Skip to main content
image of earth at night

Publications

Year Title 
2023 Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Po Authors: Parth Ganeriwala - Anubhav Gupta - Daniel Campos - Siddharta Bhattacharyya - TJ OConnor - Adolf Dcosta
2023 Toward a Labeled Dataset of IoT Malware Features Authors: Stian Olsen - TJ OConnor
2023 Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices Authors: TJ OConnor - Dylan Jesse - Daniel Campos
2023 Understanding how to diversify the cybersecurity workforce Authors: Maria Chaparro Osman - Maureen Namukasa - Cherisse Ficke - Isabella Piasecki - TJ Oconnor - Meredith Carroll
2023 Compete to Learn: Toward Cybersecurity As A Sport Authors: TJ OConnor - Dane Brown - Jasmine Jackson - Suzaan Schmeelk - Bryson Payne
2023 Evaluation of an Internet of Things Device-based Educational Approach to Engage a More Diverse Cybersurity Workforce Authors: Maureen Namukasa - Maria Chaparro Osman - Cherrise Ficke - Isabella Piasecki - Meredith Carroll - TJ OConnor
2023 Analyzing the Impact of Gender Misclassification on Face Recognition Accuracy Authors: Afi Edem Edi Gbekevi - Paloma Vela Achu - Gabriella Pangelinan - Michael King - Kevin W. Bowyer
2023 Exploring Causes of Demographic Variations In Face Recognition Accuracy Authors: Gabriella Pangelinan - K.S. Krishnapriya - Vitor Albiero - Grace Bezold - Kai Zhang - Kushal Vangara - Michael C. King - Kevin W. Bowyer
2022 Helo darkside: Breaking free from katas and embracing the adversarial mindset in Author: TJ OConnor
2022  Toward an Automatic Exploit Generation Competition for an Undergraduate Binary R  Authors: TJ OConnor - Carl Mann - Tiffanie Petersen - Isaiah Thomas - Chris Stricklan 
2022  MPO: MQTT-Based Privacy Orchestrator for Smart Home Users  Authors: Ahmed Alhazm - Khulud Alawaji - TJ OConnor 
2022  Analysis of Manual and Automated Skin Tone Assignments  Authors: K.S. Krishnapriya - Gabriella Pangelinan - Michael King - Kevin W. Bowyer 
2021 Towards binary diversified challenges for a hands-on reverse engineering course Authors: Chris Stricklan - TJ OConnor
2021  Teaching a hands-on mobile and wireless cybersecurity course  Authors: TJ OConnor - Chris Stricklan 
2021  Through the spyglass: Toward IoT companion app man-in-the-middle attacks  Authors: TJ OConnor - Dylan Jesse - Daniel Campos 
2021  Towards labeling on-demand IoT traffic  Authors: Daniel Campos - TJ OConnor 
2021  A replication study for IoT privacy preferences  Authors: Ahmed Alhazmi - Ghassen Kilani - William Allen - TJ OConnor 
2020  Analysis of Gender Inequality In Face Recognition Accuracy  Authors: Vitor Albiero - K.S. Krishnapriya - Kushal Vangara - Kai Zhang - Michael C. King - Kevin W. Bowyer 
2020  Issues Related to Face Recognition Accuracy Varying Based on Race and Skin Tone  Authors: K.S. Krishnapriya, Vitor Albiero - Kushal Vangara - Michael C. King 
2020  The Criminality From Face Illusion  Authors: Kevin W. Bowyer - Michael King - Walter Scheirer - Kushal Vangara 
2020  Never ending story: Authentication and access control design flaws in shared IoT  Authors: Blake Janes - Heather Crawford - TJ OConnor 
2020  A Neurofeedback-Driven Humanoid to support Deep Work  Authors: Troy Weekes - Thomas C. Eskridge 
2019  Does Face Recognition Accuracy Get Better With Age? Deep Face Matchers Say No  Authors: Vitor Albiero - Kevin W. Bowyer - Kushal Vangara - Michael C. King 
2019  Characterizing the Variability in Face Recognition Accuracy Relative to Race  Authors: Krishnapriya K.S. - Kushal Vangara - Michael C. King - Vitor Albiero - Kevin Bowyer 
2019  Towards the application of recommender systems to secure coding  Authors: Marco M. Carvalho - Thomas C. Eskridge - Fitzroy D. Nembhard 
2019  Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things  Authors: TJ OConnor - William Enck - Bradley Reaves 
2019  HomeSnitch_ behavior transparency and control for smart home IoT devices  Authors: TJ OConnor - William Enck - Bradley Reaves - Reham Mohamed - Markus Miettinen - Ahmad-Reza Sadeghi 
