Publications
A Neurofeedback-Driven Humanoid to support Deep Work
Authors: Troy Weekes - Thomas C. Eskridge
Year: 2020
Towards the application of recommender systems to secure coding
Authors: Marco M. Carvalho - Thomas C. Eskridge - Fitzroy D. Nembhard
Year: 2019
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things
Authors: TJ OConnor - William Enck - Bradley Reaves
Year: 2019
HomeSnitch_ behavior transparency and control for smart home IoT devices
Authors: TJ OConnor - William Enck - Bradley Reaves - Reham Mohamed - Markus Miettinen - Ahmad-Reza Sadeghi
Year: 2019
The Deployment of RFID Technology on Small Farms in Holopaw, FL: A Community-Centered Effort
Authors: Nembhard, Fitzroy - Carvalho, Marco - Zisis Tegos, Kleanthis
Year: 2019
On the Automation of Cyber Experimentation
Authors: Mehta, Dhanish
Year: 2018
Models and Framework for Supporting Humanoid RobotPlanning & Exploration
Authors: Hasanain, Ahmad - Weekes, Troy - Person, Michael - Paul, Kepinski
Year: 2018
PivotWall: SDN-Based Information Flow Control
Authors: TJ OConnor - William Enck - W. Michael Petullo - Akash Verma
Year: 2018
A hybrid approach to improving program security
Authors: Carvalho, M. - Nembhard, F. - Eskridge, T.
Year: 2018
Optimal trajectory and schedule planning for autonomous guided vehicles in flexible manufacturing system
Authors: Carvalho, M. - Mahdavi, A.
Year: 2018
Extracting Knowledge from Open Source Projects to Improve Program Security
Authors: Carvalho, M. - Nembhard, F. - Eskridge, T.
Year: 2018
Formal assurance for cooperative intelligent autonomous agents
Authors: Carvalho, M. - Eskridge, T.C. - Neogi, N.A. - Stafford, M. - Bhattacharyya, S.
Year: 2018
FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning
Authors: Allen, William - Daood, Amar I. - Alawad, Mohammed M. - Alhafidh, Basman M. Hasan
Year: 2018
High fidelity adaptive cyber emulation
Authors: Samir Mammadov - Dhanish Mehta - Evan Stoner - Marco M. Carvalho
Year: 2017
Malware classification using static analysis based features
Authors: Marco M. Carvalho - Philip K. Chan - Mehadi Hassen
Year: 2017
Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics
Authors: Crawford, Heather - Ahmadzadeh, Ebad
Year: 2017
Real-Time Server Overloaded Monitoring Algorithm Using Back Propagation Artificial Neural Network
Authors:
Year: 2017
Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment
Authors: Alhafidh, Basman M. Hasan - Allen, William H.
Year: 2017
High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling
Authors: Alhafidh, Basman M Hasan - Allen, William H
Year: 2017
Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments
Authors: Allen, William - Alshehry, Badr
Year: 2017
The Artificial Memory of Mr. Polly: Memory Simulation in Databases and the Emergence of Knowledge
Authors: Allen, William H - Bahr, Gisela Susanne - Bernhard, Philip J - Wood, Stephen
Year: 2017
Using Image Saliency and Regions of Interest to Encourage Stronger Graphical Passwords
Authors:
Year: 2016
Ontologies supporting Quantification of Attack Surfaces
Authors: Eskridge, Thomas C - Simidchieva, B - Paltzer, Nicholas - Atighetchi, M
Year: 2016
User Display Providing Obstacle Avoidance
Authors: Johnson, Matthew - Kenny, Chua Wei Liang - Eskridge, Thomas
Year: 2016
Formal Verification of Intelligent Decision Procedures Systems Modeled as Decision Procedures
Authors: Bhattacharyya, Siddhartha - Eskrdige Thomas C. - Carvalho, M
Year: 2016
Verification of Security Response
Authors: Eskrdige Thomas C. - Bhattacharyya, Siddhartha - Carvalho, M
Year: 2016
Formal Verification of Intelligent Systems Modeled as Decision Procedures
Authors: Carvalho, Marco - Eskridge, Thomas C - Bhattacharyya, S
Year: 2016
Verification of Decision Procedures Modeled in Intelligent Agents
Authors: Carvalho, Marco - Eskridge, Thomas C - Bhattacharyya, S - Davis, J
Year: 2016
Personal Identity Matching
Authors: Marco Carvalho - Mazin Al-Shuaili
Year: 2016
An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms
Authors: M. Carvalho - M. Atighetchi - F. Yaman - B. Simidchieva
Year: 2016
Character Mapping for Cross-Language
Authors: Carvalho, Marco - Al-Shuaili, Mazin
Year: 2016
Experimentation support for cyber security evaluations
Authors: Atighetchi, M. - Carvalho, M. - Last, D. - Simidchieva, B.
