Gilbert L Peterson
Ph.D.

 

Contact:
Comm: 937-255-3636 x4281
DSN: 785-3636 x4281
Click to Email

View Department

Education

2001 Ph.D., Computer Science, University of Texas at Arlington, Arlington, TX

1998 M.S., Computer Science, University of Texas at Arlington, Arlington, TX

1995 B.S. Architecture, University of Texas at Arlington, Arlington, TX

Awards

2011                      Government Information Security Leadership Award: Workforce Improvement: Team.

 

2010                      AFIT Civilian Category III of the Quarter: 3rd Quarter 2010.

 

2009                      1st Place Grand Champion-Annual DoD Cyber Crime Center (DC3) Digital Forensics Challenge. Faculty advisor for AFIT “Little Bobby Tables” team that defeated 44 teams from commercial, government, civilian, military and academic institutions.

 

2008                      Air Force Outstanding Scientist Award, Junior Civilian.

 

2007                      1st Place Grand Champion-Annual DoD Cyber Crime Center (DC3) Digital Forensics Challenge. Faculty advisor for AFIT “Cyber Warrior” team that defeated 126 international teams from commercial, government, civilian, military and academic institutions.

 

2006                      Tau Beta Pi Thesis Award Advisor for thesis entitled, “Unified Behavior Framework for Reactive Robot Control in Real-Time Systems”

 

