ACI Journal Articles

 

Articles published in scholarly academic journals

Follow

Submissions from 2018

Link

A Flexible Modeling Framework for Studying Quantum Key Distribution System Implementation Non-Idealities, Logan Mailoux, Jeffrey Morris, Michael Grimaila, Douglas Hodson, David Jacques, John Columbi, Colin McLaughlin, and Jennifer Holes

Link

Spoofing Prevention via RF Power Profiling in Wireless Network-on-Chip, Brian G. Lebiednik, Sergi Abadal, Hyoukjun Kwon, and Tushar Krishna

PDF

Stockpiling Zero-day Exploits: The Next International Weapons Taboo, Paul Maxwell

Link

The Death of the Cyber Generalist, Patrick Bell and Jan Kallberg

Link

The Future Cyber Workforce: Defining the Domain and the Skills, Knowledge, Attributes Necessary for Successful Cyber Performance, Robert Thomson and Jessica Dawson

Link

Towards a Cyber Common Operating Picture, Gregory Conti, John Nelson, and David Raymond

Link

West Point's Defense and Strategic Studies 'War Council' Series (Part II), Andrew Betson, David Raymond, and Matthew Cavanaugh

Link

What the Heck Is Threatcasting?, Natalie Vanatta and Brian David Johnson

Submissions from 2017

Link

ACI Threat Trends and Predictions 2017 Report, James Twist

Link

Benchmarking Estonia's Cyber Security: An On-Ramping Methodology for Rapid Adoption and Implementation, Ernest Wong, McKinnon Hokanson, Nancy Porter, and Bing Bing Xie

Link

Cyber Operational Considerations in Dense Urban Terrain, Paul Maxwell, Andrew Hall, and Daniel Bennett

Link

Envisioning the Future to Empower Action, Natalie Vanatta

Link

Innovation and Adaptation in Jihadist Digital Security, Aaron Brantly

Link

Loop-Free Convergence With Unordered Updates, Glenn Robertson

Link

Subverting Reality: The Role of Propaganda in 21st Century Intelligence, Aaron Brantly and Chad W. Fitzgerald

Link

System Dynamics as a Foreign Policy Tool to Resolve the North Korean Dilemma, Ernest Wong and Brendon Cagney

Link

The Intelligence Costs of Underestimating Russia: A Warning from History, David V. Gioe and Michael S. Goodman

Link

The Unfitness of Traditional Military Thinking in Cyber, Jan Kallberg and Thomas Cook

Link

The Violence of Hacking: State Violence and Cyberspace, Aaron Brantly

Link

Who Will Defend the Nation?, Natalie Vanatta

Submissions from 2016

Link

A Capstone Design Project for Teaching Cybersecurity to Non-technical Users, Tanya Estes, James Finocchiaro, Jean Blair, Johnathan Robison, Justin Dalme, Michael Emana, Luke Jenkins, and Edward Sobiesk

Link

Automated Metrics for Evaluating Adversarial Interfaces, Gregory Conti, Edward Sobiesk, Ryan Tate, and Alexander Farmer

Link

Bring on the Cyber Attacks — The Increased Predatory Power of the Reluctant Red Queen in a Nation-State Cyber Conflict, Jan Kallberg and Rosemary A. Burk

Link

Critical Infrastructure Exercise 16.2 – A Transformative Cybersecurity Learning Experience, Doug Rapp and Ernest Wong

Link

Cyber Defense as a part of Hazard Mitigation: Comparing High Hazard Potential Dam Safety Programs in the United States and Sweden, Jan Kallberg and Rosemary A. Burk

Link

Cyber Talent for Unified Land Operations, Rodney D. Harris and Jeffrey D. Morris

Link

Developing Cyber Officers As Operational Leaders, Blake Rhoades and Justin Considine

Link

Disruptive Innovations to Help Protect against Future Threats, Ernest Wong and Nicholas M. Sambaluk

Link

Evaluating Single Board Computer Clusters for Cyber Operations, Suzanne J. Matthews, Raymond Blaine, and Aaron Brantly

Link

Fast and Simple Modular Interpolation Using Factorial Representation, David Thomson, Gary L. Mullen, and Daniel Panario

Link

FBI Cyber: Preventing Tomorrow’s Threats Today, Ernest Wong, Conrad Kress, Keenan Wresch, Nicholas Celfo, and Zoe Schorr

Link

How Smartphones will Reshape the Modern Battlefield, Ernest Wong

Link

Humanitarian Cyber Operations, Jan Kallberg

Link

Humanitarian Cyber Operations: Rapid Response to Crimes against Humanity Utilizing Offensive Cyber Ability, Jan Kallberg

Link

Indiana Exercising Plans to Combat Cyber Threats: Preparing for CRIT-EX 2016, Mike McDonald, Ernest Wong, and Doug Rapp

Link

Just out "It's Too Complicated: Implications of IP-Based Communications...", Steven Bellovin, Matt Blaze, Susan Landau, and Stephanie Pell

Link

Sticks and Stones – Training for Tomorrow’s War Today, Aaron Brantly and Thomas Cook

Link

Strategic Broadening for Mid-Career Cyber Leaders, Blake Rhoades and Brian Schultz