Year: 2016
Interactive Visualization of Netflow Traffic
Authors: Carvalho, M. - Eskridge, T.C. - Thotempudi, H. - Nembhard, F. - Polack, P.J.
Year: 2016
Semi-automated wrapping of defenses (SAWD) for cyber command and control
Authors: Atighetchi, M. - Carvalho, M. - Eskridge, T.C. - Paltzer, C.N.
Year: 2016
A decision engine for configuration of proactive defenses - Challenges and concepts
Authors: Atighetchi, M. - Last, D. - Eskridge, T.C. - Benyo, B.
Year: 2016
Using ontologies to quantify attack surfaces
Authors: Atighetchi, M. - Carvalho, M. - Simidchieva, B. - Paltzer, N. - Eskridge, T. - Yaman, F.
Year: 2016
Motion-resolving hover display
Authors: Eskridge, Thomas C - Temme, Leonard A - Still, David L
Year: 2015
Resilient Command and Control Infrastructures for Cyber Operations
Authors: Marco Carvalho
Year: 2015
Poster: Image Suitability for Graphical Passwords
Authors: Alshehri, Mohammad N. - Crawford, Heather - Mayron, Liam M.
Year: 2015
A significant improvement for anti-malware tests
Authors: Carvalho, M. - Ford, R.
Year: 2015
Coactive Emergence as a Sensemaking Strategy for Cyber Security Work
Authors: Carvalho, Marco - Forsythe, Chris - Eskridge, Tom - Bradshaw, Jeffrey M - Woods, David D - Hoffman, Robert R - Bunch, Larry - Kidwell, Dan - Johnson, Matt - Feltovich, Paul J
Year: 2015
MIRA: A support infrastructure for cyber command and control operations
Authors: Carvalho, M. - Eskridge, T.C. - Paltzer, N. - Ferguson-Walter, K.
Year: 2015
Quantifying minimizing attack surfaces containing moving target defenses
Authors: M. Carvalho - D. Last - J. Loyall - N. Soule - B. Flatley - D. Myers - B. Simidchieva - F. Yaman - M. Atighetchi - R. Watro
Year: 2015
VINE: A cyber emulation environment for MTD experimentation
Authors: Carvalho, M. - Eskridge, T.C. - Stoner, E. - Toggweiler, T. - Granados, A.
Year: 2015
VINE
Authors: Evan Stoner - Marco M. Carvalho - Adrian Granados - Thomas C. Eskridge - Troy Toggweiler
Year: 2015
A comparative study of File-Type Identification Techniques
Authors: Allen, W.H. - Alamri, N.S.
Year: 2015
Usable-Security Evaluation
Authors: Yasser M. Hausawi - William H. Allen
Year: 2015
Event data visualization tool
Authors: Bradshaw, Jeffrey M - Feltovich, Paul J - Eskridge, Thomas C - Johnson, Matthew - Bunch, Lawrence K - Carvalho, Marco M
Year: 2014
Authentication in Mobile and Ubiquitous Computing
Authors: Crawford, Heather
Year: 2014
Exploring Netfow Data using Hadoop
Authors: -
Year: 2014
Efficient spectrum allocation in multiband CSMA networks
Authors: Subramanian, S. - Dixon, W.E. - Pasiliao, E.L. - Carvalho, M.M. - Shea, J.M.
Year: 2014
Empirical models for complex network dynamics: A preliminary study
Authors: Carvalho, M. - Oliveira, D.
Year: 2014
Heartbleed 101
Authors: Carvalho, M. - Ford, R. - Wheeler, D.A. - Demott, J.
Year: 2014
Moving-target defenses for computer networks
Authors: Carvalho, M. - Ford, R.
Year: 2014
Performance evaluation of static frequency reuse techniques for OFDMA cellular networks
Authors: Carvalho, M.M. - Hambebo, B.M. - Ham, F.M.
Year: 2014
Protecting me
Authors: Carvalho, M. - Ford, R.
Year: 2014
Statistical learning approach for robust melanoma screening
Authors: Fornaciali, Michel - Carvalho, Micael - Valle, Eduardo - Avila, Sandra
Year: 2014
Strategies for spectrum allocation in OFDMA cellular networks
Authors: Carvalho, M. - Hambebo, B.M. - Ham, F.
Year: 2014
AOA: Ambient obstacle avoidance interface
Authors: Eskridge, T. - Johnson, M. - Keller, B. - Chua, W.L.K.
Year: 2014
Principles for human-centered interaction design, Part 1: Performative systems
Authors: Eskridge, T.C. - Hoffman, R.R. - Still, D.
Year: 2014
A taxonomy of file-type identification techniques
Authors: Allen, W.H. - Alamri, N.S.
Year: 2014
An assessment framework for usable-security based on decision science
Authors: Allen, W.H. - Hausawi, Y.M.
Year: 2014
Choice-based authentication: A usable-security approach
Authors: Allen, W.H. - Hausawi, Y.M. - Bahr, G.S.
Year: 2014
RAAODV: A reputation-aware AODV for mobile ad hoc networks
Authors: Allen, W.H. - Al-Hamadani, A.
Year: 2014
Usablity and security trade-off: A design guideline
Authors: Allen, W.H. - Hausawi, Y.M.
Year: 2014
Assured Supraliminal Steganography in Computer Games
Authors: John Aycock - Daniel Medeiros Nunes de Castro - Vineet Sinha - Anton Mosunov - Heather Crawford - Rashmi Kumari
Year: 2014
Invisible, Passive, Continuous and Multimodal Authentication
Authors: Heather Crawford - Karen Renaud
Year: 2014
Reflections on U-PriSM 2
Authors: Heather Crawford - Sonia Chiasson - Serge Egelman - Pourang Irani
Year: 2014
Understanding user perceptions of transparent authentication on a mobile device
Authors: Heather Crawford - Karen Renaud
Year: 2014
A framework for continuous, transparent mobile device authentication
Authors: Heather Crawford - Karen Renaud - Tim Storer
Year: 2013
An effective method for modeling wind power forecast uncertainty
Authors: Mitchell J. Small - Jay Apt - Pedro M. S. Carvalho - Brandon Mauch
Year: 2013
A Gaming Environment for Resilient Network Design and Adversarial Co-Evolution Modeling
Authors: Carvalho, Marco - Stoner, Evan - McLane, James - Granados, Adrian
Year: 2013
A combined discriminative and generative behavior model for cyber physical system defense
Authors: Carvalho, M. - Brunza, S. - Dasgupta, D. - McCusker, O. - Vora, S.
Year: 2013
A comparison of community identication algorithms for regulatory network motifs
Authors: Carvalho, M. - Oliveira, D.
Year: 2013
A human-agent teamwork command and control framework for moving target defense (MTC2)
Authors: Marco M. Carvalho - James Lott - Thomas C. Eskridge - Larry Bunch - Daniel Kidwell - Adam Dalton - Jeffrey M. Bradshaw - Paul Feltovich
Year: 2013
A layered approach to understanding network dependencies on moving target defense mechanisms
Authors: Carvalho, M. - Kidwell, D. - Crosby, S.
Year: 2013
A scalable approach to network traffic classification for computer network defense using parallel neural network classifier architectures
Authors: Carvalho, M. - Hambebo, B.M. - Ham, F.M.
Year: 2013
Antimalware software: Do we measure resilience?
Authors: Carvalho, M. - Ford, R. - Bishop, M. - Mayron, L.
Year: 2013
Cooperation models between humans and artificial self-organizing systems: Motivations, issues and perspectives
Authors: Carvalho, M. - Trentesaux, D. - Rey, G.Z.
