This collection on AFIT Scholar presents scholarly works of the faculty of the Air Force Institute of Technology
The Faculty Publications collection accepts scholarly works that are developed under the auspices of AFIT, and accepted for publication in a journal, or for presentation at a conference. All submissions should be approved for public release before submitting to AFIT Scholar
Secondary materials may be submitted along with an article or conference paper, for the purpose of experimental result repeatability.
To submit your work to AFIT Scholar, please click My Account, sign up if necessary, and once logged in, click submit research. For more information, please see the Policies for Faculty Publications, FAQ and Submission Guidelines.
Submissions from 2008
PZT thin films for RF MEMS applications, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey, Hengky Chandrahalim, and Sunil A. Bhave
Magnetic Properties of Transition Metal-Implanted Zno Nanotips Grown On Sapphire and Quartz, Jeremy A. Raley, Yung-Kee Yeo, Robert L. Hengehold, Mee-Yi Ryu, and Pan Wu
An Experimental Technique for the Evaluation of Strain Dependent Material Properties of Hard Coatings, Shad A. Reed, Anthony N. Palazotto, and William P. Baker
Multi-Class Classification Fusion Using Boosting for Identifying Steganography Methods, Benjamin M. Rodriguez and Gilbert L. Peterson
Fusion of Steganalysis Systems Using Bayesian Model Averaging, Benjamin Rodriguez, Gilbert L. Peterson, and Kenneth W. Bauer Jr.
Integrating Trust into the CyberCraft Initiative via the Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, and Stuart H. Kurkowski
Nondestructive Evaluation of Aircraft Composites Using Transmissive Terahertz Time Domain Spectroscopy, Christopher D. Stoik *, Matthew J. Bohn, and James L. Blackshire
Optical Phase Unwrapping in the Presence of Branch Points, Todd M. Venema [*] and Jason D. Schmidt
Cyberspace Policy for Critical Infrastructures, Dorsey Wilkin, Richard Raines, Paul Williams, and Kenneth M. Hopkinson
A Systematic Approach for Securing our Space Assets, Heather Yates and Michael R. Grimaila
Submissions from 2007
IE Techniques Aid Air Force Disaster Response, Adedeji B. Badiru, Dave Smith, Michael R. Grimaila, Jeremy Slagley, Patrick Key, and Ad Thal
Running the Blockade: Information Technology, Terrorism, and the Transformation of the Islamic Mass-Culture in the Arab World, Timothy D. Bailey and Michael R. Grimaila
The Evaluation of the Damping Characteristics of a Hard Coating on Titanium, Christopher Blackwell, Anthony N. Palazotto, Tommy George, and Charles J. Cross
Aqueous transduction of poly-SiGe disk resonators, Hengky Chandrahalim, Sunil A. Bhave, Emmanuel P. Quevy, and Roger T. Howe
High-κ dielectrically transduced MEMS thickness shear mode resonators and tunable channel-select RF filters, Hengky Chandrahalim, Dana Weinstein, Lih Feng Cheow, and Sunil A. Bhave
Management of Information Security: Challenges and Research Directions, Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, and Jackie Rees
A Distributed Approach To Solving Constrained Multiagent Task Scheduling Problems, Kevin Cousin and Gilbert L. Peterson
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, and Gilbert L. Peterson
CyberCraft: Protecting Electronic Systems with Lightweight Agents, Daniel R. Karrels and Gilbert L. Peterson
Large Solutions of Semilinear Elliptic Equations under the Keller–Osserman Condition, Alan V. Lair
Using Author Topic to Detect Insider Threats from Email Traffic, James S. Okolica, Gilbert L. Peterson, and Robert F. Mills
Graduate Digital Forensics Education at the Air Force Institute of Technology, Gilbert L. Peterson, Richard A. Raines, and Rusty O. Baldwin
Multi-Class Classification Averaging Fusion for Detecting Steganography, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian
Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian
Steganography Anomaly Detection Using Simple One Class Classification, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian