Bert's Publications

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therin are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Journal Articles

  1. Karrels, D.R., Peterson, G.L., and Mullins, B.E., "Large-scale Cooperative Task Distribution on Peer-to-Peer Networks," Web Intelligence and Agent Systems (Accepted: February 2012). draft
  2. Dube, T., Raines, R., Peterson, G.L., Bauer, K., Grimaila, M.R., and Rogers, S., "Malware Target Recognition via Static Heuristics," IEEE Computer & Security, vol. 31, no. 1, 2012, pp. 137-147. DOI: 10.1016/j.cose.2011.09.002.
  3. Bryant, A., Mills, R.F., Peterson, G.L., and Grimaila, M.R., "Software Reverse Engineering as a Sensemaking Task," International Journal of Information Assurance and Security, vol. 6, no. 6, 2011, pp. 483-494.
  4. Okolica, J., and Peterson, G.L., "Windows Driver Memory Analysis: A Reverse Engineering Methodology," IEEE Computers & Security, vol. 30, 2011, pp. 770-779. draft DOI: 10.1016/j.cose.2011.08.001
  5. Okolica, J., and Peterson, G.L., “Extracting the Windows Clipboard from Physical Memory," Digital Investigation: The International Journal of Digital Forensics & Incident Response, vol. 8S, pp. S118-S124. open access DOI: 10.1016/j.diin.2011.05.014.
  6. Mills, R.F., Grimaila, M.R., Peterson, G.L., and Butts, J.W., "A scenario-based approach to mitigating the insider threat," Information Systems Security Association Journal, May 2011, pp. 12-19. open access
  7. Grimaila, M.R., Myers, J., Mills, R.F., and Peterson, G.L., "Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology," The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, vol. 9, no. 2, 2012, pp 219-241. draft DOI: 10.1177/1548512911399303.
  8. Weissgerber, K., Lamont, G.B., Borghetti, B.J., and Peterson, G.L., "Determining Solution Space Characteristics for Real Time Strategy Games & Characterizing Winning Strategies," Computer Games Technology Journal, vol. 2011, 2011, pp 1-17. draft DOI: DOI: 10.1155/2011/834026.
  9. Peterson, G.L., Duffy, J.P., and Hooper, D.J., "Dynamic Behavior Sequencing for Hybrid Robot Architectures," Journal of Intelligent and Robotic Systems, vol. 64, no. 2, 2011 pp. 179-196. draft DOI: 10.1007/s10846-010-9535-3.
  10. Compton, M.D., Hopkinson, K.M., Peterson, G.L., and Moore, J.T., "Using Modeling and Simulation to Examine the Benefits of a Network Tasking Order," Journal of Defense Modeling and Simulation, (Accepted: December 2010, Estimated Publication Date: Fall 2011). draft DOI: DOI: 10.1177/1548512910371702.
  11. Woolley, B., Peterson, G.L., and Kresge, J.T., "Real-Time Behavior Based Robot Control System," Autonomous Robots, vol. 30, no. 3, 2011, pp. 233-242. draft DOI: 10.1007/s10514-010-9215-y.
  12. Okolica, J., and Peterson, G.L., “Windows systems agnostic memory analysis,” Digital Investigation: The International Journal of Digital Forensics & Incident Response, vol. 7, sup. 1, 2010, pp. S48-S56. open access DOI: 10.1016/j.diin.2010.05.007 presentation.
