Most Recent Additions*

Link

Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files
Adam Duby, Teryl Taylor, Gedare Bloom, and Yanyan Zhuang

Link

Resting Energy Expenditure: From Cellular to Whole-Body Level, a Mechanistic Historical Perspective.
Steven B Heymsfield, Brooke Smith, Jared Dahle, Samantha Kennedy, Nicole Fearnbach, Diana M Thomas, Anja Bosy-Westphal, and Manfred J Müller

Link

Performance tradeoffs for spare parts supply chains with additive manufacturing capability servicing intermittent demand
Kyle C. McDermott, Ryan D. Winz, Thom J. Hodgson, Russell E. King, and Brandon M. McConnell

Link

Designing and Analyzing an Underbody Plate for an Armored Vehicle Subjected to Blast
Jesus Carrillo, Jarrett Justice, Tyler Kim, Courtney Loomis, and Kevin McMullen

PDF

CBRNE Task Forces
James B. Burton, Fred J Burpo, and Elmore F. Smoak

PDF

Profit-Minded Suppliers: The WMD Pathways and Combating Convergence
Stephen Hummel, Douglas McNair, Fred J Burpo, and James Bonner

PDF

Combating Dengue: A US Military Perspective
Vanessa R. Melanson, Madeline Ryu, Megan Gagnon, Grant Hall, Kristina Mackey, Jessica Min, Michael Turner, Fred J Burpo, and Jason Barnhill

PDF

Engineered Pathogens and Unnatural Biological Weapons: The Future Threat of Synthetic Biology
John K. Wickiser, Kevin O'Donovan, Michael Washington, Stephen Hummel, and Fred J Burpo

Link

The Effectiveness of Virtual Reality for Training Human-Robot Teams
Colin Jones, Charles O'Donnell, Rob Semmens, and Michael Novitzky

Link

A Monte Carlo Approach to Closing the Reality Gap
Damian Lyons, James C. Finocchiaro, Michael Novitzky, and Christopher Korpela

Link

Predicting Phishing Vulnerabilities Using Machine Learning
Ray Blaine, Sarah Rutherford, and Kevin Lin

*Updated as of 08/13/22.