This collection on AFIT Scholar presents scholarly works of the faculty of the Air Force Institute of Technology
The Faculty Publications collection accepts scholarly works that are developed under the auspices of AFIT, and accepted for publication in a journal, or for presentation at a conference. All submissions should be approved for public release before submitting to AFIT Scholar
Secondary materials may be submitted along with an article or conference paper, for the purpose of experimental result repeatability.
To submit your work to AFIT Scholar, please click My Account, sign up if necessary, and once logged in, click submit research. For more information, please see the Policies for Faculty Publications, FAQ and Submission Guidelines.
Submissions from 2008
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, and Kenneth M. Hopkinson
Using PLSI-U to Detect Insider Threats by Datamining Email, James S. Okolica, Gilbert L. Peterson, and Robert F. Mills
Ant Clustering with Locally Weighting Ant Perception and Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, and Thomas L. Kubler
The Importance of Generalizability to Anomaly Detection, Gilbert L. Peterson and Brent T. McBride
Digital Forensics Educational Needs in the Miami Valley Region, Gilbert L. Peterson, Richard A. Raines, and Rusty O. Baldwin
A Secure Group Communication Architecture for Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, and Rusty O. Baldwin
PZT thin films for RF MEMS applications, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey, Hengky Chandrahalim, and Sunil A. Bhave
Magnetic Properties of Transition Metal-Implanted Zno Nanotips Grown On Sapphire and Quartz, Jeremy A. Raley, Yung-Kee Yeo, Robert L. Hengehold, Mee-Yi Ryu, and Pan Wu
Multi-Class Classification Fusion Using Boosting for Identifying Steganography Methods, Benjamin M. Rodriguez and Gilbert L. Peterson
Fusion of Steganalysis Systems Using Bayesian Model Averaging, Benjamin Rodriguez, Gilbert L. Peterson, and Kenneth W. Bauer Jr.
Integrating Trust into the CyberCraft Initiative via the Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, and Stuart H. Kurkowski
Nondestructive Evaluation of Aircraft Composites Using Transmissive Terahertz Time Domain Spectroscopy, Christopher D. Stoik, Matthew J. Bohn, and James L. Blackshire
Optical Phase Unwrapping in the Presence of Branch Points, Todd M. Venema and Jason D. Schmidt
Cyberspace Policy for Critical Infrastructures, Dorsey Wilkin, Richard Raines, Paul Williams, and Kenneth M. Hopkinson
A Systematic Approach for Securing our Space Assets, Heather Yates and Michael R. Grimaila
Submissions from 2007
IE Techniques Aid Air Force Disaster Response, Adedeji B. Badiru, Dave Smith, Michael R. Grimaila, Jeremy Slagley, Patrick Key, and Ad Thal
Running the Blockade: Information Technology, Terrorism, and the Transformation of the Islamic Mass-Culture in the Arab World, Timothy D. Bailey and Michael R. Grimaila
The Evaluation of the Damping Characteristics of a Hard Coating on Titanium, Christopher Blackwell, Anthony N. Palazotto, Tommy George, and Charles J. Cross
Aqueous transduction of poly-SiGe disk resonators, Hengky Chandrahalim, Sunil A. Bhave, Emmanuel P. Quevy, and Roger T. Howe
High-κ dielectrically transduced MEMS thickness shear mode resonators and tunable channel-select RF filters, Hengky Chandrahalim, Dana Weinstein, Lih Feng Cheow, and Sunil A. Bhave
Contact resistance study of noble metals and alloy films using a scanning probe microscope test station, L. Chen, H. Lee, Z. J. Guo, N. E. McGruer, Kevin W. Gilbert, Shankar Maill, Kevin D. Leedy, and G. G. Adams
Management of Information Security: Challenges and Research Directions, Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, and Jackie Rees
A Distributed Approach To Solving Constrained Multiagent Task Scheduling Problems, Kevin Cousin and Gilbert L. Peterson
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, and Gilbert L. Peterson
CyberCraft: Protecting Electronic Systems with Lightweight Agents, Daniel R. Karrels and Gilbert L. Peterson