2016

  • Caglayan, A., Cassani, L. Clark, T. Bharadwaj, V. (2016). Spatially Aware Semantic Approach to Civil Information Management. ONR Final Report. Contract No. N00014-13-C0083, Feb. 2016. 
  • Clark, T.. Medical Informatics Decision and Support (MIDAS). ONR Final Report. Contract No. N00014-15-P-1154, Jan. 2016. 

2015

  • Gioioso, M. Clark, T. Caglayan, A.  Toothaker, T. Decision-theoretic Route Planner (dPLAN), NAVAIR Final Report, Contract No. N68335-12-C-0223, Aug 2015. 
  • Gioioso, M. Clark, T. Caglayan, A.  Toothaker, T. Decision-theoretic Route Planner: Using a genetic algorithm specialized with non-uniform distributions and NIIRS values, 2015 IEEE Symposium on Technologies for Homeland Security (HST ’15), 14 - 16 April 2015, Boston, MA.

abstract

  • Clark, T., Kessler, C., & Purohit, H. (2015). Feasibility of Information Interoperability in the Humanitarian Domain. In AAAI 2015 Spring Symposium on Structured Data for Humanitarian Technologies (Technical Report SS-15-06). Palo Alto, CA: AAAI Press.

paper

2014

  • L. Cassani, A. Caglayan, J. Alavedra, V. Bharadwaj, N. Lee and J. Parkes, Semantic enrichment and reasoning for mobile data collection of socio-cultural data, in: Advances in Cross-Cultural Decision Making, Sae Schatz, Joseph Cohn, Denise Nicholson, AHFE Conference, Jul 19, 2014 - 273 pages

book

  • Caglayan, A., Gioioso, M., and Cassani, L. semSCI - Semantic Application to Detect and Resolve Suspicious and Conflicting Information, AFRL Final Report, Contract No. FA8750-13-C-0219, Apr. 2014.

abstract  

  • Clark, T., & Cassani, L. (2014). Semantic knowledge management and Linked Data for humanitarian assistance. Procedia Engineering, 78, 134–142. doi:10.1016/j.proeng.2014.07.049.

paper

2013

  • Sassaman, L., Patterson, M., Bratus, S., Locasto, M., Shubina, A. Security Applications of Formal Language Theory, IEEE Systems Journal, Volume 7, Issue 3, Sept. 2013.

paper

  • Caglayan, A. Mobile Enabled Spatially Aware Semantic Wiki for Information Management using Open-Source Software Platforms. Semantic Technology & Business Conference. San Francisco, CA, June 2-5, 2013. 

 abstract 

Bell, S., Cingranelli, D. R., Murdie, A. and Caglayan, A. Coercion, Capacity, and Coordination: Predictors of Political Violence. Conflict Management and Peace Science, Volume 30 Issue 3 (July 2013): pp. 244 - 266.

 paper | blog 

  • Caglayan, A., Cassani, L., Morgan, W., Mooney, L., Alavedra, J., Boyles, A. (2013) Hybrid Knowledge Management for Complex Operations, ONR Final Report, February 2013.

 

2012

  • Caglayan, A., Toothaker, M., Drapeau, D., Burke, D. and Eaton, G. (2011) Behavioral Analysis of Botnets for Threat Intelligence, Information Systems and e-Business Management: Volume 10, Issue 4 (2012): pp. 491-519. DOI: 10.1007/s10257-011-0171-7.

 paper | blog 

  • Caglayan, A., Cassani, L., Mooney, L., Morgan, W., Boyles, A. Semantic Technologies for Civil Information Management during Complex Emergencies. IEEE Technologies for Homeland Defense, Boston, MA, November 13-15, 2012.

 blog 

  • Caglayan, A., Alavedra, J., Toothaker, M., Cassani, L. A Social Agent Dynamic Honeynet for Attack Modeling, IEEE Technologies for Homeland Defense, Boston, MA, November 13-15, 2012.

paper

  • Cassani, L., Caglayan, A., Mooney, L., Morgan, W., Boyles, A., Weiss, B. Marine Corps Civil Information Management (MARCIM) Semantic Wiki, WikiMania 2012 International Wikimedia Conference, Washington, DC, July 12-15, 2012.

 abstract | blog 

  • Cassani, L., Caglayan, A., Amanda, M., and Bell, S. Predictive Societal Indicators of Radicalism - Forecasting Political Violence, 2nd International Conference on Cross-Cultural Decision Making in 4th International Conference on Applied Human Factors and Ergonomics 2012 (AHFE 2012), San Francisco, CA, July 21-25, 2012.

 blog | book

  • Cassani, L., Caglayan, A., Das, S., Alavedra, J., Morgan, W., and Mooney, L. Population Sentiment Modeling in support of ISAF Joint Command, 2nd International Conference on Cross-Cultural Decision Making in 4th International Conference on Applied Human Factors and Ergonomics 2012 (AHFE 2012), San Francisco, CA, July 21-25, 2012.

 blog | book

  • Cassani, L., Caglayan, A., Alavedra, J., Morgan, W., and Mooney, L. Semantic Integration of Socio-Cultural Knowledge for Complex Operations, 2nd International Conference on Cross-Cultural Decision Making in 4th International Conference on Applied Human Factors and Ergonomics 2012 (AHFE 2012), San Francisco, CA, July 21-25, 2012.

 blog | book

  • Arackaparambil, C., Yan, G., Bratus, S. and Caglayan, A. (2012) On Tuning the Knobs of Distribution-based Methods for Detecting VoIP Covert Channels, Hawaii International Conference on System Sciences (HICSS-45) Insider Threat Modeling, Detection, and Mitigation Minitrack, Grand Wailea, Maui, Hawaii, January 4-7, 2012.

 paper 

 


2011

  • Bratus, S., Locasto, M., Patterson, M., Sassaman, L. and Shubina, A. Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation, THE USENIX MAGAZINEDecember 2011, Volume 36, Number 6.

paper

  • Coercion, Capacity, and Coordination: A Risk Assessment Model of the Determinants of Political Violence, Montesquieu Institute in the Hague, November 2011.

 presentation | blog  

  • Cassani, L., Caglayan, A., Das, S., Alavedra, J., Morgan, W., Murdie, A., Bell, S., and Cingranelli, D. (2011) Predictive Societal Indicators of Radicalism, AFRL Phase II Final Report, October 2011.

 blog 

  • Caglayan, A. and Toothaker, M. (2011) Fusion of Information Security Event Community Reporting with Botnet Threat Intelligence, 2011 Malware Technical Exchange Meeting (MTEM2011), McLean, VA, August 29-31.

 blog  

  • Alavedra, J., Stroh, L., Caglayan, A., and Das, S. (2011) Bayesian Analysis of Sentiment Surveys, Fusion 2011, 14th International Conference on Information Fusion, Chicago, IL, July 5-8, 2011.

 abstract | blog | paper

  • Caglayan, A.,Burke, D., Stroh, L. and Das, S. (2011) Activity Sequence Learning in Mission Critical Tasks, Fusion 2011, 14th International Conference on Information Fusion, Chicago, IL, July 5-8, 2011.

 abstract | blog  | paper

  • Murdie, A. (2011) Coercion, Capacity, and Coordination: A Risk Assessment Model of the Determinants of Political Violence, Forecasting Political Instability Workshop, Council on Foreign Relations, Washington, DC, March 31, 2011.

 blog 

  • Stroh, L., Caglayan, A., Alavedra, J. , and Burke, D. (2011) Population Sentiment Analysis in Support of ISAF Joint CommandHSCB Focus 2011 Conference, Chantilly, VA, February 8-10, 2011.

 blog

  • Cingranelli, D., Bell, S., Murdie, A. , Caglayan, A., Stroh, L. and Burke, D. (2011) Predictive Societal Indicators of Radicalism - Forecasting Political ViolenceHSCB Focus 2011 Conference, Chantilly, VA, February 8-10, 2011.

 abstract | blog 

  • Caglayan, A., Stroh, L., Burke, D., Boswell, J., McGuire, P. (2011) Semantic Technology for Knowledge ManagementHSCB Focus 2011 Conference, Chantilly, VA, February 8-10, 2011.

 blog 

  • Caglayan, A., Stroh, L. Burke, D. and Morgan, W. (2011) Decision Modeling for Sociocultural DataHSCB Focus 2011 Conference, Chantilly, VA, February 8-10, 2011.

 blog 

 


2010

  • Burke, D. and Caglayan, A. (2010) Cyber Incident Mission Impact Assessment (CIMIA), Technical Report, AFRL Information Directorate, Rome, NY, November 15, 2010.
 blog 
  • Caglayan, A. and Toothaker, M. FastFluxMonitor vs. Darknet trafficSIE Workshop, Atlanta, GA, October 3, 2010.
  • Massey, D. and Caglayan, A. Event Detection via DNS and Route Monitoring6th Annual GFIRST National Conference, GFIRST6: Building Today, Shaping Tomorrow – Ensuring an Effective Response Capability to Manage Risks in Cyberspace, San Antonio, TX, August 15-20, 2010
  • Stroh, L., Caglayan, A., Rashed, T., Burke, D., and Eaton, G. (2010) Geospatial Campaign Management for Complex Operations, In D. Schmorrow & D. Nicholson (Eds.), Advances in Cross-Cultural Decision Making (pp. 460-469). Boca Raton, FL: CRC Press.
blog |  book 
  • Caglayan, A., Toothaker, M., Drapeau, D., Burke, D. and Eaton, G. (2010) Guilt by Association based Discovery of Botnet Footprints, NATO Research and Technology Organization Workshop on Information Security and Defense, Antalya, Turkey, April 26-30, 2010.
          blog |  paper 
  • Arackaparambil, C., Bratus, S., Brody, J. and Shubina, A. (2010) Distributed Monitoring of Conditional Entropy for Anomaly Detection in Streams, IEEE Workshop on Scalable Stream Processing Systems (SSPS), Atlanta, GA, April 19, 2010.
blog |  paper 
  • Rashed, T. (2010) Geospatial Campaign Design for COIN Civil AffairsFirst GeoDesign Summit, ESRI, Redlands, CA, January 6-8, 2010.
 abstract | blog
  • Caglayan, A., Toothaker, M., Drapeau, D., Burke, D. and Eaton, G. (2010) Behavioral Patterns of Fast Flux Service Networks, Hawaii International Conference on System Sciences (HICSS-43) Cyber Security and Information Intelligence Research Minitrack. Koloa, Kauai, Hawaii, January 5-8, 2010.
 abstract | paper | press

 


2009

  • Stroh, L. M., Burke, D., Zhao, Y. T., Caglayan, A. (2009) A System Dynamics Model of Counterinsurgency in Southern Afghanistan, 2009 NAACSOS (North American Association for Computational Social and Organizational Sciences) Annual Conference, Arizona State University, Tempe, AZ, October 23-24, 2009.
 blog 
  • Caglayan, A., Toothaker, M., Drapeau, D., Burke, D., Eaton, G., Van Randwyk, J., Lloyd, L., Proebstel, E., Burnett, D., Bayer, G., and Sanders, B. (2009) Botnet Analytics Appliance, Final Report, Department of Homeland Security Cyber Security R&D Center Contract No. NBCHC070126, October, 2009.
  • Guttieri, K., Caglayan, A. (2009) Rumour and Perception amidst Social Conflict, European Consortium for Political Research, 5th General Conference, Potsdam, Germany, September 10-12, 2009.
 abstract | blog
  • Fekpe, E. S., Windholz, T., Beard, K. Probabilistic Approach for Modeling and Presenting Error in Spatial Data, Journal of Surveying Engineering, Vol. 135, No. 3, August 2009: pp. 101-112.
 abstract 
  • Burke, D., Caglayan, A., Stroh, L. M., Zhao, Y. T. and Eaton, G. (2009) An Open Source Social Science Data Repository for HSCB Research, OSD FOCUS 2010 Human Social Culture Behavior Conference, Chantilly, VA, August 5-7, 2009.
  • Stroh, L. M. Caglayan, A., Guttieri, K., Burke, D. and Eaton, G. (2009) Knowledge Management Needs of the Complex Operations Community, OSD FOCUS 2010 Human Social Culture Behavior Conference, Chantilly, VA, August 5-7, 2009.
  • Caglayan, A., Stroh, L. M., Burke, D. and Eaton, G. (2009) Hybrid Knowledge Framework for Complex Operations, OSD FOCUS 2010 Human Social Culture Behavior Conference, Chantilly, VA, August 5-7, 2009.
  • Caglayan, A. Risk-Based Route Planning for Sense and Respond LogisticsMilitary Logistics Summit 2009, Sheraton Premiere at Tysons Corner, Vienna, VA, June 8-11, 2009.
 blog
  • Burke, D., Bhadra, S., Caglayan, A. and Eaton, G. (2009) A Personalized Web 2.0 Service for Authoritative Content, US DoE Report No. DOE/ER/85228-1, US DoE, Scientific and Technical Information (STI), Chicago, IL.
  • Bhadra, S., Conrad, A., Hurkes, C., Kirklin, B.,Kapfhammer, G. M. An Experimental Study of Methods for Executing Test Suites in Memory Constrained Environments, 4th Workshop on the Automation of Software Test (AST 2009), May 18-19, 2009.
 presentation
  • Caglayan, A., Toothaker, M., Drapeau, D., Burke, D. and Eaton, G. (2009) Behavioral Analysis of Fast Flux Service Networks, Fifth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW 09), Oak Ridge, TN, April 13-15, 2009.
 abstract | paper | presentation | blog | press 
  • Toothaker, M., Drapeau, D., Caglayan, A, Bratus, S. and Arackaparambil , C. (2009) Hybrid Malicious Outbound Network Traffic flow detection (HYMONT), Final Report, DTIC AD Number: ADB350308, Milcord, Waltham, MA, March 2009.
 report | blog
  • Caglayan, A., Toothaker, M., Drapeau, D., Burke, D. and Eaton, G. (2009) Real Time Detection of Fast Flux Service Networks, Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.
 abstract | presentation | blog | press 
  • Caglayan, A., Burke, D., Eaton, G., Qamar, S., Caglayan, J., and Cingranelli, D., Regan, P., Bell, S., Frank, R. (2009) Predictive Societal Indicators of Radicalism (PSIR), DTIC AD No. ADB347278, Milcord, Waltham, MA.
 report 

 


2008

  • Caglayan, A., Burke, D., Eaton, G. and Meessen, Y. (2008) Course of Action Forecasting, Technical Report, DTIC AD Number: ADB338206, US Army TEC, Alexandria, VA.
 report 
  • Caglayan, A., Burke, D. and Eaton, G. (2008) Commander's Learning Agent, Technical Report. DTIC AD No. AD Number: ADB346317, Milcord, Waltham, MA.
 report 
  • Burke, D., Caglayan, A. and Zhao, Y. T. (2008) Adaptive Risk-based Convoy Route Planning, Technical Report. DTIC AD No. ADB3451502, ONR, Arlington, VA.
 report 
  • Guttieri, K.,Kelley, S. and Caglayan, A. (2008) Quantitative Modeling of Rumor, Intellectual Capacity for STRATEGIC COLLABORATION in Stability, Security, Transition and Reconstruction (SSTR) Humanitarian Assistance and Disaster Relief (HA/DR), Naval Postgraduate School, Cebrowski Institute for Innovation, Monterey, CA.
 paper
  • Agouris, P., Gunopulos, D., Kalogeraki, V. & Stefanidis, A. (2008) Knowledge Acquisition and Data Storage in Mobile Geosensor Networks, in GeoSensor Networks 2008, (S. Nittel, A. Labrinidis, & A. Stefanidis, eds.), Lecture Notes in Computer Science, Vol. 4540, Springer Verlag, pp. 86-108.
 abstract | book 

 