  13. Schrader, K.R., Mullins, B.E., Peterson, G.L., and Mills, R.F., “An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols,” International Journal of Security and Networks (IJSN), vol. 5, no. 4, 2010, pp. 236-247. draft press.
  14. Beeker, K., Birdwell, M., Principi, P., Huber, D., Mills, R.B., and Peterson, G.L., “Demystifying Cyber Battle Damage Assessment,” USAF Weapons Review, Summer 2009, pp. 9-18, draft.
  15. Karrels, D., Peterson, G.L., and Mullins, B.E., “Structured P2P Technologies for Distributed Command and Control,” Peer-to-Peer Networking and Applications, vol. 2, no. 4, pp. 311-333, 2009. draft DOI:10.1007/s12083-009-0033-y.
  16. Woolley, B., Peterson, G.L., “Unified Behavior Framework for Reactive Robot Control,” Journal of Intelligent and Robotic Systems, vol. 55, no. 2, pp.155-176, 2009. draft DOI: 10.1007/s10846-008-9299-1.
  17. Stevens, M., Williams, P.D., Peterson, G.L., and Kurkowski, S.H., “Integrating Trust into the CyberCraft Initiative via the Trust Vectors Model,” IEEE Computational Intelligence Magazine, vol. 3, no. 2, pp. 65-68, 2008. draft DOI: 10.1109/MCI.2008.4490264.
  18. Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using Author Topic to detect insider threats from email traffic,” Digital Investigations Journal. vol. 4, no. 3-4, pp. 158-164, 2008. draft DOI: 10.1016/j.diin.2007.10.002.
  19. Peterson, G.L., Raines, R.A., and Baldwin, R.O., “Digital Forensics Educational Needs in the Miami Valley Region,” Journal of Applied Security Research, vol. 3, no. 3-4, pp. 429-439, 2008. draft DOI: 10.1080/19361610801981662.
  20. Peterson, G.L., Mayer, C.B., Kubler, T., “Ant Clustering with Locally Weighting Ant Perception and Diversified Memory,” Swarm Intelligence. vol. 2, no. 1, pp. 43-68, 2008. draft DOI: 10.1007/s11721-008-0011-7.
  21. Peterson, G.L., and McBride, B.T., “Importance of Generalizability to Anomaly Detection,” Knowledge and Information Systems, vol. 14, pp.377-392, 2008. draft DOI: 10.1007/s10115-007-0072-8.
  22. Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using PLSI-U to Detect Insider Threats by Datamining Email,” International Journal of Security and Networks (IJSN), vol.3, no. 2 , pp. 114-121, 2008. draft DOI: 10.1504/IJSN.2008.017224.
  23. Wardell, D.C., and Peterson, G.L., “Fuzzy State Aggregation and Policy Hill Climbing for Stochastic Environments,” International Journal of Computational Intelligence and Applications, vol. 6, no. 3, pp. 413-428, 2007. draft DOI: 10.1142/S1469026806001903.
  24. McBride, B.T., Peterson, G.L., and Gustafson, S.C., “A New Blind Method for Detecting Novel Steganography,” Digital Investigation, vol. 2, pp. 50-70, 2005. draft DOI: 10.1016/j.diin.2005.01.003.
  25. Peterson, G.L., and Cook, D. J., “Incorporating Decision-Theoretic Planning in a Robot Architecture,” Robotics and Autonomous Systems, vol. 42, no. 2, pp. 89-106, 2003. draft DOI: 10.1016/S0921-8890(02)00326-3.

