Sunny James Fugate
Sunny James Fugate
Naval Information Warfare Center
Verified email at - Homepage
Cited by
Cited by
The human factors of cyber network defense
RS Gutzwiller, S Fugate, BD Sawyer, PA Hancock
Proceedings of the human factors and ergonomics society annual meeting 59 (1 …, 2015
Game theory for adaptive defensive cyber deception
K Ferguson-Walter, S Fugate, J Mauger, M Major
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
Active capacitive control stylus
NX Tran, HV Phan, SJ Fugate, MH Bruch
US Patent 8,648,837, 2014
“Oh, look, a butterfly!” A framework for distracting attackers to improve cyber defense
R Gutzwiller, K Ferguson-Walter, S Fugate, A Rogers
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62 (1 …, 2018
Wireless data glove for gesture-based robotic control
NX Tran, H Phan, VV Dinh, J Ellen, B Berg, J Lum, E Alcantara, M Bruch, ...
Human-Computer Interaction. Novel Interaction Methods and Techniques: 13th …, 2009
Removing the kitchen sink from software
J Landsborough, S Harding, S Fugate
Proceedings of the Companion Publication of the 2015 Annual Conference on …, 2015
Artificial intelligence and game theory models for defending critical networks with cyber deception
S Fugate, K Ferguson-Walter
AI Magazine 40 (1), 49-62, 2019
Computer System Anomaly Detection Using Human Responses to Ambient Representations of Hidden Computing System and Process Metadata
SJ Fugate, JR Lukos, RS Gutzwiller, KP Wiegand
US Patent App. 14/976,225, 2016
Augmented reality cross-domain solution for physically disconnected security domains
SJ Fugate, CC Peng, DC Grady
US Patent 9,804,813, 2017
Hall-Effect Sensor System for Gesture Recognition, Information Coding, and Processing
N Tran, S Fugate, M Ceruti, L Duffy, H Phan
US Patent 8,421,448, 2010
Wireless communication glove apparatus for motion tracking, gesture recognition, data transmission, and reception in extreme environments
MG Ceruti, VV Dinh, NX Tran, H Van Phan, LRT Duffy, TA Ton, G Leonard, ...
Proceedings of the 2009 ACM symposium on Applied Computing, 172-176, 2009
RFID system for gesture recognition, information coding, and processing
N Tran, S Fugate, J Ellen, LR Duffy, H Phan
US Patent 8,279,091, 2012
The world (of CTF) is not enough data: Lessons learned from a cyber deception experiment
K Ferguson-Walter, M Major, D Van Bruggen, S Fugate, R Gutzwiller
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
You only lie twice: A multi-round cyber deception game of questionable veracity
M Bilinski, K Ferguson-Walter, S Fugate, R Gabrys, J Mauger, B Souza
International Conference on Decision and Game Theory for Security, 65-84, 2019
Are cyber attackers thinking fast and slow? Exploratory analysis reveals evidence of decision-making biases in red teamers
RS Gutzwiller, KJ Ferguson-Walter, SJ Fugate
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63 (1 …, 2019
Next-generation tactical-situation-assessment technology (TSAT): Chat
EW Medina, S Fugate, LR Duffy, D Magsombol, O Amezcua, G Rogers, ...
Web Engineering: 7th International Conference, ICWE 2007 Como, Italy, July …, 2007
A Cyber-Relevant Table of of Decision Making Biases and their Definitions
C Johnson, R Gutzwiller, K Ferguson-Walter, S Fugate, 2020
Towards Self-Adaptive Cyber Deception for Defense.
J Landsborough, L Carpenter, B Coronado, S Fugate, K Ferguson-Walter, ...
HICSS, 1-10, 2021
Are cyber attackers thinking fast and slow? Evidence for cognitive biases in red teamers reveals a method for disruption
RS Gutzwiller, KJ Ferguson-Walter, SJ Fugate
Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2019
Next-generation tactical-situation-assessment technology (TSAT): Iconic language
S Fugate, EW Medina, LR Duffy, D Magsombol, O Amezcua, G Rogers, ...
Proceedings of the First Annual Visual and Iconic Language Conference, 1-5, 2007
The system can't perform the operation now. Try again later.
Articles 1–20