2007

  • Windholz, T., Caglayan, A., Guler, S., and Doucette, P. (2007) Automated Image Understanding, Technical Report, DTIC AD No. ADB334596, Milcord, Waltham, MA, December 2007.
 report 
  • Caglayan, A., Burke, D., Windholz, T., Smith, B., and Paxton, R. (2007) Building Intent, Technical Report, DTIC AD No. ADB333832, Milcord, Waltham, MA, November 2007.
 report 
  • Caglayan, A., Toothaker, M. and Windholz, T. (2007) A Bayesian Activity Monitor for Botnet Defense, 2007 Monterey Homeland Security Conference, Monterey, CA, August 2007.
  • Windholz, T., Caglayan, A. and Brigantic, R. T. (2007) LERIX: Language Enabled Raster Imagery Exploitation, Technical Report, DTIC AD Number. ADB331211, Milcord, Waltham, MA, July 2007.
 report 
  • Windholz, T., Toothaker, M., Stefanidis, A. and Caglayan, A. (2007) Geospatial Exploitation of Motion Imagery, Technical Report, DTIC AD Number ADB329555, Milcord, Waltham, MA, May 2007.
 report
  • Caglayan, A., Toothaker, M. and Windholz, T. (2007) A Bayesian Activity Monitor for Botnet Defense, Final Report, Department of Homeland Security Cyber Security R&D Center Contract No. NBCHC060135, March 2007.

 


2006

  • Agouris, P., Gunopulos, D., Kalogeraki, V., and Stefanidis, A. (2006) Knowledge Acquisition and Data Storage in Mobile GeoSensor Networks, in Geosensor Networks: Second International Conference, GSN 2006, Boston, MA, USA, October 1-3, 2006.
 abstract | book 
  • Windholz, T., Nittel, S., Thomas, A. C. and Hoffman, R. A. (2006) A Stream Processing Engine Approach to Earth Science Data Processing, Technical Report, Contract No. NNC06CB50C, NASA Stennis Space Research Center, Stennis, MS, July 2006.
 press 
  • Stefanidis, A. The Emergence of GeoSensor Networks, Directions Magazine, February 2006.
 paper 
  • Serr, K., Windholz, T. and Weber, K. Comparing GPS Receivers: A Field Study, The Urban and Regional Information Systems Association (URISA), February 2006.
 paper 
  • Caglayan, A., Hewlett, R., Taylor, H. and Lyle, M. (2006) A Real Context Simulation Approach to Cyber Defense Training, Technical Report, DTIC AD Number ADB324372, Milcord, Waltham, MA, January 2006.
 report  
  • Caglayan, A., Gioioso, M., Minieri, J., and Frank, B. (2006) Incident Response Decision Aid – irDA, Technical Report, DTIC AD Number ADB318493, Open Service Inc., Westborough, MA, January 2006.
 report 

 


2005

  • Caglayan, A., Gioioso, M., Stefanidis, A. and Agouris, P. (2005) Course of Action Forecasting Technical Report, DTIC AD Number: ADB309537, Milcord, Waltham, MA, June 2005.
 report 
  • Stefanidis, A., Agouris, P, and Caglayan, A. (2005) An Object Configuration Similarity Approach to Georegistration, Technical Report, Contract No. NNS05AA29C, NASA Stennis Space Research Center, Stennis, MS, July 2005.

 


2004

  • Agouris, P., Stefanidis, A., and Caglayan, A. (2004) Geospatial Exploitation of Motion Imagery, 24th Army Science Conference, Orlando, FL, December 2004.
 paper 
  • Agouris, P., Stefanidis, A., and Caglayan, A. (2004) A Spatiotemporal Helix Approach to Geospatial Exploitation of Motion Imagery, Technical Report, DTIC AD Number: ADA432580, Milcord, Waltham, MA, December 2004.
report
  • Caglayan, A., Thompson, P., and Bratus, S. (2004) A Graph Attack Simulation Approach to Vulnerability Management IATAC IAnewsletter, Volume 6, Issue 4 (Spring 2004).
 paper 
  • Agouris, P., Stefanidis, A., Beard, K., Gahegan, M., Tsotras, V. J., Gunopulos, D. (2004) Knowledge Management Over Time-Varying Geospatial Datasets The National Conference on Digital Government Research dg.o 2004, Seattle, WA, May 2004.
 abstract