2019  The Deployment of RFID Technology on Small Farms in Holopaw, FL: A Community-Centered Effort  Authors: Nembhard, Fitzroy - Carvalho, Marco - Zisis Tegos, Kleanthis 
2018  Towards An Adaptable System-based Classification Design for Cyber Identity  Authors: Mary (Kay) Michael - Michael King 
2018  Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Sol  Authors: Mary (Kay) Michael - Marco Carvalho - Heather Crawford - Albert C. Esterline 
2018  Categorization of Discoverable Cyber Attributes for Identity Protection, Privacy  Authors: Mary (Kay) Michael - Michael King 
2018  On the Automation of Cyber Experimentation  Authors: Mehta, Dhanish 
2018  Models and Framework for Supporting Humanoid RobotPlanning & Exploration  Authors: Hasanain, Ahmad - Weekes, Troy - Person, Michael - Paul, Kepinski 
2018 PivotWall: SDN-Based Information Flow Control  Authors: TJ OConnor - William Enck - W. Michael Petullo - Akash Verma 
2018  A hybrid approach to improving program security  Authors: Carvalho, M. - Nembhard, F. - Eskridge, T. 
2018  Optimal trajectory and schedule planning for autonomous guided vehicles in flexible manufacturing system  Authors: Carvalho, M. - Mahdavi, A. 
2018  Extracting Knowledge from Open Source Projects to Improve Program Security  Authors: Carvalho, M. - Nembhard, F. - Eskridge, T. 
2018  Formal assurance for cooperative intelligent autonomous agents  Authors: Carvalho, M. - Eskridge, T.C. - Neogi, N.A. - Stafford, M. - Bhattacharyya, S. 
2018  FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning  Authors: Allen, William - Daood, Amar I. - Alawad, Mohammed M. - Alhafidh, Basman M. Hasan 
2017  High fidelity adaptive cyber emulation Authors: Samir Mammadov - Dhanish Mehta - Evan Stoner - Marco M. Carvalho
2017  Malware classification using static analysis based features Authors: Marco M. Carvalho - Philip K. Chan - Mehadi Hassen
2017  Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics Authors: Crawford, Heather - Ahmadzadeh, Ebad
2017  Real-Time Server Overloaded Monitoring Algorithm Using Back Propagation Artificial Neural Network  
2017  Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment Authors: Alhafidh, Basman M. Hasan - Allen, William H.
2017  High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling Authors: Alhafidh, Basman M Hasan - Allen, William H
2017  Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments Authors: Allen, William - Alshehry, Badr
2017  The Artificial Memory of Mr. Polly: Memory Simulation in Databases and the Emergence of Knowledge Authors: Allen, William H - Bahr, Gisela Susanne - Bernhard, Philip J - Wood, Stephen
2016 Using Image Saliency and Regions of Interest to Encourage Stronger Graphical Passwords  
2016  Ontologies supporting Quantification of Attack Surfaces Authors: Eskridge, Thomas C - Simidchieva, B - Paltzer, Nicholas - Atighetchi, M
2016  User Display Providing Obstacle Avoidance Authors: Johnson, Matthew - Kenny, Chua Wei Liang - Eskridge, Thomas
2016  Formal Verification of Intelligent Decision Procedures Systems Modeled as Decision Procedures Authors: Bhattacharyya, Siddhartha - Eskrdige Thomas C. - Carvalho, M
2016  Verification of Security Response Authors: Eskrdige Thomas C. - Bhattacharyya, Siddhartha  - Carvalho, M
2016 Verification of Decision Procedures Modeled in Intelligent Agents Authors: Carvalho, Marco - Eskridge, Thomas C - Bhattacharyya, S - Davis, J
2016  Personal Identity Matching Authors: Marco Carvalho - Mazin Al-Shuaili
2016  An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms Authors: M. Carvalho - M. Atighetchi - F. Yaman - B. Simidchieva
2016  Character Mapping for Cross-Language Authors: Carvalho, Marco - Al-Shuaili, Mazin
2016  Experimentation support for cyber security evaluations Authors: Atighetchi, M. - Carvalho, M. - Last, D. - Simidchieva, B.