Year: 2013
Domain and location specific modeling of mobile users online interests
Authors: Carvalho, M. - Moghaddam, S. - Helmy, A.
Year: 2013
Infrastructure Security for Smart Electric Grids: A Survey
Authors: Marco Carvalho - Naran M. Pindoriya - Dipti Srinivasan - Dipankar Dasgupta
Year: 2013
MTC2: A command and control framework for moving target defense and cyber resilience
Authors: Carvalho, M. - Eskridge, T.C. - Kidwell, D. - Bunch, L. - Bradshaw, J.M. - Dalton, A. - Feltovich, P.J. - Hoffman, R. - Shanklin, T.
Year: 2013
Optimization and Security Challenges in Smart Power Grids
Authors: Marco Carvalho - Vijay Pappu - Panos Pardalos
Year: 2013
The language of behavior: Exploring a new formalism for resilient response
Authors: Carvalho, M. - Fink, G.A.
Year: 2013
Topology design for on-demand dual-path routing in wireless networks
Authors: Carvalho, M. - Balasundaram, B. - Sorokin, A. - Boginski, V.
Year: 2013
Using network sciences to evaluate the brazilian airline network
Authors: Carvalho, M. - Oliveira, D. - Menezes, R.
Year: 2013
Visualizing Multi-Agent Systems
Authors: Carvalho, Marco - Eskridge, Thomas C - Polack Jr, Peter J
Year: 2013
Rational interfaces for effective security software: Polite interaction guidelines for secondary tasks
Authors: Allen, W.H. - Bahr, G.S.
Year: 2013
System and method of generically detecting the presence of emulated environments
Authors: Ford, Richard - Allen, William - Marin, Gerald
Year: 2012
CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection
Authors: Marco Carvalho - Richard Ford
Year: 2012
Sol: An Agent-Based Framework for Cyber Situation Awareness
Authors: Marco Carvalho - Tom Eskridge - Paul J. Feltovich - Larry Bunch - Jeffrey M. Bradshaw - Dan Kidwell - Matt Johnson
Year: 2012
An adaptive multi-agent-based approach to smart grids control and optimization
Authors: Marco Carvalho - Carlos Perez - Adrian Granados
Year: 2012
Preface
Authors: Carvalho, M. - Oplatková, Z. - Byrski, A. - Kisiel-Dorohinicki, M.
Year: 2012
A hybrid emulation environment for airborne wireless networks
Authors: Carvalho, M. - Granados, A. - Poland, B. - Suprenant, J. - Muccio, M. - Pérez, C. - Arguedas, M. - Hague, D.
Year: 2012
Advances in Intelligent Modelling and Simulation
Authors: Marco Carvalho - Zuzana Oplatková - Marek Kisiel-Dorohinicki - Aleksander Byrski
Year: 2012
Command and control requirements for moving-target defense
Authors: Carvalho, M. - Kidwell, D. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Hoffman, R.R. - Eskridge, T.
Year: 2012
Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna
Authors: Marco Carvalho - James Lott - Tom Eskridge - Paul J. Feltovich - Larry Bunch - Jeffrey M. Bradshaw - Andrzej Uszok
Year: 2012
NextVC2 - A next generation virtual world command and control
Authors: Ford, R. - Carvalho, M.M.
Year: 2012
Organic resilience for tactical environments
Authors: Carvalho, M. - Pérez, C. - Lamkin, T.
Year: 2012
Policy-based governance within Luna: Why we developed yet another agent framework
Authors: Carvalho, M. - Lott, J. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Eskridge, T. - Uszok, A.
Year: 2012
Supporting COTS applications in tactical edge networks
Authors: Morelli, Alessandro - Stefanelli, Cesare - Kohler, Ralph - Suri, Niranjan - Tortonesi, Mauro
Year: 2012
Throughput maximization in CSMA networks with collisions
Authors: Subramanian, S. - Dixon, W.E. - Pasiliao, E.L. - Carvalho, M.M. - Shea, J.M.
Year: 2012
Toward metrics for cyber resilience
Authors: Carvalho, Marco M. - Mayron, Liam M. - Ford, Richard - Bishop, Matt
Year: 2012
XLAYER: A CROSS-LAYER COMMUNICATIONS SUBSTRATE FOR TACTICAL ENVIRONMENTS
Authors: Carvalho, Marco M.
Year: 2012
Ontology creation as a sensemaking activity
Authors: Eskridge, T.C. - Hoffman, R.
Year: 2012
A human-agent teamwork approach to moving target defense command and control
Authors: Eskridge, T - Lott, J - Carvalho, M - Hoffman, R - Bradshaw, JM - Feltovich, P - Kidwell, D - Bunch, L
Year: 2012
Principles of continuous analogical reasoning
Authors: Eskridge, Thomas Charles
Year: 2012
Detecting emulated environments
Authors: Ford, R. - Allen, W. - Marin, G. - Tilley, S. - Parveen, T.
Year: 2012
A Distributed Computing Platform for Heterogeneous Data Processing
Authors: Carvalho, Marco - Byrski, Aleksander - Dajda, Jacek - Pietak, Kamil - Kisiel-Dorohinicki, Marek - Arguedas, Marco
Year: 2011
An evolutionary multi-agent approach to anomaly detection and cyber defense
Authors: Carvalho, M. - Pérez, C.
Year: 2011
Automatic discovery of attack messages and pre-and post-conditions for attack graph generation
Authors: Carvalho, M. - Teng, C.M.
Year: 2011
Dynamic policy-driven quality of service in service-oriented information management systems
Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Schmidt, D.C. - Paulos, A. - Loyall, J.P. - Sinclair, A. - Edmondson, J.
Year: 2011
Integrated information and network management for end-to-end quality of service
Authors: Carvalho, M. - Granados, A. - Gillen, M. - Sinclair, A. - Loyall, J. - Usbeck, K. - Hanna, J.P.
Year: 2011
Mission resilience in cloud computing: A biologically inspired approach
Authors: Carvalho, M. - Dasgupta, D. - Pérez, C. - Grimaila, M.
Year: 2011
Network traffic classification using a parallel neural network classifier architecture
Authors: Carvalho, M. - Ham, F. - Mathewos, B.
Year: 2011
Resilience is more than availability
Authors: Carvalho, M. - Ford, R. - Bishop, M. - Mayron, L.M.
Year: 2011
Secure VM for monitoring industrial process controllers
Authors: Carvalho, M. - Dasgupta, D. - Ali, Mohd.H. - Abercrombie, R. - Schlicher, B. - Sheldon, F.
Year: 2011
The mLab-PENGWUN hybrid emulation environment for airborne networks
Authors: Carvalho, M. - Granados, A. - Poland, B. - Suprenant, J. - Muccio, M. - Pérez, C. - Arguedas, M. - Hague, D.
Year: 2011
XTC+: descripción y análisis de un mecanismo de control de topoloǵıa para los MANET
Authors: Carvalho, Marco - Granados, Joel Andr{\'e}s - Montoya, Edwin
Year: 2011
Skills in applied concept mapping
Authors: Hoffman, Robert R - Eskridge, Thomas C - Moon, Brian M - Coffey, John W
Year: 2011
Security risk analysis of software architecture based on AHP
Authors: Allen, W.H. - Alkussayer, A.
Year: 2011
Experiences with practice-focused undergraduate security education
Authors: Terrence J. O,Connor - Robert L. Fanelli
Year: 2010
Keystroke dynamics: Characteristics and opportunities
Authors: Heather Crawford
Year: 2010
honeyM: a framework for implementing virtual honeyclients for mobile devices
Authors: Ben Sangster - T. J. O'Connor
Year: 2010
A Crisis Management Approach to Mission Survivability in Computational Multi-Agent Systems
Authors: Carvalho, Marco - Byrski, Aleksander - Kiisiel-Dorohinicki, Marek
Year: 2010
A cross-layer approach to mixed-control topology management for MANETs
Authors: Carvalho, M. - Granados, A. - Subramanian, S. - Pérez, C.
Year: 2010
A directed expansion topology control algorithm for mobile ad-hoc networks
Authors: Carvalho, M. - Pérez, C. - Arguedas, M. - Kraus, W. - Hoback, K.
