ACI Journal Articles

 

Articles published in scholarly academic journals

Follow

Submissions from 2019

Link

Absolute Reduction of Binary Forms, Lubjana Beshaj

Expediting arithmetic automaticity: Do inefficient computation methods induce spontaneous testing effects?, Aryn Pyke, Gary Bourque, and Jo-Anne LeFevre

Optimization problems with low SWAP tactical computing, Seong Im Mee, Venkat R. Dasari, and Lubjana Beshaj

Submissions from 2018

Approximate Dynamic Programming for the Aeromedical Evacuation Dispatching Problem: Value Function Approximation using Multiple Level Aggregation, Nathaniel D. Bastian, Matthew Robbins, Phillip Jenkins, and Brian Lunday

Link

Approximate dynamic programming for the aeromedical evacuation dispatching problem: Value function approximation utilizing multiple level aggregation, Matthew Robbins, Phillip Jenkins, Nathaniel D. Bastian, and Brian Lunday

Link

Confidence Building Meaures for the Cyber Domain, Erica D. Borghard and Shawn W. Lonergan

PDF

Crafting a Foundation for Computing Majors, David P. Harvie, Tanya Estes, and Michael Kranch

Link

Cyber Operations and Useful Fools: The Approach of Russian Hybrid Intelligence, David V. Gioe

Cyber operations and useful fools: the approach of Russian hybrid intelligence, David V. Gioe

Link

Enhancing Cybersecurity Content in Undergraduate Information Systems Programs: A Way Forward, Rajendra K. Raj, Jean R. S. Blair, Edward Sobiesk, and Allen Parrish

PDF

Explaining Decisions of a Deep Reinforcement Learner with a Cognitive Architecture, Sterling Somers, Constantinos Mitsupoulos, Christian Lebiere, and Robert Thomson

Link

Give Them an Inch, They'll Take a Terabyte: How States May Interpret Tallinn Manual 2.0's International Human Rights Law Chapter, Robert Barnsby and Shane Reeves

Link

Healthcare market segmentation and data mining: A systematic review, Eric R. Swenson, Nathaniel D. Bastian, and Harriet B. Nembhard

Healthcare Market Segmentation and Data Mining: A Systematic Review, Eric R. Swenson, Nathaniel D. Bastian, and Harriet B. Nembhard

Link

Information Dominance between War and Peace: China as the “Informationized” State, David V. Gioe and Donna V. Artusy

Link

Intelligence Officers Won’t Exit En Masse During the Trump Administration, David V. Gioe

Multi-Period Stochastic Programming Portfolio Optimization for Diversified Funds, Nathaniel D. Bastian and Lawrence V. Fulton

Link

Multiperiod stochastic programming portfolio optimization for diversified funds, Lawrence V. Fulton and Nathaniel D. Bastian

On Prym varieties for the coverings of some singular plane curves, Lubjana Beshaj and Takuya Yamauchi

PDF

Perceptual-cognitive Training Improves Cross-Cultural Communication, Robert Thomson, Michael Boyce, and J.T. Folsom-Kovarik

PDF

Risk Preferences in Future Military Leaders, Patrick Bell, Rozlyn Engel, Darren Hudson, Julian Jamison, and William Skimmyhorn

Link

Russian Intelligence and The Long Arm of Vengeance, David V. Gioe and Michael S. Goodman

Link

Spoofing Prevention via RF Power Profiling in Wireless Network-on-Chip, Brian G. Lebiednik, Sergi Abadal, Hyoukjun Kwon, and Tushar Krishna

PDF

Stockpiling Zero-day Exploits: The Next International Weapons Taboo, Paul Maxwell

PDF

Teaching Modeling to Engineers in an Undergraduate Simulation Course, Vikram Mittal, Robert Kewley, and Brett Lindberg

Link

The case for humanitarian cyber operations, Jan Kallberg

Link

The cyber bases of the future, Jan Kallberg

Link

The Death of the Cyber Generalist, Patrick Bell and Jan Kallberg

Link

The Future Cyber Workforce: Defining the Domain and the Skills, Knowledge, Attributes Necessary for Successful Cyber Performance, Robert Thomson and Jessica Dawson

Link

The Inside Enemy: Weaponization of your Logistical Footprint, Natalie Vanatta and Brian D. Johnson

Link

The Limits of War, David V. Gioe

The Limits of War, David V. Gioe

Link

The opportunities of cyber in arctic warfare, Jan Kallberg

Link

The risks of over-reliance on quantifiable data, Jan Kallberg

Link

The Shutdown and the Spy, David V. Gioe

PDF

The Unforeseen in Unmanned Vehicles, Paul Maxwell and Michael Nowatkowski

Link

Threatcasting: A Framework and Process to Model Future Operating Environments, Natalie Vanatta and Brian D. Johnson

Link

Train, promote and lose: The battle for retention, Jan Kallberg

PDF

Use of Commercial Online Training to Augment Programming Language Education, David P. Harvie, Tanya Estes, and Keith Major

Link

West Point's Defense and Strategic Studies 'War Council' Series (Part II), Andrew Betson, David Raymond, and Matthew Cavanaugh

Link

What do the Trump Administration's Changes to PPD-20 Mean for Offensive Cyber Operations?, Erica D. Borghard and Shawn W. Lonergan

Link

What the Heck Is Threatcasting?, Natalie Vanatta and Brian David Johnson

White board responses: How well does the Army develop strategic leaders?, Jan Kallberg

Submissions from 2017

Link

ACI Threat Trends and Predictions 2017 Report, James Twist

Link

Benchmarking Estonia's Cyber Security: An On-Ramping Methodology for Rapid Adoption and Implementation, Ernest Wong, McKinnon Hokanson, Nancy Porter, and Bing Bing Xie

Link

BOOK REVIEW "Dark Territory: The Secret History of Cyber War" by Fred Kaplan, David V. Gioe

Link

CIA service and sacrifice will continue, no matter who is sitting in the White House, David V. Gioe

Link

Cyber Operational Considerations in Dense Urban Terrain, Paul Maxwell, Andrew Hall, and Daniel Bennett

Link

Envisioning the Future to Empower Action, Natalie Vanatta

Link

Information Warfare isn’t Russian – It’s American as Apple Pie, David V. Gioe and Erick Waage

Link

Innovation and Adaptation in Jihadist Digital Security, Aaron Brantly

Link

Loop-Free Convergence With Unordered Updates, Glenn Robertson

Link

Subverting Reality: The Role of Propaganda in 21st Century Intelligence, Aaron Brantly and Chad W. Fitzgerald

Link

System Dynamics as a Foreign Policy Tool to Resolve the North Korean Dilemma, Ernest Wong and Brendon Cagney

The flaw of immediate cyber counter strikes, Jan Kallberg and Rosemary A. Burk

Link

The History of Fake News, David V. Gioe

Link

The Intelligence Costs of Underestimating Russia: A Warning from History, David V. Gioe and Michael S. Goodman

Link

‘The More Things Change’: HUMINT in the Cyber Age, David V. Gioe

Link

The Unfitness of Traditional Military Thinking in Cyber, Jan Kallberg and Thomas Cook

Link

The Violence of Hacking: State Violence and Cyberspace, Aaron Brantly

Link

Who Will Defend the Nation?, Natalie Vanatta

Submissions from 2016

Link

A Capstone Design Project for Teaching Cybersecurity to Non-technical Users, Tanya Estes, James Finocchiaro, Jean Blair, Johnathan Robison, Justin Dalme, Michael Emana, Luke Jenkins, and Edward Sobiesk

Link

Automated Metrics for Evaluating Adversarial Interfaces, Gregory Conti, Edward Sobiesk, Ryan Tate, and Alexander Farmer

Battlefield Asymmetric Robotic Threat, Christopher Korpela, Daniel Bennett, and Paul Maxwell

Link

Bring on the Cyber Attacks — The Increased Predatory Power of the Reluctant Red Queen in a Nation-State Cyber Conflict, Jan Kallberg and Rosemary A. Burk

Link

Can the Concept of Maneuver Warfare be Usefully Applied in Cyber Operations?, David V. Gioe

Link

Critical Infrastructure Exercise 16.2 – A Transformative Cybersecurity Learning Experience, Doug Rapp and Ernest Wong

Link

Cyber Defense as a part of Hazard Mitigation: Comparing High Hazard Potential Dam Safety Programs in the United States and Sweden, Jan Kallberg and Rosemary A. Burk