2016  Interactive Visualization of Netflow Traffic Authors: Carvalho, M. - Eskridge, T.C. - Thotempudi, H. - Nembhard, F. - Polack, P.J.
2016  Semi-automated wrapping of defenses (SAWD) for cyber command and control Authors: Atighetchi, M. - Carvalho, M. - Eskridge, T.C. - Paltzer, C.N.
2016  A decision engine for configuration of proactive defenses - Challenges and concepts Authors: Atighetchi, M. - Last, D. - Eskridge, T.C. - Benyo, B.
2016  Using ontologies to quantify attack surfaces Authors: Atighetchi, M. - Carvalho, M. - Simidchieva, B. - Paltzer, N. - Eskridge, T. - Yaman, F.
2015  Motion-resolving hover display Authors: Eskridge, Thomas C - Temme, Leonard A - Still, David L
2015  Resilient Command and Control Infrastructures for Cyber Operations Authors: Marco Carvalho
2015  Poster: Image Suitability for Graphical Passwords Authors: Alshehri, Mohammad N. - Crawford, Heather - Mayron, Liam M.
2015  A significant improvement for anti-malware tests Authors: Carvalho, M. - Ford, R.
2015  Coactive Emergence as a Sensemaking Strategy for Cyber Security Work Authors: Carvalho, Marco - Forsythe, Chris - Eskridge, Tom - Bradshaw, Jeffrey M - Woods, David D - Hoffman, Robert R - Bunch, Larry - Kidwell, Dan - Johnson, Matt - Feltovich, Paul J
2015  MIRA: A support infrastructure for cyber command and control operations Authors: Carvalho, M. - Eskridge, T.C. - Paltzer, N. - Ferguson-Walter, K.
2015  Quantifying minimizing attack surfaces containing moving target defenses Authors: M. Carvalho - D. Last - J. Loyall - N. Soule - B. Flatley - D. Myers - B. Simidchieva - F. Yaman - M. Atighetchi - R. Watro
2015  VINE: A cyber emulation environment for MTD experimentation Authors: Carvalho, M. - Eskridge, T.C. - Stoner, E. - Toggweiler, T. - Granados, A.
2015  VINE Authors: Evan Stoner - Marco M. Carvalho - Adrian Granados - Thomas C. Eskridge - Troy Toggweiler
2015  A comparative study of File-Type Identification Techniques Authors: Allen, W.H. - Alamri, N.S.
2015  Usable-Security Evaluation Authors: Yasser M. Hausawi - William H. Allen
2014  Event data visualization tool Authors: Bradshaw, Jeffrey M - Feltovich, Paul J - Eskridge, Thomas C - Johnson, Matthew - Bunch, Lawrence K - Carvalho, Marco M
2014  Authentication in Mobile and Ubiquitous Computing Authors: Crawford, Heather
2014  Exploring Netfow Data using Hadoop  
2014  Efficient spectrum allocation in multiband CSMA networks Authors: Subramanian, S. - Dixon, W.E. - Pasiliao, E.L. - Carvalho, M.M. - Shea, J.M
2014  Empirical models for complex network dynamics: A preliminary study Authors: Carvalho, M. - Oliveira, D.
2014  Heartbleed 101 Authors: Carvalho, M. - Ford, R. - Wheeler, D.A. - Demott, J.
2014  Moving-target defenses for computer networks Authors: Carvalho, M. - Ford, R.
2014  Performance evaluation of static frequency reuse techniques for OFDMA cellular networks Authors: Carvalho, M.M. - Hambebo, B.M. - Ham, F.M.
2014  Protecting me Authors: Carvalho, M. - Ford, R.
2014  Statistical learning approach for robust melanoma screening Authors: Fornaciali, Michel - Carvalho, Micael - Valle, Eduardo - Avila, Sandra
2014  Strategies for spectrum allocation in OFDMA cellular networks Authors: Carvalho, M. - Hambebo, B.M. - Ham, F.
2014  AOA: Ambient obstacle avoidance interface Authors: Eskridge, T. - Johnson, M. - Keller, B. - Chua, W.L.K.
2014  Principles for human-centered interaction design, Part 1: Performative systems Authors: Eskridge, T.C. - Hoffman, R.R. - Still, D.
