This collection on AFIT Scholar presents scholarly works of the faculty of the Air Force Institute of Technology


The Faculty Publications collection accepts scholarly works that are developed under the auspices of AFIT, and accepted for publication in a journal, or for presentation at a conference. All submissions should be approved for public release before submitting to AFIT Scholar

Secondary materials may be submitted along with an article or conference paper, for the purpose of experimental result repeatability.

To submit your work to AFIT Scholar, please click My Account, sign up if necessary, and once logged in, click submit research. For more information, please see the Policies for Faculty Publications, FAQ and Submission Guidelines.

Follow


Submissions from 2008

PDF

Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, and Kenneth M. Hopkinson

PDF

Using PLSI-U to Detect Insider Threats by Datamining Email, James S. Okolica, Gilbert L. Peterson, and Robert F. Mills

PDF

Ant Clustering with Locally Weighting Ant Perception and Diversified Memory, Gilbert L. Peterson, Christopher B. Mayer, and Thomas L. Kubler

PDF

The Importance of Generalizability to Anomaly Detection, Gilbert L. Peterson and Brent T. McBride

Link

Digital Forensics Educational Needs in the Miami Valley Region, Gilbert L. Peterson, Richard A. Raines, and Rusty O. Baldwin

PDF

A Secure Group Communication Architecture for Autonomous Unmanned Aerial Vehicles, Adrian N. Phillips, Barry E. Mullins, Richard Raines, and Rusty O. Baldwin

PZT thin films for RF MEMS applications, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey, Hengky Chandrahalim, and Sunil A. Bhave

Link

Magnetic Properties of Transition Metal-Implanted Zno Nanotips Grown On Sapphire and Quartz, Jeremy A. Raley, Yung-Kee Yeo, Robert L. Hengehold, Mee-Yi Ryu, and Pan Wu

PDF

Multi-Class Classification Fusion Using Boosting for Identifying Steganography Methods, Benjamin M. Rodriguez and Gilbert L. Peterson

Link

Fusion of Steganalysis Systems Using Bayesian Model Averaging, Benjamin Rodriguez, Gilbert L. Peterson, and Kenneth W. Bauer Jr.

PDF

Integrating Trust into the CyberCraft Initiative via the Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, and Stuart H. Kurkowski

Link

Nondestructive Evaluation of Aircraft Composites Using Transmissive Terahertz Time Domain Spectroscopy, Christopher D. Stoik, Matthew J. Bohn, and James L. Blackshire

PDF

Optical Phase Unwrapping in the Presence of Branch Points, Todd M. Venema and Jason D. Schmidt

Link

Cyberspace Policy for Critical Infrastructures, Dorsey Wilkin, Richard Raines, Paul Williams, and Kenneth M. Hopkinson

PDF

A Systematic Approach for Securing our Space Assets, Heather Yates and Michael R. Grimaila

Submissions from 2007

Link

IE Techniques Aid Air Force Disaster Response, Adedeji B. Badiru, Dave Smith, Michael R. Grimaila, Jeremy Slagley, Patrick Key, and Ad Thal

Running the Blockade: Information Technology, Terrorism, and the Transformation of the Islamic Mass-Culture in the Arab World, Timothy D. Bailey and Michael R. Grimaila

Link

The Evaluation of the Damping Characteristics of a Hard Coating on Titanium, Christopher Blackwell, Anthony N. Palazotto, Tommy George, and Charles J. Cross

Aqueous transduction of poly-SiGe disk resonators, Hengky Chandrahalim, Sunil A. Bhave, Emmanuel P. Quevy, and Roger T. Howe

Link

High-κ dielectrically transduced MEMS thickness shear mode resonators and tunable channel-select RF filters, Hengky Chandrahalim, Dana Weinstein, Lih Feng Cheow, and Sunil A. Bhave

Contact resistance study of noble metals and alloy films using a scanning probe microscope test station, L. Chen, H. Lee, Z. J. Guo, N. E. McGruer, Kevin W. Gilbert, Shankar Maill, Kevin D. Leedy, and G. G. Adams

Link

Management of Information Security: Challenges and Research Directions, Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, and Jackie Rees

Link

A Distributed Approach To Solving Constrained Multiagent Task Scheduling Problems, Kevin Cousin and Gilbert L. Peterson

PDF

An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions, Charles R. Haag, Gary B. Lamont, Paul D. L. Williams, and Gilbert L. Peterson

PDF

CyberCraft: Protecting Electronic Systems with Lightweight Agents, Daniel R. Karrels and Gilbert L. Peterson