ACI Journal Articles

 

Articles published in scholarly academic journals

Follow

Submissions from 2023

PDF

Constrained Optimization Based Adversarial Example Generation for Transfer Attacks in Network Intrusion Detection Systems, Marc Chale, Bruce Cox, Jeffery Weir, and Nathaniel D. Bastian

PDF

Deep VULMAN: A Deep Reinforcement Learning-enabled Cyber Vulnerability Management Framework, Soumyadeep Hore, Ankit Shah, and Nathaniel D. Bastian

Link

Gaining Competitive Advantages in Cyberspace through the Integration of Breakthrough Technologies in Autonomy, Artificial Intelligence, and Machine Learning, Nathaniel D. Bastian

The Autopilot Problem, Amanda Draeger

Submissions from 2022

Link

An Artificial Intelligence-Enabled Framework for Optimizing the Dynamic Cyber Vulnerability Management Process, Soumyadeep Hore, Ankit Shah, and Nathaniel D. Bastian

Link

A Ranked Solution for Social Media Fact Checking Using Epidemic Spread Modeling, John Smith and Nathaniel D. Bastian

Link

Artificial Intelligence, Real Risks: Understanding - And Mitigating - Vulnerabilities in the Military Use of AI, Nick Starck, David A. Bierbrauer, and Paul Maxwell

Link

Assessing the Army’s Cyber Force Structure, John Fernandes, Nick Starck, Todd Arnold, Jan Kallberg, Charles Suslowicz, and Richard Shmel

PDF

Context-aware Collaborative Neuro-Symbolic Inference in Internet of Battlefield Things, Tarek Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance Kaplan, Mani Srivastava, and Venugopal Veeravalli

Link

Counter-AI Tool System Design for AI System Adversarial Testing and Evaluation, Nate Byington, Carter Davis, Matt Meehan, Caroline Vincent, Dave Woodward, and Nathaniel D. Bastian

Link

Cross-platform Information Spread During the January 6th Capitol Riots, Iain Cruickshank, Lynnette Hui Xian Ng, and Kathleen Carley

Link

Enhancing Military Training Using Extended Reality: A Study of Military Tactics Comprehension, Michael Boyce, Robert Thomson, Joel Cartwright, David T. Feltner, and Ericka Rovira

Link

Generating Realistic Cyber Data for Training and Evaluating Machine Learning Classifiers for Network Intrusion Detection Systems, Marc Chale and Nathaniel D. Bastian

Link

Geospatial Big Data Analytics for Quality Control of Surveys, Benjamin Leehan and Nathaniel D. Bastian

PDF

Mapping State-Sponsored Information Operations with Multi-View Modularity Clustering, Joshua Uyheng, Iain Cruickshank, and Kathleen Carley

PDF

Off-Policy Evaluation for Action-Dependent Non-Stationary Environments, Yash Chandak, Shiv Shankar, Nathaniel D. Bastian, Bruno Castro da Silva, Emma Brunskill, and Philip Thomas

PDF

Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets, Yasir Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John Pavlik, and Nathaniel D. Bastian

PDF

POWs in the Age of the Internet, Jan Kallberg, Mark Visger, Stephen S. Hamilton, and Todd Arnold

Link

Runtime Monitoring of Deep Neural Networks Using Top-Down Context Models Inspired by Predictive Processing and Dual Process Theory, Anirban Roy, Adam Cobb, Nathaniel D. Bastian, Brian Jalaian, and Susmit Jha

PDF

Sharing Cyber Capabilities within the Alliance - Interoperability Through Structured Pre-Authorization Cyber, Jan Kallberg, Todd Arnold, and Stephen S. Hamilton

Link

The Tactical Considerations of Augmented and Mixed Reality Implementation, Jan Kallberg, Victor Beitelman, Victor Mitsouka, Jeremiah Pittman, Michael Boyce, and Todd Arnold

Link

Transfer Learning for Raw Network Traffic Detection, David A. Bierbrauer, Michael De Lucia, Krishna Reddy, Paul Maxwell, and Nathaniel D. Bastian

Submissions from 2021

Link

Adversarial Machine Learning in Network Intrusion Detection Systems, Elie Alhajjar, Paul Maxwell, and Nathaniel D. Bastian

Link

An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions, Sean Devine and Nathaniel D. Bastian

Link

Artificial Intelligence for Defense Applications, Nathaniel D. Bastian

Link

A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models, Kevin Talty, John Stockdale, and Nathaniel D. Bastian

PDF

Bye bye, cyber Pearl Harbor, Jan Kallberg

Link

Challenges and Opportunities for Generative Methods in the Cyber Domain, Marc Chale and Nathaniel D. Bastian

PDF

Creating a Multifarious Cyber Science Major, Raymond Blaine, Jean Blair, Christa Chewar, Rob Harrison, James J. Raftery, and Edward Sobiesk

