Dr. Robert F. Mills, PhD

Professor

Bio Photo

 

Contact:
Comm: 937-255-6565 x4527
DSN: 937-785-6565 x4527
Click to E-mail
View Department

Education

Ph.D., University of Kansas, 1994

MSEE, Air Force Institute of Technology, 1987

BSEE, Montana State University, 1983

Awards

  • Air Force Association Bernard A. Schriever Award for advancing aerospace power, technology, doctrine, or the Air Force as a profession, 2015.
  • U.S. Government Information Security Leadership Awards, Workforce Improvement Category, Team Award: Cyberspace 200/300 Professional Continuing Education Team, Air Force Cyberspace Technical Center of Excellence, International Information Systems Security Certification Consortium, Inc., (ISC)²®  (2011 and 2014)
  • AFIT Civilian of the Quarter, Cat III, January-March 2013
  • Koopman Prize for Outstanding Paper “Reach-Based Assessment of Position”, by J.T. Hamill, R.F. Deckro, R.F. Mills, and J.W. Chrissis, Military Applications Society, Institute for Operations Research and the Management Sciences
  • Air Force Association Ezra Kotcher Award for significant, substantive contribution to curriculum development at AFIT, 2006
  • AFIT Civilian of the Year, Category III - 2006
  • AFIT Civilian of the Quarter, Cat III, October-December 2006
  • AFIT Civilian of the Quarter, Cat III, January-March 2006
  • 84th Radar Evaluation Squadron Company Grade Officer of the Year, 1990
  • Distinguished Graduate, Squadron Officer School, Maxwell AFB, Alabama, March 1989
  • Distinguished Graduate and Louis F. Polk Award recipient, AFIT class, December 1987
  • Graduated with Highest Honors, Montana State University, June 1983

Publications

* Denotes student

Book Chapters

  1. *Schmitt, D., Graham, S., Sweeney, P., and Mills, R., “Vulnerability Assessment of Infiniband Networking”, Critical Infrastructure Protection XIII, Sringer, Cham, Switzerland, pp 179-205, 2019.
  2. *Wolfe, C., Graham, S., Mills, R., Nykl, S., and Simon, P., “Securing Data in Power-Limited Sensor Networks using Two-Channel Communications.” In: Staggs, J., and Shenoi, S., (eds) Critical Infrastructure Protection XII, IFIP Advances in Information and Communication Technology, vol 542, Springer, Cham, pp 81-90, Dec 2018.
  3. *Agbeyibor, R., Butts, J., Grimaila, M., and Mills, R., "Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection", Critical Infrastructure Protection VIII, IFIP Advances in Information and Communication Technology, Vol 441, 2014, pp. 245-261.
  4. *Barcomb, K.W., *Krill, D.J., Mills, R.F., Saville, M., “Establishing Cyberspace Sovereignty”, in Leading Issues in Information Warfare and Security Research, Vol 2, ed: J. Ryan, Summer 2015, pp 203-218. (reprint of paper presented at the 2012 International Conference on Information Warfare and Security (ICIW))
  5. *Beeker, K.R., Mills, R.F., Grimaila, M.R., and Haas, M.W., “Operationally Responsive Cyberspace: A Critical Piece in the Strategic Deterrence Equation”, in Thinking about Deterrence: Enduring Questions in a Time of Rising Powers, Rogue Regimes, and Terrorism, A. Lowther, ed., Maxwell AFB AL:Air University Press, Chapter 2, pp 17-35, Dec 2013.
  6. *Beeker, K.R., Mills, R.F., Grimaila, M.R., and Haas, M.W., “Can an Operationally Responsive Cyberspace Play a Critical Role in the Strategic Deterrence Equation?,” Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century, A.B. Lowther, ed., New York:Palgrave-MacMillan, Chapter 2, pp 17-32, Dec 2012.
  7. *Thomas, B, Mullins, B.E., Peterson, G.L., and Mills, R.F., “An FPGA System for Detecting Malicious DNS Network Traffic”, Advances in Digital Forensics VII, IFIP WG 11.9 International Conference on Digital Forensics, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2011, pp 195-207.
  8. Haas, M.W., Mills, R.F., and Grimaila, M.R., “Aiding Understanding of Contested Information Environment Affect on Operations”, Human-in-the-loop Simulation:  Methods and Practice, L. Rothrock and S. Narayanan, eds., London: Springer-Verlag, 2011, pp 175-202, doi:10.1007/978-0-85729-883-6.
  9. *Schrader, K., Mullins, B., Peterson, G. and Mills, R., “Tracking Contraband Files Transmitted Using Bit-torrent”, Advances in Digital Forensics V, IFIP WG 11.9 International Conference on Digital Forensics, S. Shenoi and G. Peterson, Eds., New York, NY: Springer Science+Business Media, 2009, pp 159-173.
  10. Mills, R.F., Peterson, G.L., and Grimaila, M.R., “Insider Threat Prevention, Detection, and Mitigation”, Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions, K.J. Knapp, ed., IGI Global Publishing, March 2009, pp 48-74, doi: 10.4018/978-1-60566-326-5.
  11. *Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using PLSI-U to Detect Insider Threats from Email Traffic”, Advances in Digital Forensics II, M.S. Olivier and S. Shenoi, Ed., New York: Springer Science+Business Media, 2006, pp 91-103.

Journal Publications

  1. *Henry, W.C., Peterson, G.L., Mills, R.F., Miller, M.E., and Casey, D.J., “SensorRE: Analytic Provenance Supporting Software Reverse Engineers”, Computers & Security, (to appear).
  2. *Sibiga, M., Mills, R., Rice, M., and Dunlap, S., “Applying Cyber Threat Intelligence to Industrial Control Systems”, CSIAC Journal, Cyber Security & Information Systems Analysis Center, Vol 7, No 2, Aug 2019, pp 46-54.
  3. *Beach, P.M., Mailloux, L.O., Langhals, B.T., and Mills, R.F., “Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems”, IEEE Access, Vol 7, 24 Jul 2019, doi:10.1109/ACCESS.2019.2930718
  4. *Okolica, J.S., Peterson, G.L., Mills, R.F., Grimaila, M.R., "Sequence Pattern Mining with Variables", IEEE Transactions on Knowledge and Data Engineering, pp 1-13, Nov 2018.
  5. *Span, M., Mailloux, L.O., Mills, R.F., and Young, W., "Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study", IEEE Access, pp 1-15, Aug 2018.
  6. *Rich, M.D., Mills, R.F., Dube, T.E., and Rogers, S.K., "Evaluating Machine Learning Classifiers for Defensive Cyber Operations", Military Cyber Affairs, Vol 2, Issue 1, Article 6, pp 1-19, 2016.
  7. *Vaughan, S.L., Mills, R.F., Peterson, G.L., Grimaila, M.R., Rogers, S.K., Oxley, M.E., and Patterson, R.E., “A dual-process Qualia Modeling Framework”, Biologically Inspired Cognitive Architectures  (BICA) Journal, 2016, pp 71-85.
  8. *Panton, B.C., Colombi, J.M., Grimaila, M.R., and Mills, R.F. “Strengthening DoD Cyber Security with the Vulnerability Market”, Defense Acquisition Review Journal, Jan 2014, Vol. 21, No. 1, pp 466-484.
  9. *Panton, B.C., Colombi, J.M., Grimaila, M.R., and Mills, R.F. “Secure DOD Software:  Considerations for the Vulnerability Market”, CrossTalk: The Journal of Defense Software Engineering, Vol. 26, No. 6, Nov/Dec 2013, pp 18-21.
  10. *Barcomb, K.E., *Krill, D.J., Mills, R.F., and Saville, M.A. “Establishing Cyberspace Sovereignty”, International Journal of Cyber Warfare and Terrorism, Vol. 2, No. 3, July-Sept 2012, pp 26-38. (actually published Oct 2013)
  11. *Bryant, A., Mills, R., Grimaila, M., and Peterson, G. “Top-level goals in reverse engineering executable software”, Journal of Information Warfare, vol 12:1, May 2013, pp 32-43.
  12. *Finke, C., Butts, J., Mills, R., and Grimaila, M. “Enhancing the security of aircraft surveillance in the next generation air traffic control system”, International Journal of Critical Infrastructure Protection, vol. 6(1), pp 3-11, March 2013. http://dx.doi.org/10.1016/j.ijcip.2013.02.001.
  13. *Magazu, D., Mills, R.F., Butts, J.W., and Robinson, D.J., “Exploiting Automatic Dependent Surveillance-Broadcast via False Target Injection”, Journal of Aviation and Aerospace Perspectives, Vol. 2(2), pp 5-19, Fall 2012.
  14. Grimaila, M.R., *Myers, J., Mills, R.F., and Peterson, G., “Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512911399303, Vol. 9(3), pp 219-241, July 2012.
  15. *Bryant, A.R., Mills, R.F., Peterson, G.L., and Grimaila, M.R., “Software Reverse Engineering as a Sensemaking Task”, Journal of Information Assurance and Security, Vol 6, Issue 6, pp 483-494, 2011.
  16. *Lacey, T.H., Mills, R.F., Mullins, B.E., Raines, R.A., Oxley, M.E., and Rogers, S.K., “RIPsec – Using Reputation-Based Multilayer Security to Protect MANETs”, Computers & Security, Vol 31:1, Feb 2012, pp 122–136, doi:10.1016/j.cose.2011.09.005.
  17. *McCallie, D., Butts, J., and Mills, R., “Security Analysis of the ADS-B Implementation in the Next Generation Air Transportation System”, International Journal of Critical Infrastructure Protection, Vol 4:2, August 2011, pp 78-87, http://dx.doi.org/10.1016/j.ijcip.2011.06.001.
  18. *Principi, P.D., Mills, R.F., and Stepaniak, M.J., “Mitigating Tactical Warfighter Dependence on Link-16”, USAF Weapons Review, Spring/Summer 2011, pp 25-49 (10 pages).
  19. Mills, R.F., Grimaila, M.R., Peterson, G.L., and Butts, J.W., “A scenario-based approach to mitigating the insider threat”, Information Systems Security Association Journal, May 2011, pp 12-19.
  20. *Birdwell, M.B., and Mills, R., “Warfighting in Cyberspace:Evolving Force Presentation and Command and Control”, Air and Space Power Journal, Spring 2011, Volume XXV, No. 1, pp 26-36. (same article also published in ASPJ Chinese Edition, Summer 2011, Volume 5, No. 2, and Spanish Edition, 4th Qtr, 2011)
  21. *Schrader, K.R., Mullins, B.E., Peterson, G.L., and Mills, R.F., “An FPGA-based System for Tracking Digital Information Transmitted via Peer-to-Peer Protocols”, International Journal of Security and Networks (IJSN), Vol. 5, No. 4, pp 236-247, 2010.
  22. *Arwood, S., Mills, R.F., and Raines, R.A., “Operational Art and Targeting Strategy for Cyberspace Operations”, IO Sphere, Professional Journal of Joint Information Operations, Spring 2010, pp 30-36.