2014  A taxonomy of file-type identification techniques Authors: Allen, W.H. - Alamri, N.S.
2014  An assessment framework for usable-security based on decision science Authors: Allen, W.H. - Hausawi, Y.M.
2014  Choice-based authentication: A usable-security approach Authors: Allen, W.H. - Hausawi, Y.M. - Bahr, G.S.
2014  RAAODV: A reputation-aware AODV for mobile ad hoc networks Authors: Allen, W.H. - Al-Hamadani, A.
2014  Usablity and security trade-off: A design guideline Authors: Allen, W.H. - Hausawi, Y.M.
2014  Assured Supraliminal Steganography in Computer Games Authors: John Aycock - Daniel Medeiros Nunes de Castro - Vineet Sinha - Anton Mosunov - Heather Crawford - Rashmi Kumari
2014  Invisible, Passive, Continuous and Multimodal Authentication Authors: Heather Crawford - Karen Renaud
2014  Reflections on U-PriSM 2 Authors: Heather Crawford - Sonia Chiasson - Serge Egelman - Pourang Irani
2014   
Understanding user perceptions of transparent authentication on a mobile device
Authors: Heather Crawford - Karen Renaud
2013  A framework for continuous, transparent mobile device authentication Authors: Heather Crawford - Karen Renaud - Tim Storer
2013  An effective method for modeling wind power forecast uncertainty Authors: Mitchell J. Small - Jay Apt - Pedro M. S. Carvalho - Brandon Mauch
2013  A Gaming Environment for Resilient Network Design and Adversarial Co-Evolution Modeling Authors: Carvalho, Marco - Stoner, Evan - McLane, James - Granados, Adrian
2013  A combined discriminative and generative behavior model for cyber physical system defense Authors: Carvalho, M. - Brunza, S. - Dasgupta, D. - McCusker, O. - Vora, S.
2013  A comparison of community identication algorithms for regulatory network motifs Authors: Carvalho, M. - Oliveira, D.
2013  A human-agent teamwork command and control framework for moving target defense (MTC2) Authors: Marco M. Carvalho - James Lott - Thomas C. Eskridge - Larry Bunch - Daniel Kidwell - Adam Dalton - Jeffrey M. Bradshaw - Paul Feltovich
2013  A layered approach to understanding network dependencies on moving target defense mechanisms Authors: Carvalho, M. - Kidwell, D. - Crosby, S.
2013  A scalable approach to network traffic classification for computer network defense using parallel neural network classifier architectures Authors: Carvalho, M. - Hambebo, B.M. - Ham, F.M.
2013  Antimalware software: Do we measure resilience? Authors: Carvalho, M. - Ford, R. - Bishop, M. - Mayron, L.
2013  Cooperation models between humans and artificial self-organizing systems: Motivations, issues and perspectives  Authors: Carvalho, M. - Trentesaux, D. - Rey, G.Z.
2013  Domain and location specific modeling of mobile users online interests  Authors: Carvalho, M. - Moghaddam, S. - Helmy, A.
2013  Infrastructure Security for Smart Electric Grids: A Survey  Authors: Marco Carvalho - Naran M. Pindoriya - Dipti Srinivasan - Dipankar Dasgupta
2013  MTC2: A command and control framework for moving target defense and cyber resilience Authors: Carvalho, M. - Eskridge, T.C. - Kidwell, D. - Bunch, L. - Bradshaw, J.M. - Dalton, A. - Feltovich, P.J. - Hoffman, R. - Shanklin, T.
2013  Optimization and Security Challenges in Smart Power Grids Authors: Marco Carvalho - Vijay Pappu - Panos Pardalos
2013  The language of behavior: Exploring a new formalism for resilient response Authors: Carvalho, M. - Fink, G.A.
2013  Topology design for on-demand dual-path routing in wireless networks Authors: Carvalho, M. - Balasundaram, B. - Sorokin, A. - Boginski, V.
2013  Using network sciences to evaluate the brazilian airline network Authors: Carvalho, M. - Oliveira, D. - Menezes, R.
2013  Visualizing Multi-Agent Systems Authors: Carvalho, Marco - Eskridge, Thomas C - Polack Jr, Peter J
2013  Rational interfaces for effective security software: Polite interaction guidelines for secondary tasks Authors: Allen, W.H. - Bahr, G.S.