Link

Cybersecurity Anomaly Detection in Adversarial Environments, David A. Bierbrauer, Alexander Chang, Will Kritzer, and Nathaniel D. Bastian

Link

Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection, Madeline Schneider, David Aspinall, and Nathaniel D. Bastian

Link

Explaining Autonomous Drones: An XAI Journey, Mark Stefik, Peter Pirolli, Robert Thomson, Christian Lebiere, Konstantinos Mitsopoulos, Sterling Somers, and Joel Schooler

Link

Generating Genetic Engineering Linked Indicator Datasets for Machine Learning Classifier Training in Biosecurity, Chris Painter and Nathaniel D. Bastian

PDF

In Great Power Wars, Americans Could Again Become POWs, Jan Kallberg and Todd Arnold

Link

Machine Learning for Raw Network Traffic Detection, Michael De Lucia, Paul Maxwell, Nathaniel D. Bastian, Ananthram Swami, Brian Jalaian, and Nandi Leslie

Link

New Defenses for the Hybrid Battlefield, Paul Maxwell

Link

Persuasive Features of Scientific Explanations: Explanatory Schemata of Physical and Psychosocial Phenomena, Jordan Richard Schonherr and Robert Thomson

Link

Predicting Individual Differences to Cyber Attacks: Knowledge, Arousal, Emotional and Trust Responses, Aryn Pyke, Ericka Rovira, Savannah Murray, Joseph Pritts, Charlotte L. Carp, and Robert Thomson

PDF

Prioritize NATO integration for multidomain operations, Jan Kallberg

Link

Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks, Adam Cobb, Brian Jalaian, Nathaniel D. Bastian, and Stephen Russell

PDF

Solorigate attack — the challenge to cyber deterrence, Jan Kallberg

PDF

The long-term cost of cyber overreaction, Jan Kallberg

Link

Three Things Leaders Need to Know Before Investing in Artificial Intelligence, Jason Courtoy and Nathaniel D. Bastian

Link

Toward a Psychology of Deep Reinforcement Learning Agents Using a Cognitive Architecture, Konstantinos Mitsopoulos, Sterling Somers, Joel Schooler, Christian Lebiere, Peter Pirolli, and Robert Thomson

Link

Toward a Zero Trust Architecture Implementation in a University Environment, Erik Dean, Shane Fonyi, Edward Teague, Chris Morrell, and Michael J. Lanham

Link

Using Side Channel Information and Artificial Intelligence for Malware Detection, Paul Maxwell, David Niblick, and Daniel C. Ruiz

Submissions from 2020

Link

Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities, Tyler Shipp, Daniel Clouse, Michael De Lucia, Metin Ahiskali, Kai Steverson, Jonathan Mullin, and Nathaniel D. Bastian

Link

Algorithm Selection Framework for Cyber Attack Detection, Marc Chale, Nathaniel D. Bastian, and Jeffrey Weir

PDF

Augmented reality: Seeing the benefits is believing, Brett Lindberg and Jan Kallberg

Link

Beyond Traditional Architecture for MDO Applications: the Erlang VM and its Potential, Chris Wilkinson, Nathaniel D. Bastian, and Minseok Kwon

Link

Building the Army’s Artificial Intelligence Workforce, Nathaniel D. Bastian

PDF

COVID-19: The Information Warfare Paradigm Shift, Jan Kallberg, Rosemary A. Burk, and Bhavani Thuraisingham

Cyber Command Needs New Acquisition Authorities, Erica D. Borghard

Electronic Warfare in the Suwalki Gap: Facing the Russian “Accompli Attack”, Jan E. Kallberg, Stephen S. Hamilton, and Matthew G. Sherburne

For ethical artificial intelligence, security is pivotal, Jan Kallberg

PDF

Geometry of the Set of Synchronous Quantum Correlation Sets, Travis Russell

PDF

Government cyber breach shows need for convergence, Charles Suslowicz, Jan Kallberg, and Todd Arnold

High Frequency Communications Features Highs and Lows, Stephen S. Hamilton and Judy Esquibel

PDF

How to protect troops from an assault in the cognitive domain, Jan Kallberg and Stephen S. Hamilton

PDF

If China loses a future war, entropy could be imminent, Jan Kallberg

Link

In an evaporating OODA loop, time is of the essence, Jan Kallberg

Link

Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum, Jean Blair, Christa Chewar, Rajendra K. Raj, and Edward Sobiesk

PDF

Jack Voltaic®: Bolstering Critical Infrastructure Resilience, Robin L. Fontes, Erik Benjamin Korn, Douglas Fletcher, Jason Hillman, Erica Mitchell, and Steven Whitham