Refereed Conference Publications

  1. Weyers, C., and Peterson, G.L., “Improving Occupancy Grid FastSLAM by Integrating Navigation Sensors,” IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA, 2011, pp. TBD. draft
  2. Peterson, G. L., Mayer, C.M., and Cousin, K., “WoLF Ant”, IEEE Congress on Evolutionary Computation 2011, New Orleans, LA, 2011, pp. TBD. draft
  3. Smith, M.J., Boxerbaum, A.J., Peterson, G.L., Quinn, R.J., “Electronic Image Stabilization using Optical Flow with Inertial Fusion,” 2010 IEE/RSJ International Conference on Intelligent Robots and Systems, Taipei, Taiwan, October 2010, pp. 1146 – 1153, draft DOI: 10.1109/IROS.2010.5651113 video: unstabilized stabilized.
  4. Dube, T., Raines, R.A., Peterson, G.L., Bauer, K.W., Grimaila, M.R. and Rogers, S.K., “Malware Type Recognition and Cyber Situational Awareness,” International Workshop on “Mission Assurance: Tools, Techniques, and Methodologies" at The Second IEEE International Conference on Information Privacy, Security, Risk and Trust, Minneapolis MN, August 2010, pp 938-943. draft DOI: 10.1109/SocialCom.2010.139.
  5. Erskine, J.R., Peterson, G.L., Mullins, B.E., and Grimaila, M.R., “Developing Cyberspace Data Understanding Using CRISP-DM for Host-based IDS Feature Mining,” Cyber Security and Information Intelligence Research Workshop, 2010, pp. 74:1-74:4. draft
  6. Clark, J.D., Mendenhall, M.J., and Peterson, G.L., “Stochastic Feature Selection with Distributed Feature Spacing for Hyperspectral Data," Second Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing (IEEE WHISPERS), 2010, pp. 1-4. draft DOI: 10.1109/WHISPERS.2010.5594951.
  7. Karrels, D.R., Peterson, G.L., and Mullins, B.E., “RC-Chord: Resource Clustering in a Large-Scale Hierarchical Peer-to-Peer System,” Military Communications Conference (MILCOM), 2009, pp. 1-7. draft DOI: 10.1109/MILCOM.2009.5379742.
  8. Hooper, D.J., Peterson, G.L., and Borghetti, B.J., “Dynamic Coalition Formation Under Uncertainty,” Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009, pp. 4799-4804. draft DOI: 10.1109/IROS.2009.5354319.
  9. Seymour, R.S., and Peterson, G.L., “A Trust-based Multiagent System,” 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), 2009, pp. 109-116. draft DOI: 10.1109/CSE.2009.297.
  10. Okolica, J.S., McDonald, J.T., Peterson, G.L., Mills, R.F., and Haas, M.W., “Developing Systems for Cyber Situational Awareness,” Proceedings of the 2nd Cyberspace Research Workshop, 2009, pp. 46-56. draft
  11. Howard, T., Mendenhall, M., and Peterson, G.L., “Abstracting GIS Layers from Hyperspectral Imagery,” First Workshop on Hyperspectral Image and Signal processing: Evolution in Remote Sensing (IEEE WHISPERS), 2009, pp. 1-4. draft DOI: 10.1109/WHISPERS.2009.5289023.
  12. Millar, J.R., Peterson, G.L., and Mendenhall, M.J., “Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps,” Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 69-74. open access
  13. Seymour, R.S., and Peterson, G.L., “Responding to Sneaky Agents in Multi-agent Domains,” Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 99-104. open access
  14. Hooper, D., and Peterson, G.L., “HAMR: A Hybrid Multi-Robot Control Architecture,” Proceedings of the 22nd International FLAIRS Conference, 2009, pp. 139-140. open access
  15. Holloway, E.M., Lamont, G.B., and Peterson, G.L., “Network Security Using Self Organized Multi-Agent Swarms,” IEEE Symposium on Computational Intelligence in Cyber Security, 2009, pp. 2559-2566. draft DOI: 10.1109/CICYBS.2009.4925102.
  16. Lacey, T., Peterson, G.L., and Mills, R.F., “The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge”, Hawaii International Conference on System Sciences (HICSS), 2009, pp. 1-9. draft DOI: 10.1109/HICSS.2009.433.
  17. Boxerbaum, A., Oro, J., Peterson, G.L., Quinn R.D., "The Latest Generation Whegs™ Robot Features a Passive-Compliant Body Joint", 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 1636-1641. DOI: 10.1109/IROS.2008.4650997.
  18. Oimoen, S.C., Peterson, G.L., and Hopkinson, K.M., “Network Formation using Ant Colony Optimization – A Comparative Analysis,” Sixth International Conference on Ant Colony Optimization and Swarm Intelligence, 2008, pp. 405-406. draft DOI: 10.1007/978-3-540-87527-7_47.
  19. Dries, E., and Peterson, G.L., “Scaling Ant Colony Optimization with Hierarchical Reinforcement Learning Partitioning,” GECCO 2008: Genetic and Evolutionary Computation Conference, 2008, pp. 25-32. draft press