2012  System and method of generically detecting the presence of emulated environments Authors: Ford, Richard - Allen, William - Marin, Gerald
2012  CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection Authors: Marco Carvalho - Richard Ford
2012  Sol: An Agent-Based Framework for Cyber Situation Awareness Authors: Marco Carvalho - Tom Eskridge - Paul J. Feltovich - Larry Bunch - Jeffrey M. Bradshaw - Dan Kidwell - Matt Johnson
2012  An adaptive multi-agent-based approach to smart grids control and optimization Authors: Marco Carvalho - Carlos Perez - Adrian Granados
Year: 2012
2012  Preface Authors: Carvalho, M. - Oplatková, Z. - Byrski, A. - Kisiel-Dorohinicki, M.
2012  A hybrid emulation environment for airborne wireless networks Authors: Carvalho, M. - Granados, A. - Poland, B. - Suprenant, J. - Muccio, M. - Pérez, C. - Arguedas, M. - Hague, D.
2012  Advances in Intelligent Modelling and Simulation Authors: Marco Carvalho - Zuzana Oplatková - Marek Kisiel-Dorohinicki - Aleksander Byrski
2012  Command and control requirements for moving-target defense Authors: Carvalho, M. - Kidwell, D. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Hoffman, R.R. - Eskridge, T.
2012  Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna Authors: Marco Carvalho - James Lott - Tom Eskridge - Paul J. Feltovich - Larry Bunch - Jeffrey M. Bradshaw - Andrzej Uszok
2012  NextVC2 - A next generation virtual world command and control Authors: Ford, R. - Carvalho, M.M.
2012  Organic resilience for tactical environments Authors: Carvalho, M. - Pérez, C. - Lamkin, T.
2012  Policy-based governance within Luna: Why we developed yet another agent framework Authors: Carvalho, M. - Lott, J. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Eskridge, T. - Uszok, A.
2012  Supporting COTS applications in tactical edge networks Authors: Morelli, Alessandro - Stefanelli, Cesare - Kohler, Ralph - Suri, Niranjan - Tortonesi, Mauro
2012  Throughput maximization in CSMA networks with collisions Authors: Subramanian, S. - Dixon, W.E. - Pasiliao, E.L. - Carvalho, M.M. - Shea, J.M.
2012  Toward metrics for cyber resilience Authors: Carvalho, Marco M. - Mayron, Liam M. - Ford, Richard - Bishop, Matt
2012  XLAYER: A CROSS-LAYER COMMUNICATIONS SUBSTRATE FOR TACTICAL ENVIRONMENTS Authors: Carvalho, Marco M.
2012  Ontology creation as a sensemaking activity Authors: Eskridge, T.C. - Hoffman, R.
2012  A human-agent teamwork approach to moving target defense command and control Authors: Eskridge, T - Lott, J - Carvalho, M - Hoffman, R - Bradshaw, JM - Feltovich, P - Kidwell, D - Bunch, L
2012  Principles of continuous analogical reasoning Authors: Eskridge, Thomas Charles
2012  Detecting emulated environments Authors: Ford, R. - Allen, W. - Marin, G. - Tilley, S. - Parveen, T.
2011   A Distributed Computing Platform for Heterogeneous Data Processing Authors: Carvalho, Marco - Byrski, Aleksander - Dajda, Jacek - Pietak, Kamil - Kisiel-Dorohinicki, Marek - Arguedas, Marco
2011  An evolutionary multi-agent approach to anomaly detection and cyber defense Authors: Carvalho, M. - Pérez, C.
2011  Automatic discovery of attack messages and pre-and post-conditions for attack graph generation Authors: Carvalho, M. - Teng, C.M.
2011  Dynamic policy-driven quality of service in service-oriented information management systems Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Schmidt, D.C. - Paulos, A. - Loyall, J.P. - Sinclair, A. - Edmondson, J.
2011  Integrated information and network management for end-to-end quality of service Authors: Carvalho, M. - Granados, A. - Gillen, M. - Sinclair, A. - Loyall, J. - Usbeck, K. - Hanna, J.P.
2011  Mission resilience in cloud computing: A biologically inspired approach Authors: Carvalho, M. - Dasgupta, D. - Pérez, C. - Grimaila, M.
Year: 2011
2011  Network traffic classification using a parallel neural network classifier architecture Authors: Carvalho, M. - Ham, F. - Mathewos, B.