Link

Kaggle Competitions in the Classroom: Retrospectives and Recommendations, Daniel C. Ruiz, Douglas Fletcher, Andrew Hall, and Kyle King

Link

Models and Methods for Workforce Planning Under Uncertainty: Optimizing U.S. Army Cyber Branch Readiness and Manning, Nathaniel D. Bastian, Brian Lunday, Christopher Fisher, and Andrew Hall

Physiological versus Self-Report Measures of Arousal During Tactical Training Involving a Synthetic Topographic Environment, Michael Boyce, Cortnee Stainrod, and Aryn Pyke

PDF

Resiliency by Retrograded Communication - the Revival of Shortwave as a Military Communication Channel, Jan Kallberg and Stephen S. Hamilton

Link

Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods, Kathleen Kerwin and Nathaniel D. Bastian

Link

The Spatially Conscious Machine Learning Model, Tim Kiely and Nathaniel D. Bastian

PDF

Two-outcome Synchronous Correlation Sets and Connes' Embedding Problem, Travis Russell

Warrant officers should be the next cyber operators, Jeremiah Pittman and Jan Kallberg

What COVID-19 can teach us about cyber resilience, Jan Kallberg and Stephen S. Hamilton

PDF

What is the rationale behind election interference?, Jan Kallberg

Why Iran would avoid a major cyberwar, Jan Kallberg

Submissions from 2019

Link

Absolute Reduction of Binary Forms, Lubjana Beshaj

Link

After a cyberattack, the waiting is the hardest part, Jan Kallberg

Link

A new mindset for the Army: silent running, Jan Kallberg and Stephen S. Hamilton

PDF

Defense Support to the Private Sector: New Concepts for the DoD's National Cyber Defense Mission, Jason Healey and Erik Benjamin Korn

Link

Digging for Gold: Examining DNS Logs on Windows Clients, Amanda Draeger

PDF

Educating Future Multidisciplinary Cybersecurity Teams, Jean Blair, Andrew Hall, and Edward Sobiesk

Expediting arithmetic automaticity: Do inefficient computation methods induce spontaneous testing effects?, Aryn Pyke, Gary Bourque, and Jo-Anne LeFevre

Link

How the Founding Fathers helped make the US cyber-resilient, Jan Kallberg

Link

How the Pentagon can get more innovation from universities, Jan Kallberg

Link

Information Warfare and its 18th and 19th Century Roots, Nathaniel D. Bastian

Link

Insecure at any bit rate: why Ralph Nader is the true OG of the software design industry, Paul Maxwell and Robert Barnsby

Link

Integrate cyber maintenance into the US Army’s battle rhythm, Stephen S. Hamilton and Jan Kallberg

PDF

Intelligent Feature Engineering for Cybersecurity, Paul Maxwell, Elie Alhajjar, and Nathaniel D. Bastian

Link

Looking for Linux: WSL Key Evidence, Amanda Draeger

Optimization problems with low SWAP tactical computing, Seong Im Mee, Venkat R. Dasari, and Lubjana Beshaj

Link

Putting a value on the 50x coder, Jan Kallberg

Link

Simulation for Cyber Risk Management – Where are we, and Where do we Want to Go?, Sachin Shetty, Indrajit Ray, Nurcin Ceilk, Michael Mesham, Nathaniel D. Bastian, and Quanyan Zhu

Link

Solving the Army’s Cyber Workforce Planning Problem using Stochastic Optimization and Discrete-Event Simulation Modeling, Nathaniel D. Bastian, Christopher Fisher, Andrew Hall, and Brian Lunday

Link

Unforgiven: Russian Intelligence Vengeance as Political Theater and Strategic Messaging, David V. Gioe, Michael S. Goodman, and David S. Frey

Submissions from 2018

Link

5 assumptions that should change how we think about hackbacks, Jan Kallberg

Approximate Dynamic Programming for the Aeromedical Evacuation Dispatching Problem: Value Function Approximation using Multiple Level Aggregation, Matthew Robbins, Phillip Jenkins, Nathaniel D. Bastian, and Brian Lunday

Link

Confidence Building Meaures for the Cyber Domain, Erica D. Borghard and Shawn W. Lonergan

Link

Cyber Operations and Useful Fools: The Approach of Russian Hybrid Intelligence, David V. Gioe

Link

Enhancing Cybersecurity Content in Undergraduate Information Systems Programs: A Way Forward, Rajendra K. Raj, Jean R. S. Blair, Edward Sobiesk, and Allen Parrish

PDF

Explaining Decisions of a Deep Reinforcement Learner with a Cognitive Architecture, Sterling Somers, Constantinos Mitsupoulos, Christian Lebiere, and Robert Thomson

Link

Give Them an Inch, They'll Take a Terabyte: How States May Interpret Tallinn Manual 2.0's International Human Rights Law Chapter, Robert Barnsby and Shane Reeves