  20. Duffy, J.P., and Peterson G.L., “An Abstract Behavior Representation for Robust, Dynamic Sequencing in a Hybrid Architecture,” AAAI Spring Symposium – Architectures for Intelligent Theory-Based Agents, 2008, pp. 19-24. open access
  21. Cousin, K., and Peterson, G.L., “Distributed Approach to Solving Constrained Multiagent Task Scheduling Problems,” AAAI Fall Symposium – Regarding the “Intelligence” in Distributed Intelligent Systems (RIDIS), 2007, pp. 42-48. open access
  22. Woolley, B. and Peterson, G.L., “Genetic Evolution of Hierarchical Behavior Structures,” Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, 2007, pp. 1731-1738. draft press
  23. Haag, C., Lamont, G.B., Williams, P., and Peterson, G.L., “An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions,” Workshop on Defense Application of Computation Intelligence at GECCO 2007, London, July 2007, pp. 2717-2724. draft press
  24. Haag, C., Lamont, G.B., Peterson, G.L., and Williams, P. “An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions,” Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS), 2007, pp. 420-436.
  25. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., “Multi-Class Classification Averaging Fusion for Detecting Steganography,” 2007 IEEE International Conference on System of Systems Engineering, 2007, pp 309-314. draft DOI: 10.1109/SYSOSE.2007.4304292.
  26. Peterson, G.L., Raines, R.A., and Baldwin, R.O., “Graduate Digital Forensics Education at the Air Force Institute of Technology,” Hawaii International Conference on System Sciences-HICSS-40, 2007, pp. 264-270. draft DOI: 10.1109/HICSS.2007.240.
  27. Rodriguez, B.M., Peterson, G.L., Bauer, K.B., and Agaian, S.S., “Steganalysis Embedding Percentage Determination with Learning Vector Quantization,” 2006 IEEE International Conference on Systems Man and Cybernetics, 2006, pp. 1956-1961. draft DOI: 10.1109/ICSMC.2006.385001.
  28. Wardell, D.C., and Peterson, G.L., “Fuzzy State Aggregation and Off-Policy Reinforcement Learning for Stochastic Environments,” The Eighth IASTED International Conference on Control and Applications (CA 2006), 2006, pp. 145-152. draft press
  29. Okolica, J.S., Peterson, G.L., and Mills, R.F., Using Author Topic to Detect Insider Threats from Email Traffic, IEEE International Conference on Intelligence and Security Informatics (ISI-2006), 2006, pp. 642-643. draft
  30. Cousin, K., and Peterson, G.L., “Cooperative Reinforcement Learning Using an Expert-Measuring Weighted Strategy with WoLF,” The 9th IASTED International Conference on Artificial Intelligence and Soft Computing, 2005, pp. 165-170. draft press
  31. Peterson, G.L., Mills, R.F., McBride, B.T., and Alred, W.C., 2005, “A Comparison of Generalizability for Anomaly Detection,” KDD-2005 Workshop on Data Mining Methods for Anomaly Detection, 2005, pp. 51-56. open access
  32. Yee, J., Mills, R.F., Peterson, G.L., and Bartczak, S., “Automatic Generation of Social Network Data from Electronic-Mail Communications,” Tenth International Command and Control Research and Technology Symposium, 2005. open access
  33. Shapiro, J.M., Lamont, G.B., and Peterson, G.L., “An Evolutionary Algorithm to Generate Hyper-Ellipsoid Detectors for Negative Selection,” GECCO 2005: Genetic and Evolutionary Computation Conference, 2005, pp. 337-344. draft press
  34. Laviers, K.R., and Peterson, G.L., “Cognitive Robot Mapping with Polylines and an Absolute Space Representation,” Proceedings of the IEEE 2004 International Conference on Robotics and Automation (ICRA), 2004, pp. 3771-3776. draft press
  35. McBride, B.T., and Peterson, G.L., “Blind Data Classification using Hyper-Dimensional Convex Polytopes,” Proceedings of the 17th International FLAIRS Conference, 2004, pp. 520-525. open access
  36. Peterson, G.L., and Cook, D. J., “Decision-Theoretic Planning in the Graphplan Framework,” AIPS 2000 Workshop on Decision Theoretic Planning, 2000. draft
  37. Peterson, G.L., and Cook, D. J., “Decision-Theoretic Layered Robotic Control Architecture,” Proceedings of the Sixteenth National Conference on Artificial Intelligence, 1999, pp. 976. open access
  38. Peterson, G.L., and Cook, D. J., “DFA Learning of Opponent Strategies,” Proceedings of the 12th International FLAIRS Conference, 1998, pp. 367-371. open access
  39. Peterson, G.L., and Cook, D. J., “Planning and Learning in an Advanced Robotic Game,” AAAI 1998 Fall Symposium on Integrated Planning for Autonomous Agent Architectures, 1998, pp. 55-61. draft

