Okolica, J. S., Peterson, G. L., Mills, R. F., & Grimaila, M. R. (2018). Sequence pattern mining with variables. IEEE Transactions on Knowledge and Data Engineering, 32(1), 177-187.
Okolica, J. S., & Peterson, G. L. (2011). Windows driver memory analysis: A reverse engineering methodology. computers & security, 30(8), 770-779.
Okolica, J., & Peterson, G. L. (2011). Extracting the windows clipboard from physical memory. digital investigation, 8, S118-S124.
Okolica, J., & Peterson, G. L. (2010). Windows operating systems agnostic memory analysis. Digital investigation, 7, S48-S56.
Okolica, J. S., Peterson, G. L., & Mills, R. F. (2008). Using PLSI-U to detect insider threats by datamining e-mail. International Journal of Security and Networks, 3(2), 114-121.
Okolica, J. S., Peterson, G. L., & Mills, R. F. (2007). Using Author Topic to detect insider threats from email traffic. digital investigation, 4(3-4), 158-164.
Bailey, K. O., Okolica, J. S., & Peterson, G. L. (2014). User identification and authentication using multi-modal behavioral biometrics. Computers & Security, 43, 77-89.
Lapso, J. A., Peterson, G. L., & Okolica, J. S. (2017). Whitelisting system state in windows forensic memory visualizations. Digital Investigation, 20, 2-15.
Book Chapters
Okolica, J. S., Lin, A. C., & Peterson, G. L. (2021). Gaming DevSecOps-A Serious Game Pilot Study. In National Cyber Summit (NCS) Research Track 2020 (pp. 61-77). Springer International Publishing.
Okolica, J., & Peterson, G. (2010). A compiled memory analysis tool. In Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers 6 (pp. 195-204). Springer Berlin Heidelberg.
Okolica, J., Peterson, G., & Mills, R. (2006, January). Using PLSI-U to detect insider threats from email traffic. In IFIP International Conference on Digital Forensics (pp. 91-103). Boston, MA: Springer US.
Schelkoph, D. J., Peterson, G. L., & Okolica, J. S. (2019). Digital forensics event graph reconstruction. In Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings 10 (pp. 185-203). Springer International Publishing.
Peer Reviewed Conference Proceedings
Okolica, J. S., Peterson, G. L., & Mendenhall, M. J. (2020, May). Middleware Unifying Framework for Independent Nodes System (MUFFINS). In The Thirty-Third International Flairs Conference.
Pendleton, A., & Okolica, J. (2019). Creating serious games with the game design matrix. In Games and Learning Alliance: 8th International Conference, GALA 2019, Athens, Greece, November 27–29, 2019, Proceedings 8 (pp. 530-539). Springer International Publishing.
Dodge, D. A., Mullins, B. E., Peterson, G. L., & Okolica, J. S. (2010). Simulating windows-based cyber attacks using live virtual machine introspection.
Okolica, J., McDonald, J. T., Peterson, G. L., Mills, R. F., & Haas, M. W. (2009). Developing systems for cyber situational awareness.
Okolica, J. S., Peterson, G. L., & Mills, R. F. (2006). Using author topic to detect insider threats from email traffic. In Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings 4 (pp. 642-643). Springer Berlin Heidelberg.
Technical Reports
Okolica, J. S. and Peterson, G. L. (2011). Extracting Forensic Artifacts from Winodws O/S Memory, AFIT/EN/TR-11-02, Air Force Institute of Technology.
PhD Thesis
Okolica, J. S. (2017). Temporal Event Abstraction and Reconstruction, AFIT-ENG-DS-17-D-004, Air Force Institute of Technology.
MS Thesis
Okolica, J. S. (2006). Detecting Potential Insider Threats Through Email Datamining, AFIT/GCS/ENG/06-10, Air Force Institute of Technology.