  23. *Beeker, K., Mills, R.F., and Grimaila, M.R., “Applying Deterrence in Cyberspace”, Information Operations Journal, Vol. 1, Issue 4, February 2010, pp 21-27.
  24. *Dalton, G.C., *Edge, K.S., Mills, R.F., and Raines, R.A., “Analyzing Security Risks in Computer and Radio Frequency Identification (RFID) Networks Using Attack and Protection Trees”, International Journal of Security and Networks, Vol. 5, Nos. 2/3, 2010, pp 87-95, 2010, doi:10.1504/IJSN.2010.032207.
  25. *Larkowski, M.P., Mills, R.F., and Colombi, J.M., “The Cyberspace Development Dogfight:Tightening the Acquisitions Turn Circle”, High Frontier, November 2009, Vol. 6 No. 1, pp 44-49.
  26. *Beeker, K., *Birdwell, M., *Principi, P., *Huber, D., Mills, R., and Peterson, G., “Demystifying Cyber Battle Damage Assessment”, USAF Weapons Review, Summer 2009, pp 9-18.
  27. *Marsh, D.W., Baldwin, R.O., Mullins, B.E., Mills, R.F., and Grimaila, M.R., “A Security Policy Language for Wireless Sensor Networks”, Journal of Systems and Software, Vol. 82, No. 1, pp 101-111, 2009.
  28. *Hamill, J.T., Deckro, R.F., Mills, R.F., and Chrissis, J.W., “Reach-Based Assessment of Position”, Military Operations Research, Vol. 13, No. 4, 2008, pp 59-78 (2008 Koopman Award).
  29. Suski, W., Temple, M.A., Mendenhall, M.J., and Mills, R.F., “Radio frequency fingerprinting commercial communication devices to enhance electronic security”, International Journal of Electronic Security and Digital Forensics, Vol. 1, No. 3, 2008, pp 301-322.
  30. *Hansen, A.P., Williams, P.D., Mills, R.F., and Kanko, M.A., “Cyber Flag: A Realistic Training Environment for the Future”, Air and Space Power Journal, Vol XXII, No. 3, Fall 2008, pp 42-48.
  31. *Hamill, J.T., Deckro, R.F., Chrissis, J.W., and Mills, R.F., “Analysis of Layered Social Networks”, IO Sphere, Professional Journal of Joint Information Operations, Winter 2008, pp 27-33.
  32. *Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using Author Topic to detect insider threats from email traffic”, Digital Investigations Journal, Vol. 4, Issues 3-4, pp 158-164, 2007.
  33. Mullins, B.E., Lacey, T.H., Mills, R.F., *Trechter, J.M., and *Bass, S.D., “How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum”, IEEE Security and Privacy, Vol. 5, No. 5, pp 40-49, 2007.
  34. *Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using PLSI-U to Detect Insider Threats by Datamining Email”, Special Issue on Network Forensics of the International Journal of Security and Networks (IJSN), Vol 3, No. 2, pp 114-121, 2008.
  35. *Franz, T.P., *Durkin, M., Williams, P.D., Raines, R.A., and Mills, R.F., “Defining IO Forces”, Air and Space Power Journal, Vol. XXI, No. 2, Summer 2007, pp 53-66. (same article also published in ASPJ Chinese Edition, Vol. 2, No. 3, Summer 2008)
  36. *Hubenko, V.P., Jr., Raines, R.A., Baldwin, R.O., Mullins, B.E., Mills, R.F., and Grimaila, M.R., “Improving Satellite Multicast Security Scalability by Reducing Re-keying Requirements”, IEEE Network, Special Issue on Advances in Network Systems Architecture, Vol. 21, No. 4, pp 51-56, 2007.
  37. *Roberts, M.L., Temple, M.A., Raines, R.A., Mills, R.F., and Oxley, M.E., “Communication Waveform Design Using an Adaptive Spectrally Modulated, Spectrally Encoded (SMSE) Framework”, IEEE Journal on Selected Topics in Signal Processing, Vol. 1, No. 1, pp 203-213, 2007, DOI 10.1109/JSTSP.2007.897061.
  38. *Hubenko, V.P., Raines, R.A., Mills, R.F., Baldwin, R.O., Mullins, B.E., and Grimaila, M.R., “Improving the Global Information Grid’s Performance through Satellite Communications Layer Enhancements”, IEEE Communications, Nov 2006, Vol. 44, No. 11, pp 66-72.
  39. *Roberts, M.L., Temple, M.A., Mills, R.F., and Raines, R.A., “Interference Suppression Characterisation for Spectrally Modulated, Spectrally Encoded Signals”, IEE Electronics Letters, Vol. 42, Issue 19, pp 1103-1104, 2006, DOI 10.1049/el:20061708.
  40. Baldwin, R.O., *Peterson, B.S., and Mills, R.F., “Using Playing Cards to Estimate Interference in Frequency-Hopping Spread Spectrum Radio Networks”, Journal of Systems and Software, Vol. 79, No. 12, pp 1782-1788, 2006.
  41. *Roberts, M.L., Temple, M.A., Mills, R.F., and Raines, R.A., “Evolution of the Air Interface of Cellular Communication Systems Toward 4G Realization”, IEEE Communications Surveys and Tutorials, Vol. 8, No. 1, pp 2-23, 2006, DOI 10.1109/COMST.2006.323439.
  42. Mills, R.F., and Prescott, G.E., “Detectability Models for Multiple Access Low-Probability-of-Intercept Networks”, IEEE Transactions on Aerospace and Electronic Systems, Vol. 36, No. 3, July 2000, pp 848-858.
  43. Mills, R.F., and Prescott, G.E., “A Comparison of Various Radiometer Detection Models”, IEEE Transactions on Aerospace and Electronic Systems, Vol 32, No. 1, Jan 1996, pp 467-473.

Refereed Conference Publications

  1. Mailloux, L.O., and Mills, R.F., “Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study”, IEEE Conference on Communications and Network Security (CNS), Virtual Conference, 29 June-1 July 2020.
  2. *Hayden, M., Graham, S., Betances, J., Mills, R., “Multi-Channel Security through Data Fragmentation”, 14th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
  3. *Wargo, T.W., Boggs, B.N., Temple, M.A., and Mills, R.F., “DNA Fingerprinting Ping 2020i ADS-B Beacons”, IEEE Military Communications Conference, 12-14 Nov 2019.
  4. Mailloux, L.O., Span, M., Mills, R.F., and Young, W., “'A Top Down Approach for Eliciting Systems Security Requirements for a Notional Satellite System”, IEEE International Systems Conference, April 2019.
  5. *Schmitt, D., Graham, S., Sweeney, P., and Mills, R., “A Cyber Vulnerability Assessment of Infiniband Networking”, 13th International Conf on Critical Infrastructure Protection, Arlington VA, March 2019.
  6. *Burfeind, B.C., Mills, R.F., and *Beach, P.M., "Securing Airborne Crowdsensing Networks", Digital Avionics Systems Conference (DASC 2018), Sept 2018.
  7. *Beach, P.M., Mills, R.F., *Burfeind, B.C., Langhals, B.T., and Mailloux, L.O., "A STAMP-Based Approach to Developing Quantifiable Measures of Resilience", 16th International Conference on Embedded Systems, Cyber-physical Systems, and Applications (ESCS’18), Jul 2018.
  8. *Willis, J.M., Mills, R.F., Mailloux, L.O., Graham, S.R., "MIL-STD-1553 Device Characterization using Organic Interface Functionality", NATO Symposium on Cyber Physical Security of Defense Systems, May 2018, Ft Walton Beach FL, pp 1-17.
  9. *Wolfe, C.L., Graham, S.R., Mills, R.F., Nykl, S.L., and Simon, P.E., "Securing Data-in-Transit for Power-Limited Sensor Networks using Two-Channel Communication", International Conference of Critical Infrastructure Protection, Mar 2018.
  10. *Willis, J.M., Mills, R.F., Mailloux, L.O., and Graham, S.R., "Considerations for Secure and Resilient Satellite Architectures", International Conference on Cyber Conflict (CyCon US), Washington DC, Nov 2017, pp 16 – 22, https://doi.org/10.1109/CYCONUS.2017.8167508.
  11. *Wardell, D.C., Mills, R.F., Peterson, G.L., and Oxley, M.E., "A Method for Revealing and Addressing Security Vulnerabilities in Cyber-Physical Systems by Modeling Malicious Agent Interactions with Formal Verification", Complex Adaptive Systems Conference, Procedia Computer Science, 95:24-31, December 2016, http://dx.doi.org/10.1016/j.procs.2016.09.289.
  12. *Rice, J., Mills, R.F., Temple, M.A., and Peterson, J.D., “Increased Ambiguity Resolution in Digital Radio Frequency Receivers”, IEEE International Conference on Microwaves, Communications, Antennas and Electronic Systems, Tel Aviv, 2-4 Nov 2015, pp 1-4.
  13. *Vaughan, S.L., Mills, R.F., Grimaila, M.R., Peterson, G.L., Oxley, M.E., Dube, T.E., and Rogers, S.K., “QuEST for Malware Type-Classification”, SPIE Defense+ Security. International Society for Optics and Photonics, Baltimore MD, 17-21 April 2015.
  14. *Vaughan, S.L., Mills, R.F., Grimaila, M.R., Peterson, G.L., and Rogers, S.K., “Narratives as a Fundamental Component of Consciousness”, Computational Models of Narrative Workshop (CMN-14), Quebec City, Canada, July 2014.
  15. *Smith, A.J., Mills, R.F., Bryant, A.R., Peterson, G.L., and Grimaila, M.R., “REDIR: Automated static detection of obfuscated anti-debugging techniques”, 2014 International Conference on Collaboration Technologies and Systems, Minneapolis MN, May 2014.
  16. *Agbeyibor, R., Butts, J., Grimaila, M., and Mills, R., “Evaluation of Format-Preserving Encryption Algorithms for Critical Infrastructure Protection”, Proceedings of the Eight Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Arlington VA, March 2014.
  17. *Garcia, A., Mills, R., Butts, J., and Lopez, J. “Firmware Modification Analysis in Programmable Logic Controllers”, International Conference on Cyber Warfare and Security (ICCWS),West Lafayette IN, March 2014.
  18. *Smith, A., Mills, R., Bryant, A., Grimaila, M., and Peterson, G. “The Role of Expert Systems in Reverse Code Engineering Tasks”, International Conference on Cyber Warfare and Security (ICCWS), West Lafayette IN, March 2014.
  19. *Rueter, B., Mills, R.F., and Butts, J. “Cyberspace Integration within the Air Operations Center”, International Command and Control Research and Technology Symposium (ICCRTS), Alexandria, Virginia, 19-21 June 2013.
  20. *Clark, R., Butts, J., and Mills, R.F., “Implementing an Integrated Network Defense Construct”, International Command and Control Research and Technology Symposium (ICCRTS), Alexandria, Virginia, 19-21 June 2013.
  21. *Bryant, A., Mills, R., Grimaila, M., and Peterson, G. “Investigating Human Factors Considerations in Reverse Engineering Executable Software”, 8th International Conference on Information Warfare and Security (ICIW 2013), Denver CO, 25-26 March 2013, pp 16-23.
  22. *Finke, C., Butts, J., Mills, R., and Grimaila, M. “Evaluation of Cryptographic Security Schemes for Air Traffic Control’s Next Generation Upgrade”, 8th International Conference on Information Warfare and Security (ICIW 2013), Denver CO, 25-26 March 2013, pp 259-264.
  23. *Finke, C., Butts, J., and Mills, R., “ADS-B Encryption: Ensuring Confidentiality in the Friendly Skies”, Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2013), Oak Ridge National Laboratory, Oak Ridge, TN, Jan 8-13, 2013.
  24. *Bryant, A. Mills, R., Peterson, G., and Grimaila, M. “Eliciting a sensemaking process from verbal protocols of reverse engineers”, 34th Annual Meeting of the Cognitive Science Society, Sapporo, Japan, Aug 1-4, 2012, pp 1386-1391.
  25. *Evans, M., Grimaila, M.R., and Mills, R.F., “A Survey of Cyberspace Mission Assurance Within United States Air Force Communications Squadrons”, 2012 International Conference on Security and Management (SAM12), Las Vegas, Nevada, July 16-19, 2012.
  26. *Barcomb, K., *Krill, J., Mills, R., and Saville, M. “Establishing Cyberspace Sovereignty”, International Conference on Information Warfare and Security (ICIW 2012), Seattle WA, March 2012, pp 1-9.
  27. *Barcomb, K.E., Humphries, J.W., and Mills, R.F., “A Case for DoD Application of Public Cloud Computing Services”, 2011 Military Communications Conference (MILCOM 2011), Nov 2011, pp 19-26.
  28. *Peterson, C., Grimaila, M.R., Mills, R.F., Haas M.W., Thomas, G., and Kelly, D., “Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process”, Proceedings of the 2011 International Conference on Security and Management (SAM11), Las Vegas, Nevada, July 18-21, 2011.
  29. *Woskov, S.M., Grimaila, M.R., Mills, R.F., and Haas, M.W., “Design Consideration for a Case-Based Reasoning Engine for Scenario-Based Cyber Incident Notification”, 2011 IEEE Symposium Series on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  30. *Miller, J.L., Mills, R.F., Grimaila, M.R., and Haas, M.W. “A Scalable Architecture for Improving the Timeliness and Relevance of Cyber Incident Notifications”, 2011 IEEE Symposium Series on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, pp 1-8, April 11-15, 2011.
  31. *Myers, J., Grimaila, M.R., and Mills, R.F., “Log-Based Distributed Security Event Detection Using Simple Event Correlator”, Hawaii International Conference on System Sciences (HICSS-44), pp 1-7, Jan 2011.
  32. Grimaila, M.R., Mills, R.F., Haas, M., and Kelly, D., “Mission Assurance: Issues and Challenges”, 2010 International Conference on Security and Management (SAM10), Las Vegas NV, pp 651-657, Jul 2010.
  33. *Bares, D.C., Trias, E.D., and Mills, R.F., “A Tactical Framework for Cyberspace Situational Awareness”, 15th International Command and Control Research and Technology Symposium (ICCRTS), Santa Monica CA, 22-24 June 2010.
  34. *Myers, J., Grimaila, M., and Mills, R., “Adding Value to Log Event Correlation Using Distributed Techniques”, Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  35. *Murphy, S, McDonald, J., and Mills, R., “An Application of Deception in Cyberspace: Operating System Obfuscation”, 5th International Conference on Information Warfare and Security (ICIW 2010), Dayton OH 8-9 Apr 2010.
  36. *Arwood, S., Mills, R.F., and Raines, R.A., “Operational Art and Strategy in Cyberspace”, 5th International Conference on Information Warfare and Security (ICIW 2010), Dayton OH 8-9 Apr 2010.
  37. *Hale, B., Grimaila, M.R., Mills, R.F., and Haas, M. “Communicating Potential Mission Impact Using Shared Mission Representations”, 5th International Conference on Information Warfare and Security (ICIW 2010), Dayton OH 8-9 Apr 2010.
  38. *Myers, J., Grimaila, M.R., and Mills, R.F. “Insider Threat Detection Using Distributed Event Correlation of Web Server Logs”, 5th International Conference on Information Warfare and Security (ICIW 2010), Dayton OH, 8-9 Apr 2010.
  39. Grimaila, M., Schechtman, G., Mills, R., and *Fortson, L., “Improving Cyber Incident Notification in Military Operations”, Industrial Engineering Research Conference (IERC), Miami FL, May 2009.
  40. *Myers, J., Grimaila, M.R., and Mills, R.F., “Towards Insider Threat Detection using Web Server Logs”, Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2009), Oak Ridge National Laboratory, Oak Ridge, TN, April 13-15, 2009.
  41. Grimaila, M.R., *Fortson, L.W., Sutton, J.L, and Mills, R.F., “Developing Methods for Timely and Relevant Mission Impact Estimation”, Proceedings of the 2009 SPIE Defense, Security and Sensing Conference (SPIE DSS 2009), Orlando, Florida, April 13-17, 2009.
  42. *Beard, T.W., Temple, M.A., Raquet, J.F., Mills, R.F., and Miller, J.O., “A Hybrid GA-RSM Optimization Process for Coexistent SMSE Waveform Design,” 4th Int’l Waveform Diversity and Design Conference (WDD09), Orlando, FL, Feb 2009.
  43. Lacey, T.H., Peterson, G.L., and Mills, R.F., “The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge”, Hawaii International Conference on System Sciences (HICSS-42), Big Island, HI, pp 1-9, 2009.
  44. *Suski, W.C., Temple, M.A., Mendenhall, M.J., and Mills, R.F., “Using Spectral Fingerprints to Improve Wireless Network Security”, 2008 IEEE Global Communication Conference (GLOBECOMM 08), pp 2185-2189, 2008.
  45. *Kaun, M.D., Temple, M.A., Mills, R.F., and Mendenhall, M.J., “Exploiting the Electromagnetic Environment (EME) Using Entropy-Based Time-Frequency Techniques”, 2008 Military Communications Conference (MILCOM-2008), Classified Session.
