This collection on AFIT Scholar presents scholarly works of the faculty of the Air Force Institute of Technology
The Faculty Publications collection accepts scholarly works that are developed under the auspices of AFIT, and accepted for publication in a journal, or for presentation at a conference. All submissions should be approved for public release before submitting to AFIT Scholar
Secondary materials may be submitted along with an article or conference paper, for the purpose of experimental result repeatability.
To submit your work to AFIT Scholar, please click My Account, sign up if necessary, and once logged in, click submit research. For more information, please see the Policies for Faculty Publications, FAQ and Submission Guidelines.
Submissions from 2008
Nondestructive Evaluation of Aircraft Composites Using Transmissive Terahertz Time Domain Spectroscopy, Christopher D. Stoik *, Matthew J. Bohn, and James L. Blackshire
Optical Phase Unwrapping in the Presence of Branch Points, Todd M. Venema [*] and Jason D. Schmidt
Cyberspace Policy for Critical Infrastructures, Dorsey Wilkin, Richard Raines, Paul Williams, and Kenneth M. Hopkinson
A Systematic Approach for Securing our Space Assets, Heather Yates and Michael R. Grimaila
Submissions from 2007
IE Techniques Aid Air Force Disaster Response, Adedeji B. Badiru, Dave Smith, Michael R. Grimaila, Jeremy Slagley, Patrick Key, and Ad Thal
Running the Blockade: Information Technology, Terrorism, and the Transformation of the Islamic Mass-Culture in the Arab World, Timothy D. Bailey and Michael R. Grimaila
The Evaluation of the Damping Characteristics of a Hard Coating on Titanium, Christopher Blackwell, Anthony N. Palazotto, Tommy George, and Charles J. Cross
Aqueous transduction of poly-SiGe disk resonators, Hengky Chandrahalim, Sunil A. Bhave, Emmanuel P. Quevy, and Roger T. Howe
High-κ dielectrically transduced MEMS thickness shear mode resonators and tunable channel-select RF filters, Hengky Chandrahalim, Dana Weinstein, Lih Feng Cheow, and Sunil A. Bhave
Management of Information Security: Challenges and Research Directions, Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, and Jackie Rees
A Distributed Approach To Solving Constrained Multiagent Task Scheduling Problems, Kevin Cousin and Gilbert L. Peterson
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, and Gilbert L. Peterson
CyberCraft: Protecting Electronic Systems with Lightweight Agents, Daniel R. Karrels and Gilbert L. Peterson
Large Solutions of Semilinear Elliptic Equations under the Keller–Osserman Condition, Alan V. Lair
Using Author Topic to Detect Insider Threats from Email Traffic, James S. Okolica, Gilbert L. Peterson, and Robert F. Mills
Graduate Digital Forensics Education at the Air Force Institute of Technology, Gilbert L. Peterson, Richard A. Raines, and Rusty O. Baldwin
Multi-Class Classification Averaging Fusion for Detecting Steganography, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian
Steganalysis Feature Improvement Using Expectation Maximization, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian
Steganography Anomaly Detection Using Simple One Class Classification, Benjamin M. Rodriguez, Gilbert L. Peterson, and Sos S. Agaian
Detecting Steganography Using Multi-class Classification, Benjamin Rodriguez and Gilbert L. Peterson
Effects of Cross-Sectional Dimensions on Active Noise Control in Rectangular and Round Ducts, Jeremy M. Slagley and Steven Guffey
Effects of Cross-Sectional Partitioning on Active Noise Control in Round Ducts, Jeremy M. Slagley and Steven Guffey
An Explanation of SRS Beam Cleanup in Graded-index Fibers and the Absence of SRS Beam Cleanup in Step-index Fibers, Nathan B. Terry, Thomas G. Alley, and Timothy H. Russell
Use of a Continuous Wave Raman Fiber Laser in Graded-index Multimode Fiber for SRS Beam Combination, Nathan B. Terry, Kevin T. Engel, Thomas G. Alley, and Timothy H. Russell
Analysis of Tools for Detecting Rootkits and Hidden Processes, A. Todd, J. Benson, Gilbert L. Peterson, T. Franz, M. Stevens, and Richard Raines