2001                                        Recipient of UTA/CSE Outstanding PhD Research Award

Publications

Journal Articles
 

  1. Karrels, D.R., Peterson, G.L., and Mullins, B.E., "Large-scale Cooperative Task Distribution on Peer-to-Peer Networks," Web Intelligence and Agent Systems (Accepted: February 2012). draft
  2. Dube, T., Raines, R., Peterson, G.L., Bauer, K., Grimaila, M.R., and Rogers, S., "Malware Target Recognition via Static Heuristics," IEEE Computer & Security, vol. 31, no. 1, 2012, pp. 137-147. DOI: 10.1016/j.cose.2011.09.002.
  3. Grimaila, M.R., Myers, J., Mills, R.F., and Peterson, G.L., "Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology," The Journal of Defense Modeling and Simulation: Applications, Methodology, and Technology, vol. 9, no. 2, 2012, pp 219-241. draft DOI: 10.1177/1548512911399303.
  4. Compton, M.D., Hopkinson, K.M., Peterson, G.L., and Moore, J.T., "Using Modeling and Simulation to Examine the Benefits of a Network Tasking Order," Journal of Defense Modeling and Simulation, vol. 9, no. 3, 2012, pp. 205-217. draft DOI: 10.1177/1548512910371702.
  5. Bryant, A., Mills, R.F., Peterson, G.L., and Grimaila, M.R., "Software Reverse Engineering as a Sensemaking Task," International Journal of Information Assurance and Security, vol. 6, no. 6, 2011, pp. 483-494. draft
  6. Okolica, J., and Peterson, G.L., "Windows Driver Memory Analysis: A Reverse Engineering Methodology," IEEE Computers & Security, vol. 30, 2011, pp. 770-779. draft DOI: 10.1016/j.cose.2011.08.001 software
  7. Okolica, J., and Peterson, G.L., "Extracting the Windows Clipboard from Physical Memory," Digital Investigation: The International Journal of Digital Forensics & Incident Response, vol. 8S, pp. S118-S124. open access DOI: 10.1016/j.diin.2011.05.014 software
  8. Mills, R.F., Grimaila, M.R., Peterson, G.L., and Butts, J.W., "A scenario-based approach to mitigating the insider threat," Information Systems Security Association Journal, May 2011, pp. 12-19. open access
  9. Weissgerber, K., Lamont, G.B., Borghetti, B.J., and Peterson, G.L., "Determining Solution Space Characteristics for Real Time Strategy Games & Characterizing Winning Strategies," Computer Games Technology Journal, vol. 2011, 2011, pp 1-17. draft DOI: DOI: 10.1155/2011/834026.
  10. Peterson, G.L., Duffy, J.P., and Hooper, D.J., "Dynamic Behavior Sequencing for Hybrid Robot Architectures," Journal of Intelligent and Robotic Systems, vol. 64, no. 2, 2011 pp. 179-196. draft DOI: 10.1007/s10846-010-9535-3.
  11. Woolley, B., Peterson, G.L., and Kresge, J.T., "Real-Time Behavior Based Robot Control System," Autonomous Robots, vol. 30, no. 3, 2011, pp. 233-242. draft DOI: 10.1007/s10514-010-9215-y.
  12. Okolica, J., and Peterson, G.L., "Windows systems agnostic memory analysis," Digital Investigation: The International Journal of Digital Forensics & Incident Response, vol. 7, sup. 1, 2010, pp. S48-S56. open access DOI: 10.1016/j.diin.2010.05.007 presentation.
  13. Schrader, K.R., Mullins, B.E., Peterson, G.L., and Mills, R.F., "An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols," International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010, pp. 236-247. draft press.
  14. Beeker, K., Birdwell, M., Principi, P., Huber, D., Mills, R.B., and Peterson, G.L., "Demystifying Cyber Battle Damage Assessment," USAF Weapons Review, Summer 2009, pp. 9-18, draft.
  15. Karrels, D., Peterson, G.L., and Mullins, B.E., "Structured P2P Technologies for Distributed Command and Control," Peer-to-Peer Networking and Applications, vol. 2, no. 4, pp. 311-333, 2009. draft DOI:10.1007/s12083-009-0033-y.
  16. Woolley, B., Peterson, G.L., "Unified Behavior Framework for Reactive Robot Control," Journal of Intelligent and Robotic Systems, vol. 55, no. 2, pp.155-176, 2009. draft DOI: 10.1007/s10846-008-9299-1.
  17. Stevens, M., Williams, P.D., Peterson, G.L., and Kurkowski, S.H., "Integrating Trust into the CyberCraft Initiative via the Trust Vectors Model," IEEE Computational Intelligence Magazine, vol. 3, no. 2, pp. 65-68, 2008. draft DOI: 10.1109/MCI.2008.4490264.
  18. Okolica, J.S., Peterson, G.L., and Mills, R.F., "Using Author Topic to detect insider threats from email traffic," Digital Investigations Journal. vol. 4, no. 3-4, pp. 158-164, 2008. draft DOI: 10.1016/j.diin.2007.10.002.
  19. Peterson, G.L., Raines, R.A., and Baldwin, R.O., "Digital Forensics Educational Needs in the Miami Valley Region," Journal of Applied Security Research, vol. 3, no. 3-4, pp. 429-439, 2008. draft DOI: 10.1080/19361610801981662.
  20. Peterson, G.L., Mayer, C.B., Kubler, T., "Ant Clustering with Locally Weighting Ant Perception and Diversified Memory," Swarm Intelligence. vol. 2, no. 1, pp. 43-68, 2008. draft DOI: 10.1007/s11721-008-0011-7.
  21. Peterson, G.L., and McBride, B.T., "Importance of Generalizability to Anomaly Detection," Knowledge and Information Systems, vol. 14, pp.377-392, 2008. draft DOI: 10.1007/s10115-007-0072-8.
  22. Okolica, J.S., Peterson, G.L., and Mills, R.F., "Using PLSI-U to Detect Insider Threats by Datamining Email," International Journal of Security and Networks (IJSN), vol.3, no. 2 , pp. 114-121, 2008. draft DOI: 10.1504/IJSN.2008.017224.
  23. Wardell, D.C., and Peterson, G.L., "Fuzzy State Aggregation and Policy Hill Climbing for Stochastic Environments," International Journal of Computational Intelligence and Applications, vol. 6, no. 3, pp. 413-428, 2007. draft DOI: 10.1142/S1469026806001903.
  24. McBride, B.T., Peterson, G.L., and Gustafson, S.C., "A New Blind Method for Detecting Novel Steganography," Digital Investigation, vol. 2, pp. 50-70, 2005. draft DOI: 10.1016/j.diin.2005.01.003.
  25. Peterson, G.L., and Cook, D. J., "Incorporating Decision-Theoretic Planning in a Robot Architecture," Robotics and Autonomous Systems, vol. 42, no. 2, pp. 89-106, 2003. draft DOI: 10.1016/S0921-8890(02)00326-3.