Conference Publications (Refereed Abstract)

  1. Rodriguez, B.M., and Peterson, G.L., “Multi-Class Classification Fusion Using Boosting for Identifying Steganography Methods,” Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2008 of the SPIE Symposium on Defense and Security, 2008, pp. 697407.01-697470.10. draft
  2. Rodriguez, B.M., and Peterson, G.L., “Classifier Dependent Feature Preprocessing Methods,” Mobile Multimedia/Image Processing, Security and Applications of the SPIE Symposium on Defense and Security, 2008, pp. 69820S.01–69820S.12.
  3. Karrels, D.R., and Peterson, G.L., “CyberCraft: Protecting Electronic Systems with Lightweight Agents,” Cyberspace Research Workshop, 2007, pp. 58-62. draft
  4. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., “Steganography Anomaly Detection Using Simple One Class Classification,” Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2007, pp. 6579015.1-6579015.6. draft
  5. Rodriguez, B.M., Peterson, G.L., and Agaian, S.S., “Steganalysis Feature Improvement Using Expectation Maximization,” Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2007, pp. 6575030.1-6575030.6. draft
  6. Agaian, S., Peterson, G.L., Bauer, K.W., and Rodriguez, B., “Multiple masks-based pixel comparison steganalysis method for mobile imaging,” Mobile Multimedia/Image Processing for Military and Security Applications of the SPIE Symposium on Defense and Security, 2006, pp. 6250005.1-6250005.6.  draft
  7. Agaian, S.S., Rodriguez, B.M., and Peterson, G.L., “New Steganalysis Technique for the Digital Media Forensics Examiner,” IEEE Region 5 Technical, Professional, and Student Conference, 2006.
  8. Butts, J.W., Mills, R.F., and Peterson, G.L., “A Multidiscipline Approach to Mitigating the Insider Threat,” International Conference on Information Warfare and Security (ICIW), 2006, pp. 29-36. draft

Book

  1. Shenoi, S., and Peterson, G.L., Advances in Digital Forensics V, New York, NY: Springer Science+Business Media, 2009. ISBN: 978-3-642-04154-9

Book Chapters

  1. Okolica, J., and Peterson, G.L., “ A Compiled Memory Analysis Tool,” Advances in Digital Forensics VI, S. Shenoi and K.P. Chow, Ed., New York, NY: Springer Science+Business Media, 2010, pp TBD.
  2. Schrader, K.F., Mullins, B.E., Peterson, G.L., and Mills, R.F., “Tracking Contraband Files Transmitted Using BitTorrent,” Advances in Digital Forensics V, S. Shenoi and G. Peterson, Eds., New York, NY: Springer Science+Business Media, 2009, pp. 159-174.
  3. Mills, R.F., Peterson, G.L., and Grimaila, M., “Insider Threat Prevention, Detection and Mitigation,” Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, Knapp, K.J., Ed., Hershey, NY: IGI Global, 2009, pp. 48-74.
  4. Fogg, P., Peterson, G.L., and Veth, M., “Digital Image Background Matching for Identifying Suspects,” Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 307-324.
  5. Molina, D., Zimmermann, M.A., Roberts, G.R., Eaddie, M.T., and Peterson, G.L., “Timely Rootkit Detection During Live Response,” Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 139-150. software
  6. Rodriguez, B.M., Peterson, G.L., and Bauer, K.W., “Fusion of Steganalysis Systems Using Bayesian Model Averaging,” Advances in Digital Forensics IV, S. Shenoi and I. Ray, Eds., New York, NY: Springer Science+Business Media, 2008, pp. 345-356.
  7. Todd, A.D., Benson, J. A., Peterson, G.L., Franz, T. P., Stevens, M. R., and Raines, R.A., "An Analysis of Forensic Tools in Detecting Rootkits and Hidden Processes," Advances in Digital Forensics III, S. Shenoi, and P. Craiger, Eds., New York, NY: Springer Science+Business Media, 2007, pp. 89-106.
  8. Rodriguez, B.M., and Peterson, G.L., “Steganography Detection Using Mutli-Class Classification,” Advances in Digital Forensics III, Eds. Craiger, P., and Shenoi, S. Eds., New York, NY: Springer Science+Business Media, 2007, pp. 193-204.
  9. Okolica, J.S., Peterson, G.L., and Mills, R.F., “Using PLSI-U to Detect Insider Threats from Email Traffic,” Advances in Digital Forensics II, Olivier, M.S., Shenoi, S., Eds., New York, NY: Springer Science+Business Media, 2006, pp 91-104.
  10. Peterson, G.L., 2006, “Forensic Analysis of Digital Image Tampering,” Advances in Digital Forensics, Polit, M., Shenoi, S., Eds., New York, NY: Springer Science+Business Media, 2006, pp. 259-270.

Other Publications

  1. McDonald, J.T, Peterson, G.L., Karrels, D.R., Andel, T.R., and Raines, R.A., “Guarding the CyberCastle in 2020,” IA Newsletter, Information Assurance Technical Analysis Center, Vol. 11, No. 3, Fall 2008, pp. 4-12. open access
  2. Peterson, G.L., Raines, R.A., and Baldwin, R.O., “Digital Forensics Education at the Air Force Institute of Technology,” IA Newsletter, Information Assurance Technical Analysis Center, Vol. 9, No. 3, Fall 2006, pp. 30-34. open access