Gilbert L. Peterson

According to our database1, Gilbert L. Peterson authored at least 92 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Sequence Pattern Mining with Variables.
IEEE Trans. Knowl. Data Eng., 2020

2019
Decentralized Control Strategies for Unmanned Aircraft System Pursuit and Evasion.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Natural Evolution Speciation for NEAT.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Narrowing the scope of failure prediction using targeted fault load injection.
Enterprise IS, 2018

Predicting Trouble Ticket Resolution.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

Informal Team Assignment in a Pursuit-Evasion Game.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

On-Line Agent Detection of Goal Changes.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

2017
Consistency and fairness in real-time distributed virtual environments: Paradigms and relationships.
J. Simulation, 2017

Whitelisting system state in windows forensic memory visualizations.
Digital Investigation, 2017

The role of simulation frameworks in relation to experiments.
Proceedings of the 2017 Winter Simulation Conference, 2017

Model AI Assignments 2017.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Data Quality Challenges in Distributed Live-Virtual-Constructive Test Environments.
J. Data and Information Quality, 2016

Feature detection and matching on atmospheric nuclear detonation video.
IET Computer Vision, 2016

Activity Pattern Discovery from Network Captures.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Distributed PowerShell Load Generator (D-PLG): A Tool for Generating Dynamic Network Traffic.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Distributed PowerShell Load Generator (D-PLG): A New Tool for Dynamically Generating Network Traffic.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

Clustering-Based Online Player Modeling.
Proceedings of the Computer Games - 5th Workshop on Computer Games, 2016

2015
Trajectory Generation with Player Modeling.
Proceedings of the Advances in Artificial Intelligence, 2015

2014
A function-to-task process model for adaptive automation system design.
Int. J. Hum. Comput. Stud., 2014

Epaminondas: Exploring Combat Tactics.
ICGA Journal, 2014

Applicability of Latent Dirichlet Allocation to multi-disk search.
Digital Investigation, 2014

User identification and authentication using multi-modal behavioral biometrics.
Comput. Secur., 2014

REDIR: Automated static detection of obfuscated anti-debugging techniques.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Multi-objective optimization of dead-reckoning error thresholds for virtual environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Narratives as a Fundamental Component of Consciousness.
Proceedings of the 2014 Workshop on Computational Models of Narrative, 2014

Machine learning nuclear detonation features.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

Timing mark detection on nuclear detonation video.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

2013
Large-scale cooperative task distribution on peer-to-peer networks.
Web Intelligence and Agent Systems, 2013

Estimation and Validation of the 3D Smooth-Turn Mobility Model for Airborne Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Creating Super Timelines in Windows Investigations.
Proceedings of the Advances in Digital Forensics IX, 2013

Context-Driven Image Annotation Using ImageNet.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013

2012
Malware target recognition via static heuristics.
Comput. Secur., 2012

Removing parallax-induced changes in Hyperspectral Change Detection.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Eliciting a Sensemaking Process from Verbal Protocols of Reverse Engineers.
Proceedings of the 34th Annual Meeting of the Cognitive Science Society, 2012

2011
Dynamic Behavior Sequencing for Hybrid Robot Architectures.
Journal of Intelligent and Robotic Systems, 2011

Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies.
Int. J. Computer Games Technology, 2011

Windows driver memory analysis: A reverse engineering methodology.
Comput. Secur., 2011

Real-time behavior-based robot control.
Auton. Robots, 2011

An FPGA System for Detecting Malicious DNS Network Traffic.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Evaluating Digital Forensic Options for the Apple iPad.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

WoLF Ant.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

2010
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols.
IJSN, 2010

Stochastic feature selection with distributed feature spacing for hyperspectral data.
Proceedings of the 2nd Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2010

Malware Type Recognition and Cyber Situational Awareness.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Simulating windows-based cyber attacks using live virtual machine introspection.
Proceedings of the SummerSim '10, 2010

Electronic image stabilization using optical flow with inertial fusion.
Proceedings of the 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2010