Refereed Conference Publications
 

  1. Bryant, A.R., Mills, R.F., Grimaila, M.R., and Peterson, G.L., "Top-Level Goals in Reverse Engineering Executable Software," 8th International Conference on Information Warfare and Security ICIW-2013, 2013, pp. TBD.
  2. Bryant, A.R., Mills, R.F., Peterson, G.L., and Grimaila, M.R., "Eliciting a sensemaking process from verbal protocols of reverse engineers", Proceedings of the Annual Meeting of the Cognitive Science Society, Sapporo Japan, 2012, pp. 1386-1391. draft
  3. Hay, A., and Peterson, G.L., "Acquiring OS X File Handles through Forensic Memory Analysis", IEEE Systematic Approaches to Digital Forensics, Vancouver, BC, Canada, 2012, pp. TBD. draft volafox
  4. Weyers, C., and Peterson, G.L., "Improving Occupancy Grid FastSLAM by Integrating Navigation Sensors," IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA, 2011, pp. 859-864. draft DOI:10.1109/IROS-2011.6094514
  5. Peterson, G. L., Mayer, C.M., and Cousin, K., "WoLF Ant", IEEE Congress on Evolutionary Computation 2011, New Orleans, LA, 2011, pp. 1-6. draft DOI: 10.1109/CEC.2011.5949726
  6. Smith, M.J., Boxerbaum, A.J., Peterson, G.L., Quinn, R.J., "Electronic Image Stabilization using Optical Flow with Inertial Fusion," 2010 IEE/RSJ International Conference on Intelligent Robots and Systems, Taipei, Taiwan, October 2010, pp. 1146 " 1153, draft DOI: 10.1109/IROS.2010.5651113 video: unstabilized stabilized.
  7. Dube, T., Raines, R.A., Peterson, G.L., Bauer, K.W., Grimaila, M.R. and Rogers, S.K., "Malware Type Recognition and Cyber Situational Awareness," International Workshop on "Mission Assurance: Tools, Techniques, and Methodologies" at The Second IEEE International Conference on Information Privacy, Security, Risk and Trust, Minneapolis MN, August 2010, pp 938-943. draft DOI: 10.1109/SocialCom.2010.139.
  8. Dodge, D.A., Mullins, B.E., Peterson, G.L., Okolica, J.S., "Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection," Summer Computer Simulation Conference (SCSC2010), Ottawa Canada, July 2010, pp. 550-555. draft
  9. Clark, J.D., Mendenhall, M.J., and Peterson, G.L., "Stochastic Feature Selection with Distributed Feature Spacing for Hyperspectral Data," Second Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing (IEEE WHISPERS), 2010, pp. 1-4. draft DOI: 10.1109/WHISPERS.2010.5594951.
  10. Erskine, J.R., Peterson, G.L., Mullins, B.E., and Grimaila, M.R., "Developing Cyberspace Data Understanding Using CRISP-DM for Host-based IDS Feature Mining," Cyber Security and Information Intelligence Research Workshop, 2010, pp. 74:1-74:4. draft
  11. Karrels, D.R., Peterson, G.L., and Mullins, B.E., "RC-Chord: Resource Clustering in a Large-Scale Hierarchical Peer-to-Peer System," Military Communications Conference (MILCOM), 2009, pp. 1-7. draft DOI: 10.1109/MILCOM.2009.5379742.
  12. Hooper, D.J., Peterson, G.L., and Borghetti, B.J., "Dynamic Coalition Formation Under Uncertainty," Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009, pp. 4799-4804. draft DOI: 10.1109/IROS.2009.5354319.
  13. Seymour, R.S., and Peterson, G.L., "A Trust-based Multiagent System," 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), 2009, pp. 109-116. draft DOI: 10.1109/CSE.2009.297.
  14. Okolica, J.S., McDonald, J.T., Peterson, G.L., Mills, R.F., and Haas, M.W., "Developing Systems for Cyber Situational Awareness," Proceedings of the 2nd Cyberspace Research Workshop, 2009, pp. 46-56. draft
  15. Howard, T., Mendenhall, M., and Peterson, G.L., "Abstracting GIS Layers from Hyperspectral Imagery," First Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing (IEEE WHISPERS), 2009, pp. 1-4. draft DOI: 10.1109/WHISPERS.2009.5289023.
  16. Millar, J.R., Peterson, G.L., and Mendenhall, M.J., "Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps," Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 69-74. open access
  17. Seymour, R.S., and Peterson, G.L., "Responding to Sneaky Agents in Multi-agent Domains," Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 99-104. open access
  18. Hooper, D., and Peterson, G.L., "HAMR: A Hybrid Multi-Robot Control Architecture," Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 139-140. open access
  19. Holloway, E.M., Lamont, G.B., and Peterson, G.L., "Network Security Using Self Organized Multi-Agent Swarms," IEEE Symposium on Computational Intelligence in Cyber Security, 2009, pp. 2559-2566. draft DOI: 10.1109/CICYBS.2009.4925102.
  20. Lacey, T., Peterson, G.L., and Mills, R.F., "The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge", Hawaii International Conference on System Sciences (HICSS), 2009, pp. 1-9. draft DOI: 10.1109/HICSS.2009.433.
  21. Boxerbaum, A., Oro, J., Peterson, G.L., Quinn R.D., "The Latest Generation Whegs" Robot Features a Passive-Compliant Body Joint", 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 1636-1641. DOI: 10.1109/IROS.2008.4650997.
