Gilbert L. Peterson

Orcid: 0000-0002-6241-3084

Affiliations:
  • Air Force Institute of Technology, Wright-Patterson Air Force Base, OH, USA


According to our database1, Gilbert L. Peterson authored at least 120 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A hybrid cognitive model for machine agents.
Cogn. Syst. Res., September, 2023

Imitating human responses via a Dual-Process Model.
Cogn. Syst. Res., September, 2023

Kingmaking in Press Diplomacy.
Proceedings of the IEEE International Conference on Agents, 2023

2022
Intent integration for human-agent teaming.
Syst. Eng., 2022

Evolution of Combined Arms Tactics in Heterogeneous Multi-Agent Teams.
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022

Automated Computer Network Exploitation with Bayesian Decision Networks.
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022

Factored Beliefs for Machine Agents in Decentralized Partially Observable Markov Decision Processes.
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022

Incentivizing Information Gain in Hidden Information Multi-Action Games.
Proceedings of the Computers and Games - International Conference, 2022

2021
Optimizing update scheduling parameters for distributed virtual environments supporting operational test.
Concurr. Comput. Pract. Exp., 2021

2020
Sequence Pattern Mining with Variables.
IEEE Trans. Knowl. Data Eng., 2020

Battlespace Next(TM).
Int. J. Serious Games, 2020

A development platform for behavioral flexibility in autonomous unmanned aerial systems.
Int. J. Intell. Robotics Appl., 2020

Creating Effective Automation to Maintain Explicit User Engagement.
Int. J. Hum. Comput. Interact., 2020

SensorRE: Provenance support for software reverse engineers.
Comput. Secur., 2020

Exploring Provenance Needs in Software Reverse Engineering.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

Gaming DevSecOps - A Serious Game Pilot Study.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020

Interactive Temporal Digital Forensic Event Analysis.
Proceedings of the Advances in Digital Forensics XVI, 2020

Middleware Unifying Framework for Independent Nodes System (MUFFINS).
Proceedings of the Thirty-Third International Florida Artificial Intelligence Research Society Conference, 2020

2019
Decentralized Control Strategies for Unmanned Aircraft System Pursuit and Evasion.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

The Emergence of Division of Labor in Multi-Agent Systems.
Proceedings of the 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2019

Entropy-Based Team Self-Organization with Signal Suppression.
Proceedings of the 2019 Conference on Artificial Life, 2019

Natural Evolution Speciation for NEAT.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Narrowing the scope of failure prediction using targeted fault load injection.
Enterp. Inf. Syst., 2018

A Macro-Level Order Metric for Self-Organizing Adaptive Systems.
Proceedings of the 12th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2018

Digital Forensics Event Graph Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

Predicting Trouble Ticket Resolution.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

Informal Team Assignment in a Pursuit-Evasion Game.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

On-Line Agent Detection of Goal Changes.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

2017
Consistency and fairness in real-time distributed virtual environments: Paradigms and relationships.
J. Simulation, 2017

Whitelisting system state in windows forensic memory visualizations.
Digit. Investig., 2017

The role of simulation frameworks in relation to experiments.
Proceedings of the 2017 Winter Simulation Conference, 2017

Automated Collection and Correlation of File Provenance Information.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Enhancing Multi-Objective Reinforcement Learning with Concept Drift.
Proceedings of the Thirtieth International Florida Artificial Intelligence Research Society Conference, 2017


2016
Data Quality Challenges in Distributed Live-Virtual-Constructive Test Environments.
ACM J. Data Inf. Qual., 2016

Feature detection and matching on atmospheric nuclear detonation video.
IET Comput. Vis., 2016

Activity Pattern Discovery from Network Captures.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Distributed PowerShell Load Generator (D-PLG): A Tool for Generating Dynamic Network Traffic.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Distributed PowerShell Load Generator (D-PLG): A New Tool for Dynamically Generating Network Traffic.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

Clustering-Based Online Player Modeling.
Proceedings of the Computer Games - 5th Workshop on Computer Games, 2016

2015
Trajectory Generation with Player Modeling.
Proceedings of the Advances in Artificial Intelligence, 2015

2014
A function-to-task process model for adaptive automation system design.
Int. J. Hum. Comput. Stud., 2014

Epaminondas: Exploring Combat Tactics.
J. Int. Comput. Games Assoc., 2014

Applicability of Latent Dirichlet Allocation to multi-disk search.
Digit. Investig., 2014

User identification and authentication using multi-modal behavioral biometrics.
Comput. Secur., 2014

REDIR: Automated static detection of obfuscated anti-debugging techniques.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Multi-objective optimization of dead-reckoning error thresholds for virtual environments.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Narratives as a Fundamental Component of Consciousness.
Proceedings of the 2014 Workshop on Computational Models of Narrative, 2014

Machine learning nuclear detonation features.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

Timing mark detection on nuclear detonation video.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

2013
Large-scale cooperative task distribution on peer-to-peer networks.
Web Intell. Agent Syst., 2013

Estimation and Validation of the 3D Smooth-Turn Mobility Model for Airborne Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Creating Super Timelines in Windows Investigations.
Proceedings of the Advances in Digital Forensics IX, 2013

Insider Threat Detection Using Virtual Machine Introspection.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Context-Driven Image Annotation Using ImageNet.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013

2012
Malware target recognition via static heuristics.
Comput. Secur., 2012

Removing parallax-induced changes in Hyperspectral Change Detection.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Eliciting a Sensemaking Process from Verbal Protocols of Reverse Engineers.
Proceedings of the 34th Annual Meeting of the Cognitive Science Society, 2012

2011
Dynamic Behavior Sequencing for Hybrid Robot Architectures.
J. Intell. Robotic Syst., 2011

Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies.
Int. J. Comput. Games Technol., 2011

Extracting the windows clipboard from physical memory.
Digit. Investig., 2011

Windows driver memory analysis: A reverse engineering methodology.
Comput. Secur., 2011

Real-time behavior-based robot control.
Auton. Robots, 2011

Improving occupancy grid FastSLAM by integrating navigation sensors.
Proceedings of the 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2011

An FPGA System for Detecting Malicious DNS Network Traffic.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Evaluating Digital Forensic Options for the Apple iPad.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

WoLF Ant.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

2010
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols.
Int. J. Secur. Networks, 2010

Windows operating systems agnostic memory analysis.
Digit. Investig., 2010

Stochastic feature selection with distributed feature spacing for hyperspectral data.
Proceedings of the 2nd Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2010

Malware Type Recognition and Cyber Situational Awareness.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Simulating windows-based cyber attacks using live virtual machine introspection.
Proceedings of the SummerSim '10, 2010

Electronic image stabilization using optical flow with inertial fusion.
Proceedings of the 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2010

A Compiled Memory Analysis Tool.
Proceedings of the Advances in Digital Forensics VI, 2010

An Effective and Efficient Real Time Strategy Agent.
Proceedings of the Twenty-Third International Florida Artificial Intelligence Research Society Conference, 2010

Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Structured P2P technologies for distributed command and control.
Peer-to-Peer Netw. Appl., 2009

Unified Behavior Framework for Reactive Robot Control.
J. Intell. Robotic Syst., 2009

Abstracting GIS layers from hyperspectral imagery.
Proceedings of the First Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2009

Dynamic coalition formation under uncertainty.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

Tracking Contraband Files Transmitted Using Bittorrent.
Proceedings of the Advances in Digital Forensics V, 2009

The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Responding to Sneaky Agents in Multi-agent Domains.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

HAMR: A Hybrid Multi-Robot Control Architecture.
Proceedings of the Twenty-Second International Florida Artificial Intelligence Research Society Conference, 2009

A Trust-Based Multiagent System.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Network security using self organized multi agent swarms.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Ant clustering with locally weighted ant perception and diversified memory.
Swarm Intell., 2008

The importance of generalizability for anomaly detection.
Knowl. Inf. Syst., 2008

Using PLSI-U to detect insider threats by datamining e-mail.
Int. J. Secur. Networks, 2008

Integrating trust into the CyberCraft Initiative via the Trust Vectors model [Application Notes].
IEEE Comput. Intell. Mag., 2008

The latest generation Whegs<sup>TM</sup> robot features a passive-compliant body joint.
Proceedings of the 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2008

Fusion of Steganalysis Systems Using Bayesian Model Averaging.
Proceedings of the Advances in Digital Forensics IV, 2008

Timely Rootkit Detection During Live Response.
Proceedings of the Advances in Digital Forensics IV, 2008

Image Background Matching for Identifying Suspects.
Proceedings of the Advances in Digital Forensics IV, 2008

Emergent architecture in self organized swarm systems for military applications.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Scaling ant colony optimization with hierarchical reinforcement learning partitioning.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Network Formation Using Ant Colony Optimization.
Proceedings of the Ant Colony Optimization and Swarm Intelligence, 2008

An Abstract Behavior Representation for Robust, Dynamic Sequencing in a Hybrid Architecture.
Proceedings of the Architectures for Intelligent Theory-Based Agents, 2008

2007
Using Author Topic to detect insider threats from email traffic.
Digit. Investig., 2007

Multi-Class Classification Averaging Fusion for Detecting Steganography.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

Steganalysis feature improvement using expectation maximization.
Proceedings of the Visual Information Processing XVI, 2007

Analysis of Tools for Detecting Rootkits and Hidden Processes.
Proceedings of the Advances in Digital Forensics III, 2007

Detecting Steganography Using Multi-Class Classification.
Proceedings of the Advances in Digital Forensics III, 2007

Graduate Digital Forensics Education at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Genetic evolution of hierarchical behavior structures.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

A Distributed Approach to Solving Constrained Multiagent Task Scheduling Problems.
Proceedings of the Regarding the Intelligence in Distributed Intelligent Systems, 2007

2006
Fuzzy State Aggregation and Policy Hill Climbing for Stochastic Environments.
Int. J. Comput. Intell. Appl., 2006

Steganalysis Embedding Percentage Determination with Learning Vector Quantization.
Proceedings of the IEEE International Conference on Systems, 2006

Using PLSI-U to Detect Insider Threats from Email Traffic.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
A new blind method for detecting novel steganography.
Digit. Investig., 2005

Forensic Analysis of Digital Image Tampering.
Proceedings of the Advances in Digital Forensics, 2005

An evolutionary algorithm to generate ellipsoid network intrusion detectors.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

An evolutionary algorithm to generate hyper-ellipsoid detectors for negative selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2004
Cognitive Robot Mapping with Polylines and an Absolute Space Representation.
Proceedings of the 2004 IEEE International Conference on Robotics and Automation, 2004

Blind Data Classification Using Hyper-Dimensional Convex Polytopes.
Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference, 2004

2003
Incorporating decision-theoretic planning in a robot architecture.
Robotics Auton. Syst., 2003

1999
Decision-Theoretic Layered Robotic Control Architecture.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
DFA Learning of Opponent Strategies.
Proceedings of the Eleventh International Florida Artificial Intelligence Research Society Conference, 1998


  Loading...