Neutral Networks Enable Distributed Search in Evolution (2017) (0)
- Modeling the effects of annual influenza vaccination (1998) (0)
- Modeling Interventions in Complex Networks ASIM: An Agent-based Integrated Model for Complex Networks (2011) (0)
- 32 83 v 1 [ cs . N I ] 2 2 F eb 2 00 8 An integrated model of traffic , geography and economy in the In ternet (2008) (0)
- GeneticAlgorithms: Principles of NaturalSelection Appliedto Co putation (2016) (0)
- Automated Diversity in Computer Systems (2005) (0)
- The biology of software (2018) (0)
- Computational Immunology for the Defense of Large Scale Systems (2002) (0)
- A Macro-scale Comparison Algorithm for Analysis of TCR Repertoire Completeness (2021) (0)
- Improving source-code representations to enhance search-based software repair (2022) (0)
- Cutting Through the Noise to Infer Autonomous System Topology (2022) (0)
- COMPUTATION IN THE WILD : MOVING BEYOND THE METAPHOR (2006) (0)
- Helix Project Test Bed: Towards the Self-Regenerative Incorruptible Enterprise (2011) (0)
- Generic and Automated Runtime Program Repair (2012) (0)
- Design Principles for the Im-mune System and Other Distributed Autonomous Systems (2001) (0)
- SIGEVO plenary lecture in memory of John Holland: the biology of software (2017) (0)
- The Baldwin E ect in the Immune System : Learning by Somatic HypermutationRon HightowerDept (2007) (0)
- Empirical and theoretical lower bounds on energy consumption for networks on chip (2013) (0)
- Automatically Reducing Energy Consumption of Software (2019) (0)
- Confronting Domain Shift in Trained Neural Networks (2020) (0)
- Understanding the Power of Evolutionary Computation for GPU Code Optimization (2022) (0)
- Two Efficient Representations for Set-Sharing Analysis in Logic Programs (2008) (0)
- Report from Dagstuhl Seminar 18052 Genetic Improvement of Software (2018) (0)
- Classifier System Implementation of KL-ONE (1990) (0)
- Current challenges in automatic software repair (2013) (0)
This paper list is powered by the following services:
Other Resources About Stephanie Forrest
What Schools Are Affiliated With Stephanie Forrest?
Stephanie Forrest is affiliated with the following schools: