Dr. Gilbert Bert L. Peterson, Professor of Computer Science

Associate Dean for Academic Affairs

Bio Photo

 

Contact:
Comm: 937-255-3636 x4281
DSN: 785-3636 x4281
Click to E-mail
View Department

Publications

Journal Articles
 

  1. Okolica, J.S., Peterson, G.L., Mills, R.F. and Grimaila, M.R., "Sequence Pattern Mining with Variables," IEEE Transactions on Knowledge and Data Engineering, (Early Access). draft DOI: 10.1109/TKDE.2018.2881675
  2. Jordan, P.L., Peterson, G.L., Lin, A.C., Mendenhall, M.J., and Sellers, A.J., "Narrowing the scope of failure prediction using targeted fault load injection," Enterprise Information Systems, October 2017, pp. 1-16 draft DOI: 10.1080/17517575.2017.1390167
  3. Millar, J.R., Hodson, D.D., Peterson, G.L., Ahner, D.K., "Optimizing update scheduling parameters for distributed virtual environments supporting operational test," Concurrency and Computation: Practice and Experience, 2017;e4156. DOI: 10.1002/cpe.4156.
  4. Lapso, J., Peterson, G.L., and Okolica, J.S., "Whitelisting system state in windows forensic memory visualizations," Digital Investigation, Vol. 20, March 2017, pp. 2—15.draft video DOI: 10.1016/j.diin.2016.12.002
  5. Vaughan, S.L., Mills, R.F., Peterson, G.L., Grimaila, M.R., Rogers, S.K., Oxley, M.E., and Patterson, R.E., "A Dual-Process Qualia Modeling Framework", Biologically Inspired Cognitive Architectures, Vol. 17, pp 71-85, 2016.
  6. Schmitt, D.T. and Peterson, G.L., "Feature Detection and Matching on Atmospheric Nuclear Detonation Video," IET Computer Vision Journal, vol. 10, no. 5, 2016, pp. 359-365. draft DOI: iet-cvi.2015.0145
  7. Millar, J.R., Hodson, D.D., Peterson, G.L., and Ahner, D.K., "Data Quality Challenges in Distributed Live-Virtual-Constructive Test Environments," ACM Journal of Data and Information Quality," vol. 7, no. 1-2, article 2, 2016. draft DOI: 10.1145/2850420
  8. Schmitt, D.T., Slaughter, R. and Peterson, G.L., "Quantifying 3D Positional Uncertainty of Rediological Material from Nuclear Detonation Video," Journal of Nuclear Science and Engineering, vol. 182, no. 2, 2016, pp. 243-255. draft DOI: 10.13182/NSE14-141
  9. King, D.W. and Peterson, G.L., "Epaminondas: Exploring Combat Tactics," ICGA Journal, vol. 37 no. 3, 2014, pp. 131-143. draft DOI: 10.3233/ICG-2014-37302
  10. Bindewald, J.M., Miller, M.E. and Peterson, G.L., "A Function-to-Task Process Model for Adaptive Automation System Design," International Journal of Human-Computer Studies, vol. 72, no. 12, 2014, pp. 822-834. draft DOI: 10.1016/j.ijhcs.2014.07.004.
  11. Bailey, K.O., Okolica, J.S. and Peterson, G.L., "User Identification and Authentication using Multi-Modal Behavioral Biometrics," Computers & Security, vol. 43, 2014, pp. 77-89. draft DOI: 10.1016/j.cose.2014.03.0052
  12. Noel, G.E. and Peterson, G.L., "Applicability of Latent Dirichlet Allocation to Multi-Disk Search," Digital Investigation, vol. 11, no. 1, 2014, pp. 43-56. draft DOI: 10.1016/j.diin.2014.02.001
  13. Karrels, D.R., Peterson, G.L., and Mullins, B.E., "Large-scale Cooperative Task Distribution on Peer-to-Peer Networks," Web Intelligence and Agent Systems (Accepted: February 2012). draft
  14. Dube, T., Raines, R., Peterson, G.L., Bauer, K., Grimaila, M.R., and Rogers, S., "Malware Target Recognition via Static Heuristics," IEEE Computer & Security, vol. 31, no. 1, 2012, pp. 137-147. DOI: 10.1016/j.cose.2011.09.002.
  15. Grimaila, M.R., Myers, J., Mills, R.F., and Peterson, G.L., "Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology," The Journal of Defense Modeling and Simulation: Applications, Methodology, and Technology, vol. 9, no. 2, 2012, pp 219-241. draft DOI: 10.1177/1548512911399303.
  16. Compton, M.D., Hopkinson, K.M., Peterson, G.L., and Moore, J.T., "Using Modeling and Simulation to Examine the Benefits of a Network Tasking Order," Journal of Defense Modeling and Simulation, vol. 9, no. 3, 2012, pp. 205-217. draft DOI: 10.1177/1548512910371702.
  17. Bryant, A., Mills, R.F., Peterson, G.L., and Grimaila, M.R., "Software Reverse Engineering as a Sensemaking Task," International Journal of Information Assurance and Security, vol. 6, no. 6, 2011, pp. 483-494. draft
  18. Okolica, J., and Peterson, G.L., "Windows Driver Memory Analysis: A Reverse Engineering Methodology," IEEE Computers & Security, vol. 30, 2011, pp. 770-779. draft DOI: 10.1016/j.cose.2011.08.001 software
  19. Okolica, J., and Peterson, G.L., "Extracting the Windows Clipboard from Physical Memory," Digital Investigation: The International Journal of Digital Forensics & Incident Response, vol. 8S, pp. S118-S124. open access DOI: 10.1016/j.diin.2011.05.014 software
  20. Mills, R.F., Grimaila, M.R., Peterson, G.L., and Butts, J.W., "A scenario-based approach to mitigating the insider threat," Information Systems Security Association Journal, May 2011, pp. 12-19. open access
  21. Weissgerber, K., Lamont, G.B., Borghetti, B.J., and Peterson, G.L., "Determining Solution Space Characteristics for Real Time Strategy Games & Characterizing Winning Strategies," Computer Games Technology Journal, vol. 2011, 2011, pp 1-17. draft DOI: DOI: 10.1155/2011/834026.
  22. Peterson, G.L., Duffy, J.P., and Hooper, D.J., "Dynamic Behavior Sequencing for Hybrid Robot Architectures," Journal of Intelligent and Robotic Systems, vol. 64, no. 2, 2011 pp. 179-196. draft DOI: 10.1007/s10846-010-9535-3.
  23. Woolley, B., Peterson, G.L., and Kresge, J.T., "Real-Time Behavior Based Robot Control System," Autonomous Robots, vol. 30, no. 3, 2011, pp. 233-242. draft DOI: 10.1007/s10514-010-9215-y.
  24. Okolica, J., and Peterson, G.L., "Windows systems agnostic memory analysis," Digital Investigation: The International Journal of Digital Forensics & Incident Response, vol. 7, sup. 1, 2010, pp. S48-S56. open access DOI: 10.1016/j.diin.2010.05.007 presentation.
  25. Schrader, K.R., Mullins, B.E., Peterson, G.L., and Mills, R.F., "An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols," International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010, pp. 236-247. draft press.
  26. Beeker, K., Birdwell, M., Principi, P., Huber, D., Mills, R.B., and Peterson, G.L., "Demystifying Cyber Battle Damage Assessment," USAF Weapons Review, Summer 2009, pp. 9-18, draft.
  27. Karrels, D., Peterson, G.L., and Mullins, B.E., "Structured P2P Technologies for Distributed Command and Control," Peer-to-Peer Networking and Applications, vol. 2, no. 4, pp. 311-333, 2009. draft DOI:10.1007/s12083-009-0033-y.
  28. Woolley, B., Peterson, G.L., "Unified Behavior Framework for Reactive Robot Control," Journal of Intelligent and Robotic Systems, vol. 55, no. 2, pp.155-176, 2009. draft DOI: 10.1007/s10846-008-9299-1.
  29. Stevens, M., Williams, P.D., Peterson, G.L., and Kurkowski, S.H., "Integrating Trust into the CyberCraft Initiative via the Trust Vectors Model," IEEE Computational Intelligence Magazine, vol. 3, no. 2, pp. 65-68, 2008. draft DOI: 10.1109/MCI.2008.4490264.
  30. Okolica, J.S., Peterson, G.L., and Mills, R.F., "Using Author Topic to detect insider threats from email traffic," Digital Investigations Journal. vol. 4, no. 3-4, pp. 158-164, 2008. draft DOI: 10.1016/j.diin.2007.10.002.
  31. Peterson, G.L., Raines, R.A., and Baldwin, R.O., "Digital Forensics Educational Needs in the Miami Valley Region," Journal of Applied Security Research, vol. 3, no. 3-4, pp. 429-439, 2008. draft DOI: 10.1080/19361610801981662.
  32. Peterson, G.L., Mayer, C.B., Kubler, T., "Ant Clustering with Locally Weighting Ant Perception and Diversified Memory," Swarm Intelligence. vol. 2, no. 1, pp. 43-68, 2008. draft DOI: 10.1007/s11721-008-0011-7.
  33. Peterson, G.L., and McBride, B.T., "Importance of Generalizability to Anomaly Detection," Knowledge and Information Systems, vol. 14, pp.377-392, 2008. draft DOI: 10.1007/s10115-007-0072-8.
  34. Okolica, J.S., Peterson, G.L., and Mills, R.F., "Using PLSI-U to Detect Insider Threats by Datamining Email," International Journal of Security and Networks (IJSN), vol.3, no. 2 , pp. 114-121, 2008. draft DOI: 10.1504/IJSN.2008.017224.
  35. Wardell, D.C., and Peterson, G.L., "Fuzzy State Aggregation and Policy Hill Climbing for Stochastic Environments," International Journal of Computational Intelligence and Applications, vol. 6, no. 3, pp. 413-428, 2007. draft DOI: 10.1142/S1469026806001903.
  36. McBride, B.T., Peterson, G.L., and Gustafson, S.C., "A New Blind Method for Detecting Novel Steganography," Digital Investigation, vol. 2, pp. 50-70, 2005. draft DOI: 10.1016/j.diin.2005.01.003.
  37. Peterson, G.L., and Cook, D. J., "Incorporating Decision-Theoretic Planning in a Robot Architecture," Robotics and Autonomous Systems, vol. 42, no. 2, pp. 89-106, 2003. draft DOI: 10.1016/S0921-8890(02)00326-3.

Refereed Conference Publications
 

  1. King, D.W. and Peterson, G.L., "A Macro-Level Order Metric for Self-Organizing Adaptive Systems," 2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 2018, pp 60-69. draft DOI: 10.1109/SASO.2018.00017
  2. King, D., Hodson, D., and Peterson, G.L., "The Role of Simulation Frameworks in Relation to Experiments," Proceedings of the 2017 Winter Simulation Conference, pp. 4132 – 4161, 2017.
  3. King, D., J.M. Bindewald, and Peterson, G.L.,"Informal Team Assignment in a Pursuit-Evasion Game." The 31st International Florida Artificial Intelligence Research Society Conference (FLAIRS-31). Melbourne, FL, May 2018, pp. 32-36. open access
  4. Ball, N., J.M. Bindewald, and Peterson, G.L., "On-line Agent Detection of Goal Changes." The 31st International Florida Artificial Intelligence Research Society Conference (FLAIRS-31). Melbourne, FL, May 2018, pp. 294-296. open access
  5. Sample, K.R., Lin, A.C, Borghetti, B.J., and Peterson, G.L., "Predicting Trouble Ticket Resolution," The 31st International Florida Artificial Intelligence Research Society Conference (FLAIRS-31). Melbourne, FL, May 2018, pp. 201-204.open access
  6. Webber. F.C., and Peterson, G.L., "Enhancing Multi-Objective Reinforcement Learning with Concept Drift," The Thirtieth International FLAIRS Conference, pp. 460 – 465, 2017.open access
  7. Ziegler, J., Bindewald, J.M., and Peterson, G.L., "AutoTank, Education Advancement in Artificial Intelligence," 2017 Model AI Assignment Workshop, 2017.
  8. Wardell, D.C., Mills, R.F., Peterson, G.L., and Oxley, M.E., "A Method for Revealing and Addressing Security Vulnerabilities in Cyber-Physical Systems by Modeling Malicious Agent Interactions with Formal Verification," Complex Adaptive Systems, Publication 6, pp. 24-31, 2016.
  9. Bindewald, J.M., Peterson, G.L, and Miller, M.E., "Clustering-Based Online Player Modeling," International Joint Conference on Artificial Intelligence – Computer Games Workshop, 2016, pp. TBD draft
  10. Jordan, P. L., Van Patten, D.A., Peterson, G.L., and Sellers, A.J., "Distributed PowerShell Load Generator (D-PLG): A New Tool for Dynamically Generating Network Traffic," SIMULTECH, 2016, pp. 195-202. open access
  11. Lin, A.C., and Peterson, G.L., "Activity Pattern Discovery from Network Captures," IEEE Symposium on Security and Privacy Workshop, 2016, pp. 1-8. draft DOI: 10.1109/SPW.2016.22
  12. Wardell, D.C., Mills, R.F., Peterson, G.L., and Oxley, M.E., "Identifying Security Vulnerabilities in CPS by Modeling Malicious Interaction and Model Checking," Procedia Computer Science: Complex Adaptive Systems, vol. 95, 2016, pp. 24-31. draft DOI: 10.1016/j.procs.2016.09.289
  13. Bindewald, J.M., Peterson, G.L. and Miller, M.E., "Trajectory Generation with Player Modeling," Proceedings of the Twenty-Eighth Canadian Conference on Artificial Intelligence,, 2015, pp. 42-49. draft
  14. Schmitt, D.T. and Peterson, G.L., "Timing Mark Detection on Nuclear Detonation Video," 2014 IEEE Applied Image Pattern Recognition Workship (AIPR),, 2-14. pp. 1-5. draft
  15. Schmitt, D.T. and Peterson, G.L., "Machine Learning Nuclear Detonation Features" 2014 IEEE Applied Image Pattern Recognition Workship (AIPR),, 2-14. pp. 1-7. draft
  16. Millar, K.R., Hodson, D.D., Lamont, G.B. and Peterson, G.L., "Multi-Objective Optimization of Dead-Reckoning Error Thresholds for Virtual Environments," 2014 International Conference on Collaborative Technologes and Systems, 2014, pp. 562-596. draft DOI: 10.1109/CTS.2014.6867626.
  17. Noel, G. and Peterson, G.L., "Context-Driven Image Annotation Using ImageNet," the 26th International FLAIRS Conference, 2013, pp. 462-467. draft presentation
  18. Bryant, A.R., Mills, R.F., Grimaila, M.R., and Peterson, G.L., "Top-Level Goals in Reverse Engineering Executable Software," 8th International Conference on Information Warfare and Security ICIW-2013, 2013, pp. TBD.
  19. Bryant, A.R., Mills, R.F., Peterson, G.L., and Grimaila, M.R., "Eliciting a sensemaking process from verbal protocols of reverse engineers", Proceedings of the Annual Meeting of the Cognitive Science Society, Sapporo Japan, 2012, pp. 1386-1391. draft
  20. Hay, A., and Peterson, G.L., "Acquiring OS X File Handles through Forensic Memory Analysis", IEEE Systematic Approaches to Digital Forensics, Vancouver, BC, Canada, 2012, pp. TBD. draft volafox
  21. Weyers, C., and Peterson, G.L., "Improving Occupancy Grid FastSLAM by Integrating Navigation Sensors," IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA, 2011, pp. 859-864. draft DOI:10.1109/IROS-2011.6094514
  22. Peterson, G. L., Mayer, C.M., and Cousin, K., "WoLF Ant", IEEE Congress on Evolutionary Computation 2011, New Orleans, LA, 2011, pp. 1-6. draft DOI: 10.1109/CEC.2011.5949726
  23. Smith, M.J., Boxerbaum, A.J., Peterson, G.L., Quinn, R.J., "Electronic Image Stabilization using Optical Flow with Inertial Fusion," 2010 IEE/RSJ International Conference on Intelligent Robots and Systems, Taipei, Taiwan, October 2010, pp. 1146 " 1153, draft DOI: 10.1109/IROS.2010.5651113 video: unstabilized stabilized.
  24. Dube, T., Raines, R.A., Peterson, G.L., Bauer, K.W., Grimaila, M.R. and Rogers, S.K., "Malware Type Recognition and Cyber Situational Awareness," International Workshop on "Mission Assurance: Tools, Techniques, and Methodologies" at The Second IEEE International Conference on Information Privacy, Security, Risk and Trust, Minneapolis MN, August 2010, pp 938-943. draft DOI: 10.1109/SocialCom.2010.139.
  25. Dodge, D.A., Mullins, B.E., Peterson, G.L., Okolica, J.S., "Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection," Summer Computer Simulation Conference (SCSC2010), Ottawa Canada, July 2010, pp. 550-555. draft
  26. Clark, J.D., Mendenhall, M.J., and Peterson, G.L., "Stochastic Feature Selection with Distributed Feature Spacing for Hyperspectral Data," Second Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing (IEEE WHISPERS), 2010, pp. 1-4. draft DOI: 10.1109/WHISPERS.2010.5594951.
  27. Erskine, J.R., Peterson, G.L., Mullins, B.E., and Grimaila, M.R., "Developing Cyberspace Data Understanding Using CRISP-DM for Host-based IDS Feature Mining," Cyber Security and Information Intelligence Research Workshop, 2010, pp. 74:1-74:4. draft
  28. Karrels, D.R., Peterson, G.L., and Mullins, B.E., "RC-Chord: Resource Clustering in a Large-Scale Hierarchical Peer-to-Peer System," Military Communications Conference (MILCOM), 2009, pp. 1-7. draft DOI: 10.1109/MILCOM.2009.5379742.
  29. Hooper, D.J., Peterson, G.L., and Borghetti, B.J., "Dynamic Coalition Formation Under Uncertainty," Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009, pp. 4799-4804. draft DOI: 10.1109/IROS.2009.5354319.
  30. Seymour, R.S., and Peterson, G.L., "A Trust-based Multiagent System," 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), 2009, pp. 109-116. draft DOI: 10.1109/CSE.2009.297.
  31. Okolica, J.S., McDonald, J.T., Peterson, G.L., Mills, R.F., and Haas, M.W., "Developing Systems for Cyber Situational Awareness," Proceedings of the 2nd Cyberspace Research Workshop, 2009, pp. 46-56. draft
  32. Howard, T., Mendenhall, M., and Peterson, G.L., "Abstracting GIS Layers from Hyperspectral Imagery," First Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing (IEEE WHISPERS), 2009, pp. 1-4. draft DOI: 10.1109/WHISPERS.2009.5289023.
  33. Millar, J.R., Peterson, G.L., and Mendenhall, M.J., "Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps," Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 69-74. open access
  34. Seymour, R.S., and Peterson, G.L., "Responding to Sneaky Agents in Multi-agent Domains," Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 99-104. open access
  35. Hooper, D., and Peterson, G.L., "HAMR: A Hybrid Multi-Robot Control Architecture," Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 139-140. open access
  36. Holloway, E.M., Lamont, G.B., and Peterson, G.L., "Network Security Using Self Organized Multi-Agent Swarms," IEEE Symposium on Computational Intelligence in Cyber Security, 2009, pp. 2559-2566. draft DOI: 10.1109/CICYBS.2009.4925102.
  37. Lacey, T., Peterson, G.L., and Mills, R.F., "The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge", Hawaii International Conference on System Sciences (HICSS), 2009, pp. 1-9. draft DOI: 10.1109/HICSS.2009.433.
  38. Boxerbaum, A., Oro, J., Peterson, G.L., Quinn R.D., "The Latest Generation Whegs" Robot Features a Passive-Compliant Body Joint", 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 1636-1641. DOI: 10.1109/IROS.2008.4650997.
  39. Oimoen, S.C., Peterson, G.L., and Hopkinson, K.M., "Network Formation using Ant Colony Optimization " A Comparative Analysis," Sixth International Conference on Ant Colony Optimization and Swarm Intelligence, 2008, pp. 405-406. draft DOI: 10.1007/978-3-540-87527-7_47.
  40. Dries, E., and Peterson, G.L., "Scaling Ant Colony Optimization with Hierarchical Reinforcement Learning Partitioning," GECCO 2008: Genetic and Evolutionary Computation Conference, 2008, pp. 25-32. draft press
  41. Duffy, J.P., and Peterson G.L., "An Abstract Behavior Representation for Robust, Dynamic Sequencing in a Hybrid Architecture," AAAI Spring Symposium " Architectures for Intelligent Theory-Based Agents, 2008, pp. 19-24. open access
  42. Cousin, K., and Peterson, G.L., "Distributed Approach to Solving Constrained Multiagent Task Scheduling Problems," AAAI Fall Symposium " Regarding the "Intelligence" in Distributed Intelligent Systems (RIDIS), 2007, pp. 42-48. open access
  43. Woolley, B. and Peterson, G.L., "Genetic Evolution of Hierarchical Behavior Structures," Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, 2007, pp. 1731-1738. draft press
  44. Haag, C., Lamont, G.B., Williams, P., and Peterson, G.L., "An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions," Workshop on Defense Application of Computation Intelligence at GECCO 2007, London, July 2007, pp. 2717-2724. draft press
  45. Haag, C., Lamont, G.B., Peterson, G.L., and Williams, P. "An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions," Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS), 2007, pp. 420-436.
  46. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., "Multi-Class Classification Averaging Fusion for Detecting Steganography," 2007 IEEE International Conference on System of Systems Engineering, 2007, pp 309-314. draft DOI: 10.1109/SYSOSE.2007.4304292.
  47. Peterson, G.L., Raines, R.A., and Baldwin, R.O., "Graduate Digital Forensics Education at the Air Force Institute of Technology," Hawaii International Conference on System Sciences-HICSS-40, 2007, pp. 264-270. draft DOI: 10.1109/HICSS.2007.240.
  48. Rodriguez, B.M., Peterson, G.L., Bauer, K.B., and Agaian, S.S., "Steganalysis Embedding Percentage Determination with Learning Vector Quantization," 2006 IEEE International Conference on Systems Man and Cybernetics, 2006, pp. 1956-1961. draft DOI: 10.1109/ICSMC.2006.385001.
  49. Wardell, D.C., and Peterson, G.L., "Fuzzy State Aggregation and Off-Policy Reinforcement Learning for Stochastic Environments," The Eighth IASTED International Conference on Control and Applications (CA 2006), 2006, pp. 145-152. draft press
  50. Okolica, J.S., Peterson, G.L., and Mills, R.F., Using Author Topic to Detect Insider Threats from Email Traffic, IEEE International Conference on Intelligence and Security Informatics (ISI-2006), 2006, pp. 642-643. draft
  51. Cousin, K., and Peterson, G.L., "Cooperative Reinforcement Learning Using an Expert-Measuring Weighted Strategy with WoLF," The 9th IASTED International Conference on Artificial Intelligence and Soft Computing, 2005, pp. 165-170. draft press
  52. Peterson, G.L., Mills, R.F., McBride, B.T., and Alred, W.C., 2005, "A Comparison of Generalizability for Anomaly Detection," KDD-2005 Workshop on Data Mining Methods for Anomaly Detection, 2005, pp. 51-56. open access
  53. Yee, J., Mills, R.F., Peterson, G.L., and Bartczak, S., "Automatic Generation of Social Network Data from Electronic-Mail Communications," Tenth International Command and Control Research and Technology Symposium, 2005. open access
  54. Shapiro, J.M., Lamont, G.B., and Peterson, G.L., "An Evolutionary Algorithm to Generate Hyper-Ellipsoid Detectors for Negative Selection," GECCO 2005: Genetic and Evolutionary Computation Conference, 2005, pp. 337-344. draft press
  55. Laviers, K.R., and Peterson, G.L., "Cognitive Robot Mapping with Polylines and an Absolute Space Representation," Proceedings of the IEEE 2004 International Conference on Robotics and Automation (ICRA), 2004, pp. 3771-3776. draft press
  56. McBride, B.T., and Peterson, G.L., "Blind Data Classification using Hyper-Dimensional Convex Polytopes," Proceedings of the 17th International FLAIRS Conference, 2004, pp. 520-525. open access
  57. Peterson, G.L., and Cook, D. J., "Decision-Theoretic Planning in the Graphplan Framework," AIPS 2000 Workshop on Decision Theoretic Planning, 2000. draft
  58. Peterson, G.L., and Cook, D. J., "Decision-Theoretic Layered Robotic Control Architecture," Proceedings of the Sixteenth National Conference on Artificial Intelligence, 1999, pp. 976. open access
  59. Peterson, G.L., and Cook, D. J., "DFA Learning of Opponent Strategies," Proceedings of the 12th International FLAIRS Conference, 1998, pp. 367-371. open access
  60. Peterson, G.L., and Cook, D. J., "Planning and Learning in an Advanced Robotic Game," AAAI 1998 Fall Symposium on Integrated Planning for Autonomous Agent Architectures, 1998, pp. 55-61. draft

Conference Publications (Refereed Abstract)
 

  1. Eng, K.G., Peterson, G.L., Kresge, J.T., and Campbell, J.L., "Intelligent Behavioral Action Aiding for Improved Image Navigation," ION International Technical Interchange Meeting, 2013, pp. TBD.
  2. Vongsy, K., Mendenhall, M.J., Eismann, M.T., and Peterson, G.L., "Removing Parallax-Induced Changes in Hyperspectral Change Detection," IEEE International Geoscience and Remote Sensing Symposium, 2012, pp. 2012-2015. draft DOI:10.1109/IGARSS.2012.6350982
  3. Venable, D., Campbell, J., Kresge, J., *Hooper, D., Peterson, G., and Veth, M., "Performance Evaluation of Coupling Between Vehicle Guidance and Vision Aided Navigation," Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation, Savannah,. GA, September 2009, pp. 826-834.
  4. Rodriguez, B.M., and Peterson, G.L., "Multi-Class Classification Fusion Using Boosting for Identifying Steganography Methods," Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2008 of the SPIE Symposium on Defense and Security, 2008, pp. 697407.01-697470.10. draft
  5. Rodriguez, B.M., and Peterson, G.L., "Classifier Dependent Feature Preprocessing Methods," Mobile Multimedia/Image Processing, Security and Applications of the SPIE Symposium on Defense and Security, 2008, pp. 69820S.01"69820S.12.
  6. Karrels, D.R., and Peterson, G.L., "CyberCraft: Protecting Electronic Systems with Lightweight Agents," Cyberspace Research Workshop, 2007, pp. 58-62. draft
  7. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., "Steganography Anomaly Detection Using Simple One Class Classification," Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2007, pp. 6579015.1-6579015.6. draft
  8. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., "Steganalysis Feature Improvement Using Expectation Maximization," Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2007, pp. 6575030.1-6575030.6. draft
  9. Agaian, S., Peterson, G.L., Bauer, K.W., and Rodriguez, B., "Multiple masks-based pixel comparison steganalysis method for mobile imaging," Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2006, pp. 6250005.1-6250005.6. "draft
  10. Agaian, S.S., Rodriguez, B.M., and Peterson, G.L., "New Steganalysis Technique for the Digital Media Forensics Examiner," IEEE Region 5 Technical, Professional, and Student Conference, 2006.
  11. Butts, J.W., Mills, R.F., and Peterson, G.L., "A Multidiscipline Approach to Mitigating the Insider Threat," International Conference on Information Warfare and Security (ICIW), 2006, pp. 29-36. draft

Book

  1. Peterson, G.L., and Shenoi, S. Advances in Digital Forensics XI, Springer-Verlag Berlin Heidelberg, 2015. ISBN: 978-3-319-24122-7
  2. Peterson, G.L., and Shenoi, S. Advances in Digital Forensics X, Springer-Verlag Berlin Heidelberg, 2014. ISBN: 978-3-662-44951-6
  3. Peterson, G.L., and Shenoi, S. Advances in Digital Forensics IX, Springer-Verlag Berlin Heidelberg, 2013. ISBN: 978-3-642-41147-2
  4. Peterson, G.L., and Shenoi, S. Advances in Digital Forensics VIII, Boston, MA: Springer Science+Business Media, 2012. ISBN: 978-3-642-33961-5
  5. Peterson, G.L., and Shenoi, S., Advances in Digital Forensics VII Boston, MA: Springer Science+Business Media, 2011. ISBN: 978-3642242113
  6. Shenoi, S., and Peterson, G.L., Advances in Digital Forensics V, New York, NY: Springer Science+Business Media, 2009. ISBN: 978-3-642-04154-9