  22. Oimoen, S.C., Peterson, G.L., and Hopkinson, K.M., "Network Formation using Ant Colony Optimization " A Comparative Analysis," Sixth International Conference on Ant Colony Optimization and Swarm Intelligence, 2008, pp. 405-406. draft DOI: 10.1007/978-3-540-87527-7_47.
  23. Dries, E., and Peterson, G.L., "Scaling Ant Colony Optimization with Hierarchical Reinforcement Learning Partitioning," GECCO 2008: Genetic and Evolutionary Computation Conference, 2008, pp. 25-32. draft press
  24. Duffy, J.P., and Peterson G.L., "An Abstract Behavior Representation for Robust, Dynamic Sequencing in a Hybrid Architecture," AAAI Spring Symposium " Architectures for Intelligent Theory-Based Agents, 2008, pp. 19-24. open access
  25. Cousin, K., and Peterson, G.L., "Distributed Approach to Solving Constrained Multiagent Task Scheduling Problems," AAAI Fall Symposium " Regarding the "Intelligence" in Distributed Intelligent Systems (RIDIS), 2007, pp. 42-48. open access
  26. Woolley, B. and Peterson, G.L., "Genetic Evolution of Hierarchical Behavior Structures," Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, 2007, pp. 1731-1738. draft press
  27. Haag, C., Lamont, G.B., Williams, P., and Peterson, G.L., "An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions," Workshop on Defense Application of Computation Intelligence at GECCO 2007, London, July 2007, pp. 2717-2724. draft press
  28. Haag, C., Lamont, G.B., Peterson, G.L., and Williams, P. "An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions," Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS), 2007, pp. 420-436.
  29. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., "Multi-Class Classification Averaging Fusion for Detecting Steganography," 2007 IEEE International Conference on System of Systems Engineering, 2007, pp 309-314. draft DOI: 10.1109/SYSOSE.2007.4304292.
  30. Peterson, G.L., Raines, R.A., and Baldwin, R.O., "Graduate Digital Forensics Education at the Air Force Institute of Technology," Hawaii International Conference on System Sciences-HICSS-40, 2007, pp. 264-270. draft DOI: 10.1109/HICSS.2007.240.
  31. Rodriguez, B.M., Peterson, G.L., Bauer, K.B., and Agaian, S.S., "Steganalysis Embedding Percentage Determination with Learning Vector Quantization," 2006 IEEE International Conference on Systems Man and Cybernetics, 2006, pp. 1956-1961. draft DOI: 10.1109/ICSMC.2006.385001.
  32. Wardell, D.C., and Peterson, G.L., "Fuzzy State Aggregation and Off-Policy Reinforcement Learning for Stochastic Environments," The Eighth IASTED International Conference on Control and Applications (CA 2006), 2006, pp. 145-152. draft press
  33. Okolica, J.S., Peterson, G.L., and Mills, R.F., Using Author Topic to Detect Insider Threats from Email Traffic, IEEE International Conference on Intelligence and Security Informatics (ISI-2006), 2006, pp. 642-643. draft
  34. Cousin, K., and Peterson, G.L., "Cooperative Reinforcement Learning Using an Expert-Measuring Weighted Strategy with WoLF," The 9th IASTED International Conference on Artificial Intelligence and Soft Computing, 2005, pp. 165-170. draft press
  35. Peterson, G.L., Mills, R.F., McBride, B.T., and Alred, W.C., 2005, "A Comparison of Generalizability for Anomaly Detection," KDD-2005 Workshop on Data Mining Methods for Anomaly Detection, 2005, pp. 51-56. open access
  36. Yee, J., Mills, R.F., Peterson, G.L., and Bartczak, S., "Automatic Generation of Social Network Data from Electronic-Mail Communications," Tenth International Command and Control Research and Technology Symposium, 2005. open access
  37. Shapiro, J.M., Lamont, G.B., and Peterson, G.L., "An Evolutionary Algorithm to Generate Hyper-Ellipsoid Detectors for Negative Selection," GECCO 2005: Genetic and Evolutionary Computation Conference, 2005, pp. 337-344. draft press
  38. Laviers, K.R., and Peterson, G.L., "Cognitive Robot Mapping with Polylines and an Absolute Space Representation," Proceedings of the IEEE 2004 International Conference on Robotics and Automation (ICRA), 2004, pp. 3771-3776. draft press
  39. McBride, B.T., and Peterson, G.L., "Blind Data Classification using Hyper-Dimensional Convex Polytopes," Proceedings of the 17th International FLAIRS Conference, 2004, pp. 520-525. open access
  40. Peterson, G.L., and Cook, D. J., "Decision-Theoretic Planning in the Graphplan Framework," AIPS 2000 Workshop on Decision Theoretic Planning, 2000. draft
  41. Peterson, G.L., and Cook, D. J., "Decision-Theoretic Layered Robotic Control Architecture," Proceedings of the Sixteenth National Conference on Artificial Intelligence, 1999, pp. 976. open access
  42. Peterson, G.L., and Cook, D. J., "DFA Learning of Opponent Strategies," Proceedings of the 12th International FLAIRS Conference, 1998, pp. 367-371. open access
  43. Peterson, G.L., and Cook, D. J., "Planning and Learning in an Advanced Robotic Game," AAAI 1998 Fall Symposium on Integrated Planning for Autonomous Agent Architectures, 1998, pp. 55-61. draft

