Dr. James Jimmy S. Okolica, Adjunct Assistant Professor of Computer Science

Bio Photo

 

Contact:
Comm: 937-255-3636 x7255
DSN: 986-3636 x7255
Click to E-mail
View Department

Publications

Journal Articles

  • Okolica, J. S., Peterson, G. L., Mills, R. F., & Grimaila, M. R. (2018). Sequence pattern mining with variables. IEEE Transactions on Knowledge and Data Engineering32(1), 177-187.
  • Okolica, J. S., & Peterson, G. L. (2011). Windows driver memory analysis: A reverse engineering methodology. computers & security30(8), 770-779.
  • Okolica, J., & Peterson, G. L. (2011). Extracting the windows clipboard from physical memory. digital investigation8, S118-S124.
  • Okolica, J., & Peterson, G. L. (2010). Windows operating systems agnostic memory analysis. Digital investigation7, S48-S56.
  • Okolica, J. S., Peterson, G. L., & Mills, R. F. (2008). Using PLSI-U to detect insider threats by datamining e-mail. International Journal of Security and Networks3(2), 114-121.
  • Okolica, J. S., Peterson, G. L., & Mills, R. F. (2007). Using Author Topic to detect insider threats from email traffic. digital investigation4(3-4), 158-164.
  • Bailey, K. O., Okolica, J. S., & Peterson, G. L. (2014). User identification and authentication using multi-modal behavioral biometrics. Computers & Security43, 77-89.
  • Lapso, J. A., Peterson, G. L., & Okolica, J. S. (2017). Whitelisting system state in windows forensic memory visualizations. Digital Investigation20, 2-15.

 

Book Chapters

  • Okolica, J. S., Lin, A. C., & Peterson, G. L. (2021). Gaming DevSecOps-A Serious Game Pilot Study. In National Cyber Summit (NCS) Research Track 2020 (pp. 61-77). Springer International Publishing.
  • Okolica, J., & Peterson, G. (2010). A compiled memory analysis tool. In Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers 6 (pp. 195-204). Springer Berlin Heidelberg.
  • Okolica, J., Peterson, G., & Mills, R. (2006, January). Using PLSI-U to detect insider threats from email traffic. In IFIP International Conference on Digital Forensics (pp. 91-103). Boston, MA: Springer US.
  • Schelkoph, D. J., Peterson, G. L., & Okolica, J. S. (2019). Digital forensics event graph reconstruction. In Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings 10 (pp. 185-203). Springer International Publishing.

 

Peer Reviewed Conference Proceedings

  • Okolica, J. S., Peterson, G. L., & Mendenhall, M. J. (2020, May). Middleware Unifying Framework for Independent Nodes System (MUFFINS). In The Thirty-Third International Flairs Conference.
  • Pendleton, A., & Okolica, J. (2019). Creating serious games with the game design matrix. In Games and Learning Alliance: 8th International Conference, GALA 2019, Athens, Greece, November 27–29, 2019, Proceedings 8 (pp. 530-539). Springer International Publishing.
  • Dodge, D. A., Mullins, B. E., Peterson, G. L., & Okolica, J. S. (2010). Simulating windows-based cyber attacks using live virtual machine introspection.
  • Okolica, J., McDonald, J. T., Peterson, G. L., Mills, R. F., & Haas, M. W. (2009). Developing systems for cyber situational awareness.
  • Okolica, J. S., Peterson, G. L., & Mills, R. F. (2006). Using author topic to detect insider threats from email traffic. In Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings 4 (pp. 642-643). Springer Berlin Heidelberg.

 

Technical Reports

  • Okolica, J. S. and Peterson, G. L. (2011). Extracting Forensic Artifacts from Winodws O/S Memory, AFIT/EN/TR-11-02, Air Force Institute of Technology. 

 

PhD Thesis

  • Okolica, J. S. (2017). Temporal Event Abstraction and Reconstruction, AFIT-ENG-DS-17-D-004, Air Force Institute of Technology. 

 

MS Thesis

  • Okolica, J. S. (2006). Detecting Potential Insider Threats Through Email Datamining, AFIT/GCS/ENG/06-10, Air Force Institute of Technology. 

 

Return to the top of the page

Air Force Institute of Technology
2950 Hobson Way
Wright-Patterson Air Force Base, OH 45433-7765
Commercial: 937-255-6565 | DSN: 785-6565