Book Chapters

  1. Good, R., and Peterson, G., "Automated Collection and Correlation of File Provenance Information," In Peterson, G., Shenoi, S. (eds), Advances in Digital Forensics XIII, Springer, 2017. pp. 269 - 284. draft
  2. Jordan, P. L., Van Patten, D.A., Peterson, G.L., and Sellers, A.J., "Distributed PowerShell Load Generator (D-PLG): A New Tool for Dynamically Generating Dynamic Network Traffic," In: Obaidat M., Ören T., Merkuryev Y. (eds) Simulation and Modeling Methodologies, Technologies and Applications. SIMULTECH 2016. Advances in Intelligent Systems and Computing, vol 676. Springer, Cham, 2018, pp. 83-96.
  3. Bindewald, J.M., Peterson, G.L., Miller, M.E., "Clustering-Based Online Player Modeling," In: Cazenave T., Winands M., Edelkamp S., Schiffel S., Thielscher M., Togelius J. (eds) Computer Games. Communications in Computer and Information Science, vol 705. Springer, 2017.draft DOI: 10.1007/978-3-319-57969-6_7
  4. Esposito, S.J., and Peterson, G.L., "Analysis of Forensic Super Timelines," Advances in Digital Forensics VIII, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2013, pp TBD.
  5. Hay, A., Krill, D., Kuhar, B, and Peterson, G.L., "Evaluating Digital Forensics Options for the Apple iPad," Advances in Digital Forensics VII, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2011, pp. 257-274. draft
  6. Thomas, B.D., Mullins, B.E., Peterson, G.L., and Mills, R.F., "An FPGA System for Detecting Malicious DNS Network Traffic," Advances in Digital Forensics VII, G.L. Peterson and S. Shenoi, Ed., Boston: Springer, 2011, pp. 195-208.draft
  7. Okolica, J., and Peterson, G.L., " A Compiled Memory Analysis Tool," Advances in Digital Forensics VI, S. Shenoi and K.P. Chow, Ed., New York, NY: Springer Science+Business Media, 2010, pp 195-204. draft DOI:10.1007/978-3-642-15506-2_14 software
  8. Schrader, K.F., Mullins, B.E., Peterson, G.L., and Mills, R.F., "Tracking Contraband Files Transmitted Using BitTorrent," Advances in Digital Forensics V, S. Shenoi and G. Peterson, Eds., New York, NY: Springer Science+Business Media, 2009, pp. 159-174.
  9. Mills, R.F., Peterson, G.L., and Grimaila, M., "Insider Threat Prevention, Detection and Mitigation," Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, Knapp, K.J., Ed., Hershey, NY: IGI Global, 2009, pp. 48-74.
  10. Fogg, P., Peterson, G.L., and Veth, M., "Digital Image Background Matching for Identifying Suspects," Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 307-324. draft
  11. Molina, D., Zimmermann, M.A., Roberts, G.R., Eaddie, M.T., and Peterson, G.L., "Timely Rootkit Detection During Live Response," Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 139-150. draft software
     
  12. Rodriguez, B.M., Peterson, G.L., and Bauer, K.W., "Fusion of Steganalysis Systems Using Bayesian Model Averaging," Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 345-356. draft
  13. Todd, A.D., Benson, J. A., Peterson, G.L., Franz, T. P., Stevens, M. R., and Raines, R.A., "An Analysis of Forensic Tools in Detecting Rootkits and Hidden Processes," Advances in Digital Forensics III, S. Shenoi, and P. Craiger, Eds., New York, NY: Springer Science+Business Media, 2007, pp. 89-106.
  14. Rodriguez, B.M., and Peterson, G.L., "Steganography Detection Using Mutli-Class Classification," Advances in Digital Forensics III, Eds. Craiger, P., and Shenoi, S. Eds., New York, NY: Springer Science+Business Media, 2007, pp. 193-204. draft
  15. Okolica, J.S., Peterson, G.L., and Mills, R.F., "Using PLSI-U to Detect Insider Threats from Email Traffic," Advances in Digital Forensics II, Olivier, M.S., Shenoi, S., Eds., New York, NY: Springer Science+Business Media, 2006, pp 91-104.
  16. Peterson, G.L., 2006, "Forensic Analysis of Digital Image Tampering," Advances in Digital Forensics, Polit, M., Shenoi, S., Eds., New York, NY: Springer Science+Business Media, 2006, pp. 259-270.

Other Publications

  1. Okolica, J.S, and Peterson, G.L. "Extracting Forensic Artifacts from Windows O/S Memory," AFIT Technical Report AFIT/EN/TR-11-02, 2011. draft software
  2. McDonald, J.T, Peterson, G.L., Karrels, D.R., Andel, T.R., and Raines, R.A., "Guarding the CyberCastle in 2020," IA Newsletter, Information Assurance Technical Analysis Center, Vol. 11, No. 3, Fall 2008, pp. 4-12. open access
  3. Peterson, G.L., Raines, R.A., and Baldwin, R.O., "Digital Forensics Education at the Air Force Institute of Technology," IA Newsletter, Information Assurance Technical Analysis Center, Vol. 9, No. 3, Fall 2006, pp. 30-34. open access
Return to the top of the page

Air Force Institute of Technology
2950 Hobson Way
Wright-Patterson Air Force Base, OH 45433-7765
Commercial: 937-255-6565 | DSN: 785-6565