Conference Publications (Refereed Abstract)
 

  1. Eng, K.G., Peterson, G.L., Kresge, J.T., and Campbell, J.L., "Intelligent Behavioral Action Aiding for Improved Image Navigation," ION International Technical Interchange Meeting, 2013, pp. TBD.
  2. Vongsy, K., Mendenhall, M.J., Eismann, M.T., and Peterson, G.L., "Removing Parallax-Induced Changes in Hyperspectral Change Detection," IEEE International Geoscience and Remote Sensing Symposium, 2012, pp. 2012-2015. draft DOI:10.1109/IGARSS.2012.6350982
  3. Venable, D., Campbell, J., Kresge, J., *Hooper, D., Peterson, G., and Veth, M., "Performance Evaluation of Coupling Between Vehicle Guidance and Vision Aided Navigation," Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation, Savannah,. GA, September 2009, pp. 826-834.
  4. Rodriguez, B.M., and Peterson, G.L., "Multi-Class Classification Fusion Using Boosting for Identifying Steganography Methods," Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2008 of the SPIE Symposium on Defense and Security, 2008, pp. 697407.01-697470.10. draft
  5. Rodriguez, B.M., and Peterson, G.L., "Classifier Dependent Feature Preprocessing Methods," Mobile Multimedia/Image Processing, Security and Applications of the SPIE Symposium on Defense and Security, 2008, pp. 69820S.01"69820S.12.
  6. Karrels, D.R., and Peterson, G.L., "CyberCraft: Protecting Electronic Systems with Lightweight Agents," Cyberspace Research Workshop, 2007, pp. 58-62. draft
  7. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., "Steganography Anomaly Detection Using Simple One Class Classification," Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2007, pp. 6579015.1-6579015.6. draft
  8. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., "Steganalysis Feature Improvement Using Expectation Maximization," Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2007, pp. 6575030.1-6575030.6. draft
  9. Agaian, S., Peterson, G.L., Bauer, K.W., and Rodriguez, B., "Multiple masks-based pixel comparison steganalysis method for mobile imaging," Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2006, pp. 6250005.1-6250005.6. "draft
  10. Agaian, S.S., Rodriguez, B.M., and Peterson, G.L., "New Steganalysis Technique for the Digital Media Forensics Examiner," IEEE Region 5 Technical, Professional, and Student Conference, 2006.
  11. Butts, J.W., Mills, R.F., and Peterson, G.L., "A Multidiscipline Approach to Mitigating the Insider Threat," International Conference on Information Warfare and Security (ICIW), 2006, pp. 29-36. draft