2011  Resilience is more than availability Authors: Carvalho, M. - Ford, R. - Bishop, M. - Mayron, L.M.
2011  Secure VM for monitoring industrial process controllers Authors: Carvalho, M. - Dasgupta, D. - Ali, Mohd.H. - Abercrombie, R. - Schlicher, B. - Sheldon, F.
2011  The mLab-PENGWUN hybrid emulation environment for airborne networks Authors: Carvalho, Marco - Granados, Joel Andr{\'e}s - Montoya, Edwin
2011  XTC+: descripción y análisis de un mecanismo de control de topoloǵıa para los MANET Authors: Hoffman, Robert R - Eskridge, Thomas C - Moon, Brian M - Coffey, John W

2011  Skills in applied concept mapping Authors: Allen, W.H. - Alkussayer, A.
2011  Security risk analysis of software architecture based on AHP Authors: Allen, W.H. - Alkussayer, A.
2010  Experiences with practice-focused undergraduate security education Authors: Terrence J. O,Connor - Robert L. Fanelli
2010  Keystroke dynamics: Characteristics and opportunities Authors: Heather Crawford
2010  A Crisis Management Approach to Mission Survivability in Computational Multi-Agent Systems Authors: Carvalho, Marco - Byrski, Aleksander - Kiisiel-Dorohinicki, Marek
2010  A cross-layer approach to mixed-control topology management for MANETs Authors: Carvalho, M. - Granados, A. - Subramanian, S. - Pérez, C.
2010  A directed expansion topology control algorithm for mobile ad-hoc networks Authors: Carvalho, M. - Pérez, C. - Arguedas, M. - Kraus, W. - Hoback, K.
2010  A dynamic and policy-controlled approach to federating information systems Authors: Carvalho, M. - Hillman, R. - Suri, N. - Hanna, J. - Marcon, M. - Breedy, M. - Sinclair, A. - Uszok, A. - Bradshaw, J.M. - Combs, V.
2010 Automated Risk Assessment of Sensor Disclosure in Coalition Operations Authors: Carvalho, Marco - Bradshaw, Jeffrey M. - Perez, Carlos
2010  Configurable and secure system architectures Authors: Carvalho, M. - Dasgupta, D.
2010  Distributed policy learning for the cognitive network management system Authors: Carvalho, M. - Pérez, C. - VanderHorn, N. - Haan, B.
2010  Dynamic policy-driven quality of service in service-oriented systems Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Schmidt, D.C. - Paulos, A. - Loyall, J.P. - Edmondson, J. - Varshneya, P.
2010  Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework Authors: Tom Eskridge - Jeffrey M. Bradshaw - Andrzej Uszok - James Hanna
2010  A scenario-based framework for the security evaluation of software architecture Authors: Allen, W.H. - Alkussayer, A.
2010  Proactive reputation-based defense for MANETs using radial basis function neural networks Authors: Ford, R. - Ham, F.M. - Allen, W. - Imana, E.Y.
2010  The ISDF Framework: Towards Secure Software Development Authors: Allen, William H - Alkussayer, Abdulaziz
2009   Toward instrumenting network warfare competitions to generate labeled datasets Authors: Robert L. Fanelli - T. J. O'Connor - Benjamin Sangster - Thomas Cook - Erik Dean - William J. Adams - Chris Morrell - Gregory Conti
2009   A Naturalistic Exploration of Forms and Functions of Analogizing Authors: Tom Eskridge - Robert R. Hoffman - Cameron Shelley
2009   A distributed reinforcement learning approach to mission survivability in tactical MANETs Authors: Carvalho, M.
2009   Adaptive Security for MANETs via Biology Authors: Carvalho, Marco - Ford, Richard - Allen, William H - Ham, Frederic
2009   Agile Computing and its Applications to Army Tactical Environments Authors: Carvalho, Marco - Tokarcik, L. - Ansaloni, D. - Quitadamo, R. - Rebeschini, M. - Kovach, J. - Benincasa, G. - Tortonesi, M. - Choy, S. - Winkler, R. - Suri, N. - Marcon, M. - Breedy, M. - Bradshaw, Jeffrey M. - Arguedas, M. - Benvegnu, E.
2009  Danger theory and collaborative filtering in MANETs Authors: Carvalho, M. - Ford, R. - Hoffman, K. - Allen, W.H. - Ondi, A. - Brown, D. - Marin, G.A.
2009  Dynamic gateway selection for cross-domain routing with the XLayer communications substrate Authors: Carvalho, M. - Granados, A. - Pérez, C.