Year: 2010
A dynamic and policy-controlled approach to federating information systems
Authors: Carvalho, M. - Hillman, R. - Suri, N. - Hanna, J. - Marcon, M. - Breedy, M. - Sinclair, A. - Uszok, A. - Bradshaw, J.M. - Combs, V.
Year: 2010
Automated Risk Assessment of Sensor Disclosure in Coalition Operations
Authors: Carvalho, Marco - Bradshaw, Jeffrey M. - Perez, Carlos
Year: 2010
Configurable and secure system architectures
Authors: Carvalho, M. - Dasgupta, D.
Year: 2010
Distributed policy learning for the cognitive network management system
Authors: Carvalho, M. - Pérez, C. - VanderHorn, N. - Haan, B.
Year: 2010
Dynamic policy-driven quality of service in service-oriented systems
Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Schmidt, D.C. - Paulos, A. - Loyall, J.P. - Edmondson, J. - Varshneya, P.
Year: 2010
Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework
Authors: Tom Eskridge - Jeffrey M. Bradshaw - Andrzej Uszok - James Hanna
Year: 2010
A scenario-based framework for the security evaluation of software architecture
Authors: Allen, W.H. - Alkussayer, A.
Year: 2010
Proactive reputation-based defense for MANETs using radial basis function neural networks
Authors: Ford, R. - Ham, F.M. - Allen, W. - Imana, E.Y.
Year: 2010
The ISDF Framework: Towards Secure Software Development
Authors: Allen, William H - Alkussayer, Abdulaziz
Year: 2010
Toward instrumenting network warfare competitions to generate labeled datasets
Authors: Robert L. Fanelli - T. J. O'Connor - Benjamin Sangster - Thomas Cook - Erik Dean - William J. Adams - Chris Morrell - Gregory Conti
Year: 2009
A Naturalistic Exploration of Forms and Functions of Analogizing
Authors: Tom Eskridge - Robert R. Hoffman - Cameron Shelley
Year: 2009
A distributed reinforcement learning approach to mission survivability in tactical MANETs
Authors: Carvalho, M.
Year: 2009
Adaptive Security for MANETs via Biology
Authors: Carvalho, Marco - Ford, Richard - Allen, William H - Ham, Frederic
Year: 2009
Agile Computing and its Applications to Army Tactical Environments
Authors: Carvalho, Marco - Tokarcik, L. - Ansaloni, D. - Quitadamo, R. - Rebeschini, M. - Kovach, J. - Benincasa, G. - Tortonesi, M. - Choy, S. - Winkler, R. - Suri, N. - Marcon, M. - Breedy, M. - Bradshaw, Jeffrey M. - Arguedas, M. - Benvegnu, E.
Year: 2009
Danger theory and collaborative filtering in MANETs
Authors: Carvalho, M. - Ford, R. - Hoffman, K. - Allen, W.H. - Ondi, A. - Brown, D. - Marin, G.A.
Year: 2009
Dynamic gateway selection for cross-domain routing with the XLayer communications substrate
Authors: Carvalho, M. - Granados, A. - Pérez, C.
Year: 2009
Enabling information management systems in tactical network environments
Authors: Carvalho, M. - Bradshaw, J.M. - Uszok, A. - Sinclair, A. - Hanna, J.P. - Suri, N. - Ceccio, P.J.
Year: 2009
Generic danger detection for mission continuity
Authors: Carvalho, M. - Ford, R. - Hoffman, K. - Ondi, A. - Allen, W.
Year: 2009
Investigating the use of topology adaptation for robust multi-path transport: A preliminary study
Authors: Carvalho, M. - Granados, A. - Pérez, C. - Arguedas, M. - Kraus, W. - Hoback, K.
Year: 2009
QoS enabled dissemination of managed information objects in a publish-subscribe-query information broker
Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Loyall, J.P. - Edmondson, J. - Sinclaire, A. - Corman, D. - Schmidt, D.
Year: 2009
Quality of service in US air force information management systems
Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Sinclair, A. - Loyall, J. - Marcon, M.