  46. *Skarda, B., Mills, R.F., McDonald, J.T., and Strouble, D., “Operationalizing Social Engineering for Offensive Cyber Operations”, 13th International Command and Control Research and Technology Symposium (ICCRTS), Bellevue WA, June 2008 (Best Student Paper: Concepts, Theory, and Policy Track).
  47. Grimaila, M.R., Mills, R.F., and *Fortson, L.W., “An Automated Information Asset Tracking Methodology to Enable Timely Cyber Incident Mission Impact Assessment”, 13th International Command and Control Research and Technology Symposium (ICCRTS), Bellevue, WA, June 2008.
  48. Grimaila, M.R., Mills, R.F., and *Fortson, L., “Improving the Cyber Incident Mission Impact Assessment (CIMIA) Process”, Cyber Security and Information Intelligence Research Workshop, Oak Ridge National Laboratory TN, May 12-14 2008.
  49. *Scheeres, J.W., Mills, R.F., and Grimaila, M.R., “Establishing the Human Firewall: Improving Resistance to Social Engineering Attacks”, 3rd International Conference on Information Warfare and Security (ICIW 2008), Omaha NE, April 2008, pp 325-334.
  50. *Hansen, A., Williams, P., Mills, R., “Red Flag; A Realistic Training Environment for the Future”, 3rd International Conference on Information Warfare and Security (ICIW 2008), Omaha, NE, Apr 2008, pp 171-178.
  51. *Sorrels, D., Grimaila, M.R., Fortson, L.W., and Mills, R.F., “CIMIA: An Architecture for Near Real-Time Situational Awareness in Cyberspace”, 3rd International Conference on Information Warfare and Security (ICIW 2008), Omaha NE, April 2008, pp 335-344.
  52. *Hellesen, D.L., Grimaila, M.R., Fortson, L.W., and Mills, R.F., “Information Asset Value Quantification”, 3rd International Conference on Information Warfare and Security (ICIW 2008), Omaha NE, April 2008, pp 179-188.
  53. *Lacey, T.H., Mills, R.F., Raines, R.A., Williams, P.D., Oxley, M.E., Bauer, K.W., and Rogers, S.K., “A Qualia Representation of Cyberspace”, Proceedings of the SPIE Conference, Vol. 6964, 69640C, April 11, 2008.
  54. *Hubenko, V.P., Raines, R.A., Baldwin, R.O., Mullins, B.E., Mills, R.F., and Grimaila, M.R., “A Secure and Efficient Satellite-based Multicast Architecture”, IEEE Radio and Wireless Symposium, Orlando FL, 21-23 January, 2008, 3rd Place Best Student Papers.
  55. *Roberts, M.L., Temple, M.A. and Mills, R.F., “An SMSE Implementation of CDMA with Partial Band Interference Suppression”, 2007 IEEE Global Communication Conference (GLOBECOMM 07), Washington, DC, pp 4424-4428, 2007, DOI 10.1109/GLOCOM.2007.841.
  56. *Hubenko, V.P., Raines, R.A., Baldwin, R.O., Mullins, B.E., Mills, R.F., and Grimaila, M.R., “Applying a Secure and Efficient Low Earth Orbit Satellite-Based Multicast Architecture in a Deployed Environment”, IEEE Military Communications Conference (MILCOM 07), Orlando FL, pp 1-7, Oct 2007, DOI 10.1109/MILCOM.2007.4454848.
  57. *Lacey, T.H., Mills, R.F., Raines, R.A., Williams, P.D., and Rogers, S.K., “A Qualia Framework for Awareness in Cyberspace”, IEEE Military Communications Conference (MILCOM 07), Orlando FL, pp 1-7, Oct 2007, DOI 10.1109/MILCOM.2007.4455285.
  58. *Beard, T.W., Temple, M.A., Miller, J.O., Mills, R.F., and Raquet, J.F., “Using Genetic Algorithms for SMSE Waveform Design”, IEEE International Waveform Diversity & Design Conf (WDD 2007), Pisa, Italy, 4-8 June 2007, pp 265-269.
  59. *Wong-Jiru, A., Colombi, J., Suzuki, L., and Mills, R. “Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models”, 5th Annual Conference on Systems Engineering Research, Hoboken, New Jersey, March 14-16, 2007.
  60. *Smith, T.S., *Woolley, P.L., Mills, R.F., and Raines, R.A., “A Framework for Relating Cyberspace Operations to the Cognitive and Physical Domains”, The International Conference on Information Warfare and Security (ICIW 2007), Monterrey CA, 8-9 March 2007, pp 217-224.
  61. Mullins, B.E., Lacey, T.H., Mills, R.F., *Trechter, J.M., and *Bass, S.D., “The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology”, Hawaii International Conference on System Sciences (HICSS-40), Waikoloa HI, 2007, pp 1-9, 2007, DOI: 10.1109/HICSS.2007.538.
  62. *Levoy, T., Grimaila, M.R., and Mills, R., “A Methodology for Customizing Security Auditing Templates for Malicious Insider Detection”, 8th International Symposium on System and Information Security (ISSIS 2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006.
  63. *Edge, K.S., Dalton, G.C., Raines, R.A., and Mills, R.F., “Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security”, 2006 Military Communications Conference (MILCOM 06), Washington DC, October 2006, 7 pages (CD).
  64. *Rehm, C.R., Temple, M.A., Mills, R.F., and Raines, R.A., “Entropy-Based Spectral Processing on the 802.11a Waveform”, 2006 Military Communications Conference (MILCOM 06), Oct 2006.
  65. *Bass, S., Mills, R., and Seetharaman, G., “Challenges of Information Management in the Networked Battlespace”, Second International Conference on Innovative and Commercial Applications of Distributed Sensor Networks, Crystal City, VA, Oct 16-17 2006.
  66. *Valentine, J.R., Mills, R.F., Grimaila, M.R., and Elder, K.L., “Application of the Strategic Alignment Model and Information Technology Governance Concepts to Support Network Centric Warfare”, 11th International Command and Control Research and Technology Symposium (ICCRTS), Cambridge, UK, September 2006.