A Compiled Memory Analysis Tool.
Proceedings of the Advances in Digital Forensics VI, 2010

An Effective and Efficient Real Time Strategy Agent.
Proceedings of the Twenty-Third International Florida Artificial Intelligence Research Society Conference, 2010

Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Structured P2P technologies for distributed command and control.
Peer-to-Peer Networking and Applications, 2009

Unified Behavior Framework for Reactive Robot Control.
Journal of Intelligent and Robotic Systems, 2009

Abstracting GIS layers from hyperspectral imagery.
Proceedings of the First Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2009

Dynamic coalition formation under uncertainty.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

Tracking Contraband Files Transmitted Using Bittorrent.
Proceedings of the Advances in Digital Forensics V, 2009

The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Responding to Sneaky Agents in Multi-agent Domains.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

HAMR: A Hybrid Multi-Robot Control Architecture.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

A Trust-Based Multiagent System.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Network security using self organized multi agent swarms.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Ant clustering with locally weighted ant perception and diversified memory.
Swarm Intelligence, 2008

The importance of generalizability for anomaly detection.
Knowl. Inf. Syst., 2008

Using PLSI-U to detect insider threats by datamining e-mail.
IJSN, 2008

The latest generation WhegsTM robot features a passive-compliant body joint.
Proceedings of the 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2008

Fusion of Steganalysis Systems Using Bayesian Model Averaging.
Proceedings of the Advances in Digital Forensics IV, 2008

Timely Rootkit Detection During Live Response.
Proceedings of the Advances in Digital Forensics IV, 2008

Image Background Matching for Identifying Suspects.
Proceedings of the Advances in Digital Forensics IV, 2008

Emergent architecture in self organized swarm systems for military applications.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Scaling ant colony optimization with hierarchical reinforcement learning partitioning.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Network Formation Using Ant Colony Optimization.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008

An Abstract Behavior Representation for Robust, Dynamic Sequencing in a Hybrid Architecture.
Proceedings of the Architectures for Intelligent Theory-Based Agents, 2008

2007
Using Author Topic to detect insider threats from email traffic.
Digital Investigation, 2007

Multi-Class Classification Averaging Fusion for Detecting Steganography.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

Steganalysis feature improvement using expectation maximization.
Proceedings of the Visual Information Processing XVI, 2007

Analysis of Tools for Detecting Rootkits and Hidden Processes.
Proceedings of the Advances in Digital Forensics III, 2007

Detecting Steganography Using Multi-Class Classification.
Proceedings of the Advances in Digital Forensics III, 2007

An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Computer Network Intrusions.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

Graduate Digital Forensics Education at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Genetic evolution of hierarchical behavior structures.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

A Distributed Approach to Solving Constrained Multiagent Task Scheduling Problems.
Proceedings of the Regarding the Intelligence in Distributed Intelligent Systems, 2007

2006
Fuzzy State Aggregation and Policy Hill Climbing for Stochastic Environments.
International Journal of Computational Intelligence and Applications, 2006

Steganalysis Embedding Percentage Determination with Learning Vector Quantization.
Proceedings of the IEEE International Conference on Systems, 2006

Using PLSI-U to Detect Insider Threats from Email Traffic.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
A new blind method for detecting novel steganography.
Digital Investigation, 2005

Forensic Analysis of Digital Image Tampering.
Proceedings of the Advances in Digital Forensics, 2005

An evolutionary algorithm to generate ellipsoid network intrusion detectors.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2004
Cognitive Robot Mapping with Polylines and an Absolute Space Representation.
Proceedings of the 2004 IEEE International Conference on Robotics and Automation, 2004

Blind Data Classification Using Hyper-Dimensional Convex Polytopes.
Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference, 2004

2003
Incorporating decision-theoretic planning in a robot architecture.
Robotics Auton. Syst., 2003

1999
Decision-Theoretic Layered Robotic Control Architecture.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
DFA Learning of Opponent Strategies.
Proceedings of the Eleventh International Florida Artificial Intelligence Research Society Conference, 1998


  Loading...