Year: 2009
Security in MANETs using reputation-adjusted routing
Authors: Carvalho, M. - Ford, R. - Pérez, C. - Hoffman, K. - Ondi, A. - Allen, W.
Year: 2009
Supporting Federated Information Spaces with the Joint Battlespace Infosphere (JBI) Platform
Authors: Carvalho, Marco - Bradshaw, Jeffrey M. - Suri, Niranjan - Marcon, M. - Breedy, Maggie - Hutchenson, Tim - Hanna, James P. - Uszok, Andrzej - Hillman, Robert
Year: 2009
From Tools to Teammates: Joint Activity in Human-Agent-Robot Teams
Authors: Maggie Breedy - Jurriaan van Diggelen - Andrzej Uszok - Paul Feltovich - Jeffrey M. Bradshaw - Larry Bunch - Matthew Johnson - Tom Eskridge - James Lott - Hyuckchul Jung
Year: 2009
A MANET simulator (M-SIM) with an extended worm propagation epidemic model
Authors: Ford, R. - Ham, F.M. - Ondi, A. - Allen, W. - Imana, E. - Reedy, M.
Year: 2009
Malware shall greatly increase⋯
Authors: Ford, R. - Allen, W.H.
Year: 2009
Reputation prediction in mobile ad hoc networks using RBF neural networks
Authors: Ford, R. - Ham, F.M. - Ondi, A. - Allen, W. - Imana, E.Y. - Reedy, M.
Year: 2009
The ISDF framework: Integrating security patterns and best practices
Authors: Allen, W.H. - Alkussayer, A.
Year: 2009
Towards Automatic Security Scenario Generation
Authors: Allen, William H - Alkussayer, Abdulaziz
Year: 2009
Towards secure software development: Integrating security patterns into a secure SDLC
Authors: Alkussayer, A - Allen, WH
Year: 2009
A cross-layer communications substrate for tactical information management systems
Authors: Carvalho, M. - Granados, A. - Hanna, J.P. - Brothers, A. - Naqvi, W. - Turck, K.
Year: 2008
A cross-layer predictive routing protocol for mobile ad hoc networks
Authors: Carvalho, M. - Pérez, C. - Winkler, R. - Choy, S. - Kovach, J.
Year: 2008
A three-tier damage-driven security infrastructure for mission continuity
Authors: Carvalho, Marco - Ford, Richard - Allen, William - Marin, Gerald
Year: 2008
Agent-based immunological intrusion detection system for mobile Ad-hoc networks
Authors: Carvalho, M. - Byrski, A.
Year: 2008
Coordinated Operations in Mixed Teams of Humans and Robots
Authors: Carvalho, Marco - Johnson, Matt - Bradshaw, Jeffrey M. - Suri, Niranjan - Allen, James - Intlekofer, K. - Jung, Hyuckchul
Year: 2008
MANET Simulation and Security: New Wineskins for New Wine?
Authors: Carvalho, Marco - Ford, Richard - Perez, Carlos - Allen, William - Marin, G. - Ondi, Attila
Year: 2008
Policy management across multiple platforms and application domains
Authors: Carvalho, M. - Bradshaw, J.M. - Suri, N. - Johnson, M. - Jung, H.
Year: 2008
Securing MANETs with BITSI: danger theory and mission continuity
Authors: Carvalho, Marco - Ford, Richard - Allen, William - Marin, Gerald
Year: 2008
Security in mobile ad hoc networks
Authors: Carvalho, M.
Year: 2008
Coordination in human-agent-robot teamwork
Authors: Lott, J. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Eskridge, T. - Uszok, A. - Jung, H. - Breedy, M.R. - Johnson, M.J.
Year: 2008
A structuration agency approach to security policy enforcement in mobile ad hoc networks
Authors: Ford, Richard - Allen, William - Workman, Michael
Year: 2008
One of these things is not like the Others: Collaborative filtering in MANETs
Authors: Ford, R. - Hoffman, K. - Marin, G. - Carvalho, M - Ondi, A - Brown, D - Allen, W
Year: 2008
Towards the detection of emulated environments via analysis of the stochastic nature of system calls
Authors: Ford, R. - Allen, W. - Marin, G. - Tilley, S. - Parveen, T.
