
ACI Journal Articles
Articles published in scholarly academic journals
Submissions from 2023
Constrained Optimization Based Adversarial Example Generation for Transfer Attacks in Network Intrusion Detection Systems, Marc Chale, Bruce Cox, Jeffery Weir, and Nathaniel D. Bastian
Deep VULMAN: A Deep Reinforcement Learning-enabled Cyber Vulnerability Management Framework, Soumyadeep Hore, Ankit Shah, and Nathaniel D. Bastian
Gaining Competitive Advantages in Cyberspace through the Integration of Breakthrough Technologies in Autonomy, Artificial Intelligence, and Machine Learning, Nathaniel D. Bastian
The Autopilot Problem, Amanda Draeger
Submissions from 2022
An Artificial Intelligence-Enabled Framework for Optimizing the Dynamic Cyber Vulnerability Management Process, Soumyadeep Hore, Ankit Shah, and Nathaniel D. Bastian
A Ranked Solution for Social Media Fact Checking Using Epidemic Spread Modeling, John Smith and Nathaniel D. Bastian
Artificial Intelligence, Real Risks: Understanding - And Mitigating - Vulnerabilities in the Military Use of AI, Nick Starck, David A. Bierbrauer, and Paul Maxwell
Assessing the Army’s Cyber Force Structure, John Fernandes, Nick Starck, Todd Arnold, Jan Kallberg, Charles Suslowicz, and Richard Shmel
Context-aware Collaborative Neuro-Symbolic Inference in Internet of Battlefield Things, Tarek Abdelzaher, Nathaniel D. Bastian, Susmit Jha, Lance Kaplan, Mani Srivastava, and Venugopal Veeravalli
Counter-AI Tool System Design for AI System Adversarial Testing and Evaluation, Nate Byington, Carter Davis, Matt Meehan, Caroline Vincent, Dave Woodward, and Nathaniel D. Bastian
Cross-platform Information Spread During the January 6th Capitol Riots, Iain Cruickshank, Lynnette Hui Xian Ng, and Kathleen Carley
Enhancing Military Training Using Extended Reality: A Study of Military Tactics Comprehension, Michael Boyce, Robert Thomson, Joel Cartwright, David T. Feltner, and Ericka Rovira
Generating Realistic Cyber Data for Training and Evaluating Machine Learning Classifiers for Network Intrusion Detection Systems, Marc Chale and Nathaniel D. Bastian
Geospatial Big Data Analytics for Quality Control of Surveys, Benjamin Leehan and Nathaniel D. Bastian
Mapping State-Sponsored Information Operations with Multi-View Modularity Clustering, Joshua Uyheng, Iain Cruickshank, and Kathleen Carley
Off-Policy Evaluation for Action-Dependent Non-Stationary Environments, Yash Chandak, Shiv Shankar, Nathaniel D. Bastian, Bruno Castro da Silva, Emma Brunskill, and Philip Thomas
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets, Yasir Farrukh, Irfan Khan, Syed Wali, David A. Bierbrauer, John Pavlik, and Nathaniel D. Bastian
POWs in the Age of the Internet, Jan Kallberg, Mark Visger, Stephen S. Hamilton, and Todd Arnold
Runtime Monitoring of Deep Neural Networks Using Top-Down Context Models Inspired by Predictive Processing and Dual Process Theory, Anirban Roy, Adam Cobb, Nathaniel D. Bastian, Brian Jalaian, and Susmit Jha
Sharing Cyber Capabilities within the Alliance - Interoperability Through Structured Pre-Authorization Cyber, Jan Kallberg, Todd Arnold, and Stephen S. Hamilton
The Tactical Considerations of Augmented and Mixed Reality Implementation, Jan Kallberg, Victor Beitelman, Victor Mitsouka, Jeremiah Pittman, Michael Boyce, and Todd Arnold
Transfer Learning for Raw Network Traffic Detection, David A. Bierbrauer, Michael De Lucia, Krishna Reddy, Paul Maxwell, and Nathaniel D. Bastian
Submissions from 2021
Adversarial Machine Learning in Network Intrusion Detection Systems, Elie Alhajjar, Paul Maxwell, and Nathaniel D. Bastian
An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions, Sean Devine and Nathaniel D. Bastian
Artificial Intelligence for Defense Applications, Nathaniel D. Bastian
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models, Kevin Talty, John Stockdale, and Nathaniel D. Bastian
Bye bye, cyber Pearl Harbor, Jan Kallberg
Challenges and Opportunities for Generative Methods in the Cyber Domain, Marc Chale and Nathaniel D. Bastian
Creating a Multifarious Cyber Science Major, Raymond Blaine, Jean Blair, Christa Chewar, Rob Harrison, James J. Raftery, and Edward Sobiesk
Cybersecurity Anomaly Detection in Adversarial Environments, David A. Bierbrauer, Alexander Chang, Will Kritzer, and Nathaniel D. Bastian
Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection, Madeline Schneider, David Aspinall, and Nathaniel D. Bastian
Explaining Autonomous Drones: An XAI Journey, Mark Stefik, Peter Pirolli, Robert Thomson, Christian Lebiere, Konstantinos Mitsopoulos, Sterling Somers, and Joel Schooler
Generating Genetic Engineering Linked Indicator Datasets for Machine Learning Classifier Training in Biosecurity, Chris Painter and Nathaniel D. Bastian
In Great Power Wars, Americans Could Again Become POWs, Jan Kallberg and Todd Arnold
Machine Learning for Raw Network Traffic Detection, Michael De Lucia, Paul Maxwell, Nathaniel D. Bastian, Ananthram Swami, Brian Jalaian, and Nandi Leslie
New Defenses for the Hybrid Battlefield, Paul Maxwell
Persuasive Features of Scientific Explanations: Explanatory Schemata of Physical and Psychosocial Phenomena, Jordan Richard Schonherr and Robert Thomson
Predicting Individual Differences to Cyber Attacks: Knowledge, Arousal, Emotional and Trust Responses, Aryn Pyke, Ericka Rovira, Savannah Murray, Joseph Pritts, Charlotte L. Carp, and Robert Thomson
Prioritize NATO integration for multidomain operations, Jan Kallberg
Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks, Adam Cobb, Brian Jalaian, Nathaniel D. Bastian, and Stephen Russell
Solorigate attack — the challenge to cyber deterrence, Jan Kallberg
The long-term cost of cyber overreaction, Jan Kallberg
Three Things Leaders Need to Know Before Investing in Artificial Intelligence, Jason Courtoy and Nathaniel D. Bastian
Toward a Psychology of Deep Reinforcement Learning Agents Using a Cognitive Architecture, Konstantinos Mitsopoulos, Sterling Somers, Joel Schooler, Christian Lebiere, Peter Pirolli, and Robert Thomson
Toward a Zero Trust Architecture Implementation in a University Environment, Erik Dean, Shane Fonyi, Edward Teague, Chris Morrell, and Michael J. Lanham
Using Side Channel Information and Artificial Intelligence for Malware Detection, Paul Maxwell, David Niblick, and Daniel C. Ruiz
Submissions from 2020
Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities, Tyler Shipp, Daniel Clouse, Michael De Lucia, Metin Ahiskali, Kai Steverson, Jonathan Mullin, and Nathaniel D. Bastian
Algorithm Selection Framework for Cyber Attack Detection, Marc Chale, Nathaniel D. Bastian, and Jeffrey Weir
Augmented reality: Seeing the benefits is believing, Brett Lindberg and Jan Kallberg
Beyond Traditional Architecture for MDO Applications: the Erlang VM and its Potential, Chris Wilkinson, Nathaniel D. Bastian, and Minseok Kwon
Building the Army’s Artificial Intelligence Workforce, Nathaniel D. Bastian
COVID-19: The Information Warfare Paradigm Shift, Jan Kallberg, Rosemary A. Burk, and Bhavani Thuraisingham
Cyber Command Needs New Acquisition Authorities, Erica D. Borghard
Electronic Warfare in the Suwalki Gap: Facing the Russian “Accompli Attack”, Jan E. Kallberg, Stephen S. Hamilton, and Matthew G. Sherburne
For ethical artificial intelligence, security is pivotal, Jan Kallberg
Geometry of the Set of Synchronous Quantum Correlation Sets, Travis Russell
Government cyber breach shows need for convergence, Charles Suslowicz, Jan Kallberg, and Todd Arnold
High Frequency Communications Features Highs and Lows, Stephen S. Hamilton and Judy Esquibel
How to protect troops from an assault in the cognitive domain, Jan Kallberg and Stephen S. Hamilton
If China loses a future war, entropy could be imminent, Jan Kallberg
In an evaporating OODA loop, time is of the essence, Jan Kallberg
Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum, Jean Blair, Christa Chewar, Rajendra K. Raj, and Edward Sobiesk
Jack Voltaic®: Bolstering Critical Infrastructure Resilience, Robin L. Fontes, Erik Benjamin Korn, Douglas Fletcher, Jason Hillman, Erica Mitchell, and Steven Whitham