Link

Cyber Talent for Unified Land Operations, Rodney D. Harris and Jeffrey D. Morris

Link

Developing Cyber Officers As Operational Leaders, Blake Rhoades and Justin Considine

Link

Disruptive Innovations to Help Protect against Future Threats, Ernest Wong and Nicholas M. Sambaluk

Link

Evaluating Single Board Computer Clusters for Cyber Operations, Suzanne J. Matthews, Raymond Blaine, and Aaron Brantly

Link

Fast and Simple Modular Interpolation Using Factorial Representation, David Thomson, Gary L. Mullen, and Daniel Panario

Link

FBI Cyber: Preventing Tomorrow’s Threats Today, Ernest Wong, Conrad Kress, Keenan Wresch, Nicholas Celfo, and Zoe Schorr

Link

How Smartphones will Reshape the Modern Battlefield, Ernest Wong

Link

Humanitarian Cyber Operations, Jan Kallberg

Link

Humanitarian Cyber Operations: Rapid Response to Crimes against Humanity Utilizing Offensive Cyber Ability, Jan Kallberg

Link

Indiana Exercising Plans to Combat Cyber Threats: Preparing for CRIT-EX 2016, Mike McDonald, Ernest Wong, and Doug Rapp

Link

Just out "It's Too Complicated: Implications of IP-Based Communications...", Steven Bellovin, Matt Blaze, Susan Landau, and Stephanie Pell

Link

Sticks and Stones – Training for Tomorrow’s War Today, Aaron Brantly and Thomas Cook

Link

Strategic Amnesia and ISIS, David V. Gioe

Link

Strategic Broadening for Mid-Career Cyber Leaders, Blake Rhoades and Brian Schultz

Link

#Tech4Terror vs. #Tech4Good, Aaron Brantly

Link

The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace, Aaron Brantly

Link

The Path Dependent Power of a Single Word: The Swedish Case of Bureaucratic Obstruction in the European Public Sector Information (PSI) Directive’s Implementation, Jan Kallberg and Erik Lakomaa

Link

The Value of a One Semester Exposure to the Institutional Review Board Process, Tanya Estes, Linda Mallory, and Edward Sobiesk

Link

Training Future Cyber Officers - An Analysis of the US Army ROTC’s Efforts to Produce Quality Junior Cyber Officers, Andrew Schoka and Blake Rhoades

Link

UHF SATCOM antenna ground plane height reduction using Ni-Zn magneto-dielectric materials, Frank A. Vassallo, Kate J. Duncan, Orion Boylston, Adam Kratch, Daniel T. Bennett, and Juan C. Correa

Link

Why Government Organizations Don’t Care: Perverse Incentives and an Analysis of the OPM Hack, James Twist, Matthew Hutchinson, Blake Rhoades, and Ryan Gagnon

Link

You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era?, Stephanie Pell

Submissions from 2015

Link

Aesop’s Wolves: The Deceptive Appearance of Espionage and Attacks in Cyberspace, Aaron Brantly

Link

A Flexible Modeling Framework for Studying Quantum Key Distribution System Implementation Non-Idealities, Logan Mailoux, Jeffrey Morris, Michael Grimaila, Douglas Hodson, David Jacques, John Columbi, Colin McLaughlin, and Jennifer Holes

Link

Assessing India’s Cyber Resilience: Institutional Stability Matters, Jan Kallberg

Link

A Year of Cyber Professional Development, Natalie Vanatta

Link

Bringing Fear to the Perpetrators – Humanitarian Cyber Operations as Evidence Gathering and Deterrence, Jan Kallberg

Link

Cyber Aptitude Assessment: Finding the Next Generation of Enlisted Cyber Soldiers, Erick Waage and Jeffrey Morris

Link

Cyber Education: A Multi-Level, Multi-Discipline Approach, Edward Sobiesk, Jean Blair, Gregory Conti, Michael J. Lanham, and Howard Taylor

Link

Extremist Forums Provide Digital OpSec Training, Aaron Brantly

Link

Implications of Quantum Information Processing On Military Operations, Jeffrey Morris

Link

Shaping the Army’s Cyber Operations Force: the Human Dimension, Gregory Conti, Rob Harrison, Todd Arnold, and David Raymond