Year: 2008
A cross-layer communications framework for tactical environments
Authors: Carvalho, M. - Arguedas, M. - Breedy, M. - Suri, N. - Rebeschini, M.
Year: 2007
A cross-layer communications substrate for tactical communications middleware
Authors: Carvalho, M. - Granados, A. - Pérez, C. - Suri, N. - Rebeschini, M.
Year: 2007
An Agile Computing Approach to Dynamic and Adpative Service-Oriented Architectures
Authors: Carvalho, Marco - Suri, Niranjan - Arguedas, Marco - Breedy, Maggie - Stabellini, S. - Rebeschini, Matteo
Year: 2007
BITSI: A Biologically-Inspired Adaptive Defense Framework
Authors: Carvalho, M. - Ford, R. - Allen, W.
Year: 2007
Network conditions monitoring in the Mockets communications framework
Authors: Carvalho, M. - Suri, N. - Tortonesi, M. - Stefanelli, C.
Year: 2007
Policy-based bandwidth management for tactical networks with the agile computing middleware
Authors: Carvalho, M. - Lott, J. - Bradshaw, J.M. - Arguedas, M. - Breedy, M. - Suri, N. - Tortonesi, M.
Year: 2007
How not to be seen
Authors: Allen, W.H.
Year: 2007
How not to be seen II: The defenders fight back
Authors: Allen, W.H.
Year: 2007
Mixing wheat with the chaff
Authors: Allen, W.H.
Year: 2007
N-Version Programming for the Detection of Zero-day Exploits
Authors: Ford, Richard - Allen, William H - Nagy, Lajos
Year: 2006
Resource and Service Discovery in Wireless AD-HOC Networks with Agile Computing
Authors: Carvalho, Marco - Suri, Niranjan - Arguedas, Marco - Breedy, Maggie - Rebeschini, Matteo
Year: 2006
A Cross-layer Network Substrate for the Battlefield
Authors: Carvalho, Marco - Suri, Niranjan - Lloyd, E. - Shurbanov, V.
Year: 2006
A chat interface for human-agent interaction in MAST
Authors: Carvalho, M. - Suri, N. - Rebeschini, M. - Horsley, J.
Year: 2006
A distributed stand-in agent based algorithm for opportunistic resource allocation
Authors: Carvalho, M. - Suri, N. - Pěchouček, M. - Jisl, P. - Benda, P.
Year: 2006
Distributed Resource Coordination Strategies for Mobile Ad hoc Networks
Authors: Carvalho, Marco
Year: 2006
A model-based approach to the security testing of network protocol implementations
Authors: Allen, William H - Dou, Chin - Marin, Gerald A
Year: 2006
Needles in Haystacks: Practical Intrusion Detection from Theoretical Results
Authors: Allen, William H - Marin, Gerald A
Year: 2006
Simulation for Evaluating the Usability of Integrated Flight Decks
Authors:
Year: 2005
A Mobile Agent-Based Middleware for Opportunistic Resource Allocation and Communications
Authors: Carvalho, Marco - Suri, Niranjan - Pechoucek, Michal
Year: 2005
A mobile agent-based communications middleware for data streaming in the battle
Authors: Carvalho, M. - Arguedas, M. - Suri, N.
Year: 2005
Concept maps: Integrating knowledge and information visualization
Authors: Carvalho, M. - Eskridge, T.C. - Lott, J. - Arguedas, M. - Hill, G. - Cañas, A.J. - Carvajal, R. - Carff, R.
Year: 2005
Flexible automated monitoring and notification for complex processes using KARMEN
Authors: Carvalho, M. - Bunch, L. - Bradshaw, J.M. - Breedy, M. - Suri, N. - Danks, D.
Year: 2005
KARMEN: Multi-agent monitoring and notification for complex processes
Authors: Carvalho, M. - Bunch, L. - Bradshaw, J.M. - Breedy, M. - Suri, N.
Year: 2005
MAST: Intelligent Roaming Guards for Network and Host Security
Authors: Carvalho, Marco - Suri, Niranjan - Breedy, Maggie - Rebeschini, Matteo - Cowin, Tom - Horsley, James
Year: 2005