This collection on AFIT Scholar presents scholarly works of the faculty of the Air Force Institute of Technology
The Faculty Publications collection accepts scholarly works that are developed under the auspices of AFIT, and accepted for publication in a journal, or for presentation at a conference. All submissions should be approved for public release before submitting to AFIT Scholar
Secondary materials may be submitted along with an article or conference paper, for the purpose of experimental result repeatability.
To submit your work to AFIT Scholar, please click My Account, sign up if necessary, and once logged in, click submit research. For more information, please see the Policies for Faculty Publications, FAQ and Submission Guidelines.
Submissions from 2007
Analysis of an unreliable retrial queue in a random environment, James D. Cordeiro Jr. and Jeffrey P. Kharoufeh
A Distributed Approach To Solving Constrained Multiagent Task Scheduling Problems, Kevin Cousin and Gilbert L. Peterson
Analyzing security measures for mobile ad hoc networks using attack and protection trees, Kenneth S. Edge, Richard A. Raines, Rusty O. Baldwin, Michael R. Grimaila, Christopher E. Reuter, and Robert Bennington
The Use of attack and protection trees to analyze security for an online banking system, Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert Bennington, and Christopher E. Reuter
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, and Gilbert L. Peterson
Applying a Secure and Efficient Low Earth Orbit Satellite-Based Multicast Architecture in a Deployed Environment, Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, and Michael R. Grimaila
Improving satellite multicast security scalability by reducing rekeying requirements, Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, and Michael R. Grimaila
Multiple leg fuel-optimal trajectories for hovering satellites, David J. Irvin Jr. and Richard G. Cobb
CyberCraft: Protecting Electronic Systems with Lightweight Agents, Daniel R. Karrels and Gilbert L. Peterson
Large Solutions of Semilinear Elliptic Equations under the Keller–Osserman Condition, Alan V. Lair
A Trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks, Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, and Barry E. Mullins
Wireless sensor networks: Guidelines for design and a survey of current research, Christopher R. Mann, Rusty O. Baldwin, and Barry E. Mullins
Matrix albedo for discrete ordinates infinite-medium boundary condition, Kirk A. Mathews and James R. Dishaw
Temperature Dependent Electrical Characteristics of Neutron Irradiated AlGaN/GaN HFETs, John W. McClory and James C. Petrosky
An Analysis of the Effects of Low-Energy Electron Irradiation of AlGaN / GaN HFETs, John W. McClory, James C. Petrosky, James M. Sattler, and Thomas Jarzen
Demonstration of hybrid AlxGa1-xAs-polysilicon microelectromechanical tunable filter, Edward M. Ochoa, Thomas R. Nelson Jr., Robert G. Bedford, James E. Ehret, LaVerne A. Starman, Michael Harvey, Travis Anderson, and Fan Ren
Using Author Topic to Detect Insider Threats from Email Traffic, James S. Okolica, Gilbert L. Peterson, and Robert F. Mills
Graduate Digital Forensics Education at the Air Force Institute of Technology, Gilbert L. Peterson, Richard A. Raines, and Rusty O. Baldwin
Surface chemistry of fluorine containing ionic liquids on steel substrates at elevated temperature using Mössbauer spectroscopy, B. S. Phillips, George John, and J. S. Zabinski
Image synthesis from a series of coherent frames of pupil intensity, James D. Phillips and Stephen C. Cain
Issues and approaches for navigation using signals of opportunity, John F. Raquet, Mikel M. Miller, and Thao Q. Nguyen
An Experimental Technique for the Evaluation of Strain Dependent Material Properties of Hard Coatings, Shad A. Reed, Anthony N. Palazotto, and William P. Baker
Detecting Steganography Using Multi-class Classification, Benjamin M. Rodriguez and Gilbert L. Peterson
Multi-Class Classification Averaging Fusion for Detecting Steganography, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian
Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian