Matthew Butler
A noetic mechanic working on thinking machines
Welcome my personal website. I am currently an adjunct professor of Computer Science at the University of Tulsa. Most of my research focus has been on Systems-level Information Assurance, and Secure Design, with some substantial dabbling into Statistical learning and more classic Artificial Intelligence. I also have some interest in adjacent fields like linguistics, economics, and psychology.
I primarily work with Linux (most experience with Slackware and Arch Linux), Python (including Numpy, Scipy, and Scikit-learn), Emacs, LaTeX and Pandoc. Most of my classwork was done in Java and C++, and some of my research has required C.
I like to typeset and bind custom books, am slowly learning to sing Byzantine chant, and enjoy gardening and hiking.
Projects
-
melinoe. My little desktop homelab cluster for learning and experimenting with containerization, virtualization, and DevOps.
-
marginalia. The theme I created for this site, based on Tufte CSS. I really enjoy the aesthetics of prayer books and medieval manuscripts and marginalia, and have attempted to replicate some of that for this site.
-
ds-1043. Working state of course materials for an introduction to programming using Python.
Publications
Book Chapters
- P. Hawrylak, S. Reed, M. Butler, J. Hale. (2017). "The Access of Things: Spatial Access Control for the Internet of Things". Handbook of Research on Progressive Trends in Wireless Communications and Networking. IGI Global
Conference Papers
- M. Butler. (2017). "An Intrusion Detection System for Heavy-Duty Truck Networks". 12th International Conference on Cyber Warfare and Security. Dayton, Ohio, USA
- M. Butler, P. Hawrylak, J. Hale. (2011). "Graceful Priviledge Reduction in RFID Security". Seventh Annual Cyber Security and Information Intelligence Research Workshop. Oak Ridge, Tennessee, USA
- G. Louthan, W. Roberts, M. Butler, J. Hale. (2010). "The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness". Basically, we brought CTF to the classroom. This was before CTF really took off, so it's probably pretty dated now. Third Workshop on Cyber Security Experimentation and Test. Washington, D.C., USA
- B. Pollet, M. Butler, J. Hale. (2006). "Dynamic Policy Enforcement in a Network Environment". Security Enhanced Linux Symposium. Baltimore, Maryland, USA.
Posters
- M. Butler, S. Reed, P. Hawrylak, J. Hale. (2013). "Implementing Graceful RFID Privilege Reduction". Eighth Annual Cyber Security and Information Intelligence Research Workshop. Oak Ridge, Tennessee, USA