Book

  1. Peterson, G.L., and Shenoi, S. Advances in Digital Forensics VIII, Boston, MA: Springer Science+Business Media, 2012. ISBN: 978-3-642-33961-5
  2. Peterson, G.L., and Shenoi, S., Advances in Digital Forensics VII Boston, MA: Springer Science+Business Media, 2011. ISBN: 978-3642242113
  3. Shenoi, S., and Peterson, G.L., Advances in Digital Forensics V, New York, NY: Springer Science+Business Media, 2009. ISBN: 978-3-642-04154-9

Book Chapters

  1. Esposito, S.J., and Peterson, G.L., "Analysis of Forensic Super Timelines," Advances in Digital Forensics VIII, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2013, pp TBD.
  2. Hay, A., Krill, D., Kuhar, B, and Peterson, G.L., "Evaluating Digital Forensics Options for the Apple iPad," Advances in Digital Forensics VII, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2011, pp. 257-274. draft
  3. Thomas, B.D., Mullins, B.E., Peterson, G.L., and Mills, R.F., "An FPGA System for Detecting Malicious DNS Network Traffic," Advances in Digital Forensics VII, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2011, pp. 195-208.draft
  4. Okolica, J., and Peterson, G.L., " A Compiled Memory Analysis Tool," Advances in Digital Forensics VI, S. Shenoi and K.P. Chow, Ed., New York, NY: Springer Science+Business Media, 2010, pp 195-204. draft DOI:10.1007/978-3-642-15506-2_14 software
  5. Schrader, K.F., Mullins, B.E., Peterson, G.L., and Mills, R.F., "Tracking Contraband Files Transmitted Using BitTorrent," Advances in Digital Forensics V, S. Shenoi and G. Peterson, Eds., New York, NY: Springer Science+Business Media, 2009, pp. 159-174.
  6. Mills, R.F., Peterson, G.L., and Grimaila, M., "Insider Threat Prevention, Detection and Mitigation," Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, Knapp, K.J., Ed., Hershey, NY: IGI Global, 2009, pp. 48-74.
  7. Fogg, P., Peterson, G.L., and Veth, M., "Digital Image Background Matching for Identifying Suspects," Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 307-324. draft
  8. Molina, D., Zimmermann, M.A., Roberts, G.R., Eaddie, M.T., and Peterson, G.L., "Timely Rootkit Detection During Live Response," Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 139-150. draft software
     
  9. Rodriguez, B.M., Peterson, G.L., and Bauer, K.W., "Fusion of Steganalysis Systems Using Bayesian Model Averaging," Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 345-356. draft
  10. Todd, A.D., Benson, J. A., Peterson, G.L., Franz, T. P., Stevens, M. R., and Raines, R.A., "An Analysis of Forensic Tools in Detecting Rootkits and Hidden Processes," Advances in Digital Forensics III, S. Shenoi, and P. Craiger, Eds., New York, NY: Springer Science+Business Media, 2007, pp. 89-106.
  11. Rodriguez, B.M., and Peterson, G.L., "Steganography Detection Using Mutli-Class Classification," Advances in Digital Forensics III, Eds. Craiger, P., and Shenoi, S. Eds., New York, NY: Springer Science+Business Media, 2007, pp. 193-204. draft
  12. Okolica, J.S., Peterson, G.L., and Mills, R.F., "Using PLSI-U to Detect Insider Threats from Email Traffic," Advances in Digital Forensics II, Olivier, M.S., Shenoi, S., Eds., New York, NY: Springer Science+Business Media, 2006, pp 91-104.
  13. Peterson, G.L., 2006, "Forensic Analysis of Digital Image Tampering," Advances in Digital Forensics, Polit, M., Shenoi, S., Eds., New York, NY: Springer Science+Business Media, 2006, pp. 259-270.

Other Publications

  1. Okolica, J.S, and Peterson, G.L. "Extracting Forensic Artifacts from Windows O/S Memory," AFIT Technical Report AFIT/EN/TR-11-02, 2011. draft software
  2. McDonald, J.T, Peterson, G.L., Karrels, D.R., Andel, T.R., and Raines, R.A., "Guarding the CyberCastle in 2020," IA Newsletter, Information Assurance Technical Analysis Center, Vol. 11, No. 3, Fall 2008, pp. 4-12. open access
  3. Peterson, G.L., Raines, R.A., and Baldwin, R.O., "Digital Forensics Education at the Air Force Institute of Technology," IA Newsletter, Information Assurance Technical Analysis Center, Vol. 9, No. 3, Fall 2006, pp. 30-34. open access
⇑ Return to top ⇑