2009  Enabling information management systems in tactical network environments Authors: Carvalho, M. - Bradshaw, J.M. - Uszok, A. - Sinclair, A. - Hanna, J.P. - Suri, N. - Ceccio, P.J.
2009  Generic danger detection for mission continuity Authors: Carvalho, M. - Ford, R. - Hoffman, K. - Ondi, A. - Allen, W
2009  Investigating the use of topology adaptation for robust multi-path transport: A preliminary study Authors: Carvalho, M. - Granados, A. - Pérez, C. - Arguedas, M. - Kraus, W. - Hoback, K.
2009  QoS enabled dissemination of managed information objects in a publish-subscribe-query information broker Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Loyall, J.P. - Edmondson, J. - Sinclaire, A. - Corman, D. - Schmidt, D.
2009  Quality of service in US air force information management systems Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Sinclair, A. - Loyall, J. - Marcon, M.
2009  Security in MANETs using reputation-adjusted routing Authors: Carvalho, M. - Ford, R. - Pérez, C. - Hoffman, K. - Ondi, A. - Allen, W.
2009  Supporting Federated Information Spaces with the Joint Battlespace Infosphere (JBI) Platform Authors: Carvalho, Marco - Bradshaw, Jeffrey M. - Suri, Niranjan - Marcon, M. - Breedy, Maggie - Hutchenson, Tim - Hanna, James P. - Uszok, Andrzej - Hillman, Robert
2009  From Tools to Teammates: Joint Activity in Human-Agent-Robot Teams Authors: Maggie Breedy - Jurriaan van Diggelen - Andrzej Uszok - Paul Feltovich - Jeffrey M. Bradshaw - Larry Bunch - Matthew Johnson - Tom Eskridge - James Lott - Hyuckchul Jung
2009  A MANET simulator (M-SIM) with an extended worm propagation epidemic model Authors: Ford, R. - Ham, F.M. - Ondi, A. - Allen, W. - Imana, E. - Reedy, M.
2009  Malware shall greatly increase⋯ Authors: Ford, R. - Allen, W.H.
2009  Reputation prediction in mobile ad hoc networks using RBF neural networks Authors: Ford, R. - Ham, F.M. - Ondi, A. - Allen, W. - Imana, E.Y. - Reedy, M.
2009   
The ISDF framework: Integrating security patterns and best practices
Authors: Allen, W.H. - Alkussayer, A.
2009  Towards Automatic Security Scenario Generation Authors: Allen, William H - Alkussayer, Abdulaziz
2009  Towards secure software development: Integrating security patterns into a secure SDLC Authors: Alkussayer, A - Allen, WH
2008  A cross-layer communications substrate for tactical information management systems Authors: Carvalho, M. - Granados, A. - Hanna, J.P. - Brothers, A. - Naqvi, W. - Turck, K.
2008  A cross-layer predictive routing protocol for mobile ad hoc networks Authors: Carvalho, M. - Pérez, C. - Winkler, R. - Choy, S. - Kovach, J.
2008  A three-tier damage-driven security infrastructure for mission continuity Authors: Carvalho, Marco - Ford, Richard - Allen, William - Marin, Gerald
2008  Agent-based immunological intrusion detection system for mobile Ad-hoc networks Authors: Carvalho, M. - Byrski, A.
2008  Coordinated Operations in Mixed Teams of Humans and Robots Authors: Carvalho, Marco - Johnson, Matt - Bradshaw, Jeffrey M. - Suri, Niranjan - Allen, James - Intlekofer, K. - Jung, Hyuckchul
2008  MANET Simulation and Security: New Wineskins for New Wine? Authors: Carvalho, Marco - Ford, Richard - Perez, Carlos - Allen, William - Marin, G. - Ondi, Attila
2008  Policy management across multiple platforms and application domains Authors: Carvalho, M. - Bradshaw, J.M. - Suri, N. - Johnson, M. - Jung, H.
2008  Securing MANETs with BITSI: danger theory and mission continuity Authors: Carvalho, Marco - Ford, Richard - Allen, William - Marin, Gerald
2008  Security in mobile ad hoc networks Authors: Carvalho, M.
2008  Coordination in human-agent-robot teamwork  Authors: Lott, J. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Eskridge, T. - Uszok, A. - Jung, H. - Breedy, M.R. - Johnson, M.J.