Kaggle Competitions in the Classroom: Retrospectives and Recommendations, Daniel C. Ruiz, Douglas Fletcher, Andrew Hall, and Kyle King
Models and Methods for Workforce Planning Under Uncertainty: Optimizing U.S. Army Cyber Branch Readiness and Manning, Nathaniel D. Bastian, Brian Lunday, Christopher Fisher, and Andrew Hall
Physiological versus Self-Report Measures of Arousal During Tactical Training Involving a Synthetic Topographic Environment, Michael Boyce, Cortnee Stainrod, and Aryn Pyke
Resiliency by Retrograded Communication - the Revival of Shortwave as a Military Communication Channel, Jan Kallberg and Stephen S. Hamilton
Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods, Kathleen Kerwin and Nathaniel D. Bastian
The Spatially Conscious Machine Learning Model, Tim Kiely and Nathaniel D. Bastian
Two-outcome Synchronous Correlation Sets and Connes' Embedding Problem, Travis Russell
Warrant officers should be the next cyber operators, Jeremiah Pittman and Jan Kallberg
What COVID-19 can teach us about cyber resilience, Jan Kallberg and Stephen S. Hamilton
What is the rationale behind election interference?, Jan Kallberg
Why Iran would avoid a major cyberwar, Jan Kallberg
Submissions from 2019
Absolute Reduction of Binary Forms, Lubjana Beshaj
After a cyberattack, the waiting is the hardest part, Jan Kallberg
A new mindset for the Army: silent running, Jan Kallberg and Stephen S. Hamilton
Defense Support to the Private Sector: New Concepts for the DoD's National Cyber Defense Mission, Jason Healey and Erik Benjamin Korn
Digging for Gold: Examining DNS Logs on Windows Clients, Amanda Draeger
Educating Future Multidisciplinary Cybersecurity Teams, Jean Blair, Andrew Hall, and Edward Sobiesk
Expediting arithmetic automaticity: Do inefficient computation methods induce spontaneous testing effects?, Aryn Pyke, Gary Bourque, and Jo-Anne LeFevre
How the Founding Fathers helped make the US cyber-resilient, Jan Kallberg
How the Pentagon can get more innovation from universities, Jan Kallberg
Information Warfare and its 18th and 19th Century Roots, Nathaniel D. Bastian
Insecure at any bit rate: why Ralph Nader is the true OG of the software design industry, Paul Maxwell and Robert Barnsby
Integrate cyber maintenance into the US Army’s battle rhythm, Stephen S. Hamilton and Jan Kallberg
Intelligent Feature Engineering for Cybersecurity, Paul Maxwell, Elie Alhajjar, and Nathaniel D. Bastian
Looking for Linux: WSL Key Evidence, Amanda Draeger
Optimization problems with low SWAP tactical computing, Seong Im Mee, Venkat R. Dasari, and Lubjana Beshaj
Putting a value on the 50x coder, Jan Kallberg
Simulation for Cyber Risk Management – Where are we, and Where do we Want to Go?, Sachin Shetty, Indrajit Ray, Nurcin Ceilk, Michael Mesham, Nathaniel D. Bastian, and Quanyan Zhu
Solving the Army’s Cyber Workforce Planning Problem using Stochastic Optimization and Discrete-Event Simulation Modeling, Nathaniel D. Bastian, Christopher Fisher, Andrew Hall, and Brian Lunday
Unforgiven: Russian Intelligence Vengeance as Political Theater and Strategic Messaging, David V. Gioe, Michael S. Goodman, and David S. Frey
Submissions from 2018
5 assumptions that should change how we think about hackbacks, Jan Kallberg
Approximate Dynamic Programming for the Aeromedical Evacuation Dispatching Problem: Value Function Approximation using Multiple Level Aggregation, Matthew Robbins, Phillip Jenkins, Nathaniel D. Bastian, and Brian Lunday
Confidence Building Meaures for the Cyber Domain, Erica D. Borghard and Shawn W. Lonergan
Cyber Operations and Useful Fools: The Approach of Russian Hybrid Intelligence, David V. Gioe
Enhancing Cybersecurity Content in Undergraduate Information Systems Programs: A Way Forward, Rajendra K. Raj, Jean R. S. Blair, Edward Sobiesk, and Allen Parrish
Explaining Decisions of a Deep Reinforcement Learner with a Cognitive Architecture, Sterling Somers, Constantinos Mitsupoulos, Christian Lebiere, and Robert Thomson
Give Them an Inch, They'll Take a Terabyte: How States May Interpret Tallinn Manual 2.0's International Human Rights Law Chapter, Robert Barnsby and Shane Reeves