  67. *Dalton, G.C., Colombi, J.M., Mills, R.F., “Modeling Security Architectures for the Enterprise”, 11th International Command and Control Research and Technology Symposium (ICCRTS), Cambridge, UK, September 2006.
  68. *Roberts, M.L., Temple, M.A., Oxley, M.E., Mills, R.F., and Raines, R.A., “A Spectrally Modulated, Spectrally Encoded Analytic Framework for Carrier Interferometry Signals”, ACM International Wireless Communication & Mobile Computing Conference (IWCMC 2006), Vancouver, BC, Canada, pp 1009-1014, 2006.
  69. *Dalton, G.C., Mills, R.F., Colombi, J.M., and Raines, R.A., “Analyzing Attack Trees using Generalized Stochastic Petri Nets”, 7th IEEE Workshop on Information Assurance, U.S. Military Academy, West Point, NY, 21-23 June 2006, pp 116-123.
  70. *Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using Author Topic to Detect Insider Threats from Email Traffic”, IEEE International Conference on Intelligence and Security Informatics (ISI-2006), San Diego, CA, May 22-24, 2006, pp 1-14.
  71. *Butts, J.W., Mills, R.F., and Peterson, G.L., “A Multidisciplinary Approach to Mitigating the Insider Threat”, International Conference on Information Warfare and Security (ICIW-06), Princess Anne, MD, March 2006, pp 29-36.
  72. *Dalton, G.C., Mills, R.F., and J.M. Colombi, “A Survey of the Use of Petri Nets to Model Security and Access Controls”, International Conference on Information Warfare and Security (ICIW-06), Princess Anne, MD, March 2006, pp 45-56.
  73. *Hubenko, V.P., Raines, R.A., Temple, M.A., Mills, R.F., and Saeger, M.D., “Adaptation, Modeling, and Analysis of PIM – DM in a LEO Satellite Network Environment”, 2006 IEEE Aerospace Conference, Big Sky, MT, March 2006.
  74. *Roberts, M.L., Temple, M.A., Oxley, M.E., Mills, R.F., and Raines, R.A., “A General Analytic Framework for Spectrally Modulated, Spectrally Encoded Signals”, 2006 International Waveform Diversity and Design Conference, Lihue, Hawaii, Jan 2006, CD-S2-P2, pp 1-5.
  75. *Mims, W.H., Temple, M.A., Mills, R.F., and *Gronholz, B.D., “Spectral Sensing Ultra Wideband Signals Using a Down-Converting Channelized Receiver”, 2005 IEEE Dynamic Spectrum Access Networks Conference (DySPAN 2005), Baltimore, MD, Nov 2005, pp 706-709.
  76. *Gaona, C.M., Mills, R.F., Temple, M.A., and Hale, T.B., “Spectrally Encoded, Multi-Carrier PSK Communication in a Frequency-Selective, Slowly-Fading Channel”, 24th Digital Avionics Systems Conference, Washington, DC, Nov 2005. (Best Paper of Session, Best Paper of CNS Systems Track, Best Overall Student Paper), pp 1.C.7.1-1.C.7.12.
  77. *Stanley, J.E., Mills, R.F., Raines, R.A. and Baldwin, R.O., “Correlating Network Services with Operational Mission Impact”, 2005 Military Communications Conference (MILCOM), Atlantic City, New Jersey, Oct 2005, 7 pages.
  78. *Butts, J.W., Mills, R.F., and Baldwin, R.O., “Developing an Insider Threat Model Using Functional Decomposition”, 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2005), St Petersburg, Russia, Sep 2005, pp 412-417.
  79. Peterson, G.L., Mills, R.F., *McBride, B.T., and *Alred, W.C., 2005, “A Comparison of Generalizability for Anomaly Detection”, KDD-2005 Workshop on Data Mining Methods for Anomaly Detection, Chicago, IL, August 2005, pp 51-56.
  80. *Yee, J., Mills, R.F., Peterson, G.L., and Bartczak, S., “Automatic Generation of Social Network Data from Electronic-Mail Communications”, in Tenth International Command and Control Research and Technology Symposium (ICCRTS), McLean, Virginia, June 2005.
  81. *Gronholz, B., Temple, M.A., Mills, R.F., *Mims, W.H., and Niedzwiecki, T., “Communication Channel Assessment: Detection of Ultra Wideband Signals Using a Channelized Receiver”, IEEE 2005 International Wireless Communications Conference, Maui, Hawaii, June 2005, pp 1071-1076.
  82. *Nunez, A.S., Temple, M.A., Mills, R.F., and Raines, R.A., “Interference Avoidance in Spectrally Encoded Multiple Access Communications Using MPSK Modulation”, 2005 Wireless Communications & Networking Conference, New Orleans LA, March 2005, Vol. 2, pp 730-734.
  83. *Cobb, W.E., Baldwin, R.O., Temple, M.A., and Mills, R.F., “Non-Cooperative (Passive) Synchronization with a Bluetooth Piconet”, 2004 IEEE Military Communications Conference (MILCOM), October 2004 (Best Classified Paper).
  84. *Madden, C.B., and Mills, R.F., “Effects of a Transform Domain Filter Upon Error Rates and Detectability of a Spread Spectrum Signal”, Tactical Communications Conference (TCC-96), Fort Wayne, IN, May 1996, pp 503-509.
  85. Mills, R.F., and Prescott, G.E., “Waveform Design and Analysis of Frequency Hopping LPI Networks”, IEEE Military Communications Conference (MILCOM), San Diego CA, Nov 1995, pp 778-782.
  86. Mills, R.F., and Prescott, G.E., “Detection of Multiple Access Low-Probability-of-Intercept Networks”, Tactical Communications Conference, (TCC-94), Fort Wayne, IN, May, 1994, pp 497-504.
  87. Mills, R.F., “Implementation of the Single Cycle Detector using the Signal Processing Workstation”, Tactical Communications Conference (TCC-94), Fort Wayne, IN, May, 1994, pp 393-399.
  88. Mills, R.F., and Prescott, G.E., “Noncoherent Pulse Combining for Improved Multiple Access LPI Network Performance”, IEEE Military Communications Conference (MILCOM), Bedford MA, October 1993, pp 590-594.