Link

#Tech4Terror vs. #Tech4Good, Aaron Brantly

Link

The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace, Aaron Brantly

Link

The Path Dependent Power of a Single Word: The Swedish Case of Bureaucratic Obstruction in the European Public Sector Information (PSI) Directive’s Implementation, Jan Kallberg and Erik Lakomaa

Link

The Value of a One Semester Exposure to the Institutional Review Board Process, Tanya Estes, Linda Mallory, and Edward Sobiesk

Link

Training Future Cyber Officers - An Analysis of the US Army ROTC’s Efforts to Produce Quality Junior Cyber Officers, Andrew Schoka and Blake Rhoades

Link

UHF SATCOM antenna ground plane height reduction using Ni-Zn magneto-dielectric materials, Frank A. Vassallo, Kate J. Duncan, Orion Boylston, Adam Kratch, Daniel T. Bennett, and Juan C. Correa

Link

Why Government Organizations Don’t Care: Perverse Incentives and an Analysis of the OPM Hack, James Twist, Matthew Hutchinson, Blake Rhoades, and Ryan Gagnon

Link

You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era?, Stephanie Pell

Submissions from 2015

Link

Aesop’s Wolves: The Deceptive Appearance of Espionage and Attacks in Cyberspace, Aaron Brantly

Link

Assessing India’s Cyber Resilience: Institutional Stability Matters, Jan Kallberg

Link

A Year of Cyber Professional Development, Natalie Vanatta

Link

Bringing Fear to the Perpetrators – Humanitarian Cyber Operations as Evidence Gathering and Deterrence, Jan Kallberg

Link

Cyber Aptitude Assessment: Finding the Next Generation of Enlisted Cyber Soldiers, Erick Waage and Jeffrey Morris

Link

Cyber Education: A Multi-Level, Multi-Discipline Approach, Edward Sobiesk, Jean Blair, Gregory Conti, Michael J. Lanham, and Howard Taylor

Link

Extremist Forums Provide Digital OpSec Training, Aaron Brantly

Link

Implications of Quantum Information Processing On Military Operations, Jeffrey Morris

Link

Shaping the Army’s Cyber Operations Force: the Human Dimension, Gregory Conti, Rob Harrison, Todd Arnold, and David Raymond

Link

Strategic Cyber Maneuver, Aaron Brantly

Link

Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber Operations, Jan Kallberg

Submissions from 2014

Link

A Lot More Than a Pen Register, and Less Than a Wiretap: What the StingRay Teaches Us About How Congress Should Approach the Reform of Law Enforcement Surveillance Authorities, Stephanie Pell and Christopher Soghoian

Link

Cyber Actions by State Actors: Motivation and Utility, Aaron Brantly

Link

Deconstructing the Relationship Between Privacy and Security, Gregory Conti, Lisa Shay, and Woodrow Hartzog

Link

Key Terrain in Cyberspace: Seeking the High Ground, David Raymond, Tom Cross, Gregory Conti, and Michael Nowatkowski

Link

Six Shades of Gray: Increasing Nuance and Variable Pragmatism in Russian Middle East Policy, David V. Gioe and Jeremey Parkhurst

Link

The Cyber Losers, Aaron Brantly

Link

Tinker, Tailor, Leaker, Spy: The Future Costs of Mass Leaks, David V. Gioe

Link

Towards A Career Path in Cyberspace, Gregory Conti, Rob Harrison, and Todd Arnold

Link

Towards a Cyber Leader Course Modeled on Army Ranger School, Gregory Conti, Michael Weigand, Ed Skoudis, Thomas Cook, David Raymond, and Todd Arnold

Link

Using the Discrete Event System Specification to Model Quantum Key Distribution System Components, Jeffrey Morris, Michael Grimaila, Douglas Hodson, Colin McLaughlin, and David Jacques

Link

Your Secret StingRay's No Secret Anymore: The Vanishing Government Monopoly Over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy, Stephanie Pell and Christopher Soghoian

Submissions from 2013

Link

A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons, David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli

Link

Beyond Sunglasses and Spray Paint: a Taxonomy of Surveillance Countermeasures, Lisa Shay, Gregory Conti, and Woodrow Hartzog

Link

Jonesing For A Privacy Mandate, Getting A Technology Fix--Doctrine to Follow, Stephanie Pell

Link

The Silver Lining of Russian Involvement in Syria, David V. Gioe

Link

Using Virtual Machines To Improve Learning and Save Resources in an Introductory IT Course, Geoff Stoker, Todd Arnold, and Paul Maxwell

Submissions from 2012

Link

Can You See Me Now? Toward Reasonable Standards for Law Enforcement Access to Location Data That Congress Could Enact, Stephanie Pell and Christopher Soghoian

Link

Preventing a Digital Pearl Harbor, Gregory Conti and David Raymond

Link

Systematic Government Access to Private-Sector Data in the United States, Stephanie Pell

Link

The Case for Cyber, Gregory Conti, Jon Brickey, Jacob Cox, and John Nelson

Link

Unintended, Malicious, and Evil Applications of Augmented Reality, Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Cory Kirk, Alexander Farmer, Patrick Shaffer, and Kyle Stammer

Link

When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat, Thomas Cook, Gregory Conti, and David Raymond

Link

Why Your Intuition About Cyber Warfare is Probably Wrong, Matthew Miller, Jon Brickey, and Gregory Conti