2008  A structuration agency approach to security policy enforcement in mobile ad hoc networks Authors: Ford, Richard - Allen, William - Workman, Michael
2008  One of these things is not like the Others: Collaborative filtering in MANETs Authors: Ford, R. - Hoffman, K. - Marin, G. - Carvalho, M - Ondi, A - Brown, D - Allen, W
2008  Towards the detection of emulated environments via analysis of the stochastic nature of system calls Authors: Ford, R. - Allen, W. - Marin, G. - Tilley, S. - Parveen, T.
2007  A cross-layer communications framework for tactical environments Authors: Carvalho, M. - Arguedas, M. - Breedy, M. - Suri, N. - Rebeschini, M.
2007  A cross-layer communications substrate for tactical communications middleware Authors: Carvalho, M. - Granados, A. - Pérez, C. - Suri, N. - Rebeschini, M.
2007  An Agile Computing Approach to Dynamic and Adpative Service-Oriented Architectures Authors: Carvalho, Marco - Suri, Niranjan - Arguedas, Marco - Breedy, Maggie - Stabellini, S. - Rebeschini, Matteo
2007  BITSI: A Biologically-Inspired Adaptive Defense Framework Authors: Carvalho, M. - Ford, R. - Allen, W.
2007  Network conditions monitoring in the Mockets communications framework Authors: Carvalho, M. - Suri, N. - Tortonesi, M. - Stefanelli, C.
2007  Policy-based bandwidth management for tactical networks with the agile computing middleware Authors: Carvalho, M. - Lott, J. - Bradshaw, J.M. - Arguedas, M. - Breedy, M. - Suri, N. - Tortonesi, M.
2007  How not to be seen Authors: Allen, W.H.
2007  How not to be seen II: The defenders fight back Authors: Allen, W.H.
2007  Mixing wheat with the chaff Authors: Allen, W.H.
2006  N-Version Programming for the Detection of Zero-day Exploits Authors: Ford, Richard - Allen, William H - Nagy, Lajos
2006  Resource and Service Discovery in Wireless AD-HOC Networks with Agile Computing Authors: Carvalho, Marco - Suri, Niranjan - Arguedas, Marco - Breedy, Maggie - Rebeschini, Matteo
2006  A Cross-layer Network Substrate for the Battlefield Authors: Carvalho, Marco - Suri, Niranjan - Lloyd, E. - Shurbanov, V.
2006  A chat interface for human-agent interaction in MAST Authors: Carvalho, M. - Suri, N. - Rebeschini, M. - Horsley, J.
2006  A distributed stand-in agent based algorithm for opportunistic resource allocation Authors: Carvalho, M. - Suri, N. - Pěchouček, M. - Jisl, P. - Benda, P.
2006  Distributed Resource Coordination Strategies for Mobile Ad hoc Networks Authors: Carvalho, Marco
2006  A model-based approach to the security testing of network protocol implementations Authors: Allen, William H - Dou, Chin - Marin, Gerald A
2006  Needles in Haystacks: Practical Intrusion Detection from Theoretical Results Authors: Allen, William H - Marin, Gerald A
2005  Simulation for Evaluating the Usability of Integrated Flight Decks  
2005  A Mobile Agent-Based Middleware for Opportunistic Resource Allocation and Communications Authors: Carvalho, Marco - Suri, Niranjan - Pechoucek, Michal
2005  A mobile agent-based communications middleware for data streaming in the battle Authors: Carvalho, M. - Arguedas, M. - Suri, N.
2005  Concept maps: Integrating knowledge and information visualization Authors: Carvalho, M. - Eskridge, T.C. - Lott, J. - Arguedas, M. - Hill, G. - Cañas, A.J. - Carvajal, R. - Carff, R.
2005  Flexible automated monitoring and notification for complex processes using KARMEN Authors: Carvalho, M. - Bunch, L. - Bradshaw, J.M. - Breedy, M. - Suri, N. - Danks, D.
2005  KARMEN: Multi-agent monitoring and notification for complex processes Authors: Carvalho, M. - Bunch, L. - Bradshaw, J.M. - Breedy, M. - Suri, N.
2005  MAST: Intelligent Roaming Guards for Network and Host Security Authors: Carvalho, Marco - Suri, Niranjan - Breedy, Maggie - Rebeschini, Matteo - Cowin, Tom - Horsley, James