Conference Publications (Refereed Abstract)

  1. *Okolica, J.S., McDonald, J.T., Peterson, G.L., Mills, R.F., and Haas, M.W., “Developing Systems for Cyber Situational Awareness”, 2nd Cyberspace Research Workshop, Shreveport LA, July 2009, pp 56-56.
  2. Grimaila, M.R., Mills, R.F., and *Fortson, L.W., “Development of a Cyber Incident Mission Impact Assessment Methodology”, 23rd Annual Computer Security Applications Conference, Miami Beach FL, Dec 10-14, 2007 .
  3. *Dalton, G.C., Mills, R.F., and J.M. Colombi, “The Deployment Readiness Service:A Case Study of the Challenges of Implementing a Service Oriented Architecture in a Legacy System Environment”, 10th Annual Systems Engineering Conference, San Diego, CA, 22-25 Oct 2007.
  4. *Wieser, T.L., *Miller, G.J., *Piepkorn, A.F., *Kennedy, J.F., Mills, R.F., and Colombi, J.M., “DoD Enterprise Architecting:Joint Issues Derived From SOF Air Analysis”, 9th Annual Systems Engineering Conference, San Diego, CA, 23-26 Oct 2006.
  5. Gerace, G.C., Mills, R.F., Raines, R.A., Suter, B.W., Terzuoli, A.J., and Welsh, B.M., “Military Communications Graduate Education Curriculum”, 1996 ASEE Annual Conference & Exposition, Washington D.C., June 1996, Session 1532, 10 pages.

Other Publications

  1. Proceedings of the 12th International Conference on Cyber Warfare and Security, A.R. Bryant, J.R. Lopez, and R.F. Mills, eds., Wright State University, Dayton OH, 2-3 March 2017.
  2. Chakravarthy, V.D., and Mills, R.F., "Cognitive Electronic Warfare: Motivation, Concepts, and Technology Trends", White Paper, Air Force Research Laboratory, Sensors Directorate, Aug 2013.
  3. Kelly, D.J., Grimaila, M.R., and Mills, R.F., “CYBER INCIDENT MISSION IMPACT ASSESSMENT (CIMIA)”, Air Force Technical Report AFRL-RH-WP-TR-2012-0001, January 2012.
  4. Mills, R.F., *Birdwell, M.B., and *Beeker, K.R., “Apples & Oranges: Operating and Defending the Global Information Grid”, IANewsletter, Information Assurance Technology Analysis Center, Vol. 13, No. 2, Spring 2010, pp 38-41.
  5. *Thomas, B., Humphries, J., and Mills, R., “There and Back Again: Centralizing Security by Migrating to a Thin Client Architecture”, IANewsletter, Information Assurance Technology Analysis Center, Vol. 12, No. 2, Summer 2009, pp 12-16.
  6. Williams, P.D., Rogers, S.K., Mills, R.F., Raines, R.A., and Lacey, T.H., “Tomorrow Night”, IANewsletter, Information Assurance Technology Analysis Center, Vol. 11 No. 2, Summer 2008, pp. 10-15.
  7. Mills, R.F., Raines, R.A., and Williams, P.D., “Developing Cyberspace Competencies for Air Force Professional Military Education”, white paper, September 2007.
  8. *Lacey, T.H., Mills, R.F., Raines, R.A., Williams, P.D. and Rogers, S. “A Qualia Framework for Awareness in Cyberspace”, IANewsletter, Information Assurance Technology Analysis Center, Vol. 10, No. 3, Fall 2007, pp 12-17.
  9. Lacey, T., Mills, R., Mullins, B., and Raines, R., “The Morphing of a Cyber Operations Curriculum at AFIT”, IANewsletter, Information Assurance Technology Analysis Center, Vol. 10, No. 1, Spring 2007, pp 26-30.
  10. *Wieser, T.L., *Miller, G.J., *Piepkorn, A., *Kennedy, J., Mills, R.F., and Colombi, J.M., “Heuristics for Joint Architecting”, Defense AT&L Magazine, Nov-Dec 2006, pp 44-48.
  11. *Jones, C.O., Mills, R.F., and Raines, R.A., “Removing Security through Obscurity from Software Watermarking”, IANewsletter, Information Assurance Technology Analysis Center, Vol. 9, No. 2, Fall 2006, pp 14-17.
  12. Jackson, J., Jones, B., Lehmkuhl, L., Parnell, G., Hasen, G., Gunsch, G., Andrew, J., Buter, T., Conley, H., and Mills, R., “An Operational Analysis for 2025: An Application of Value-Focused Thinking to Future Air and Space Capabilities”, 2025 White Papers, Vol. 4, Air University Press, 1996, pp. 45-217.
Return to the top of the page

Air Force Institute of Technology
2950 Hobson Way
Wright-Patterson Air Force Base, OH 45433-7765
Commercial: 937-255-6565 | DSN: 785-6565