<?xml version="1.0"?>
<dblpperson name="James S. Okolica" pid="65/6571" n="16">
<person key="homepages/65/6571" mdate="2019-11-20">
<author pid="65/6571">James S. Okolica</author>
<url>https://orcid.org/0000-0003-3988-1186</url>
</person>
<r><article key="journals/tkde/OkolicaPMG20" mdate="2020-10-26">
<author orcid="0000-0003-3988-1186" pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<author orcid="0000-0001-9404-7616" pid="55/717">Robert F. Mills</author>
<author orcid="0000-0002-8355-7992" pid="g/MichaelRGrimaila">Michael R. Grimaila</author>
<title>Sequence Pattern Mining with Variables.</title>
<pages>177-187</pages>
<year>2020</year>
<volume>32</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TKDE.2018.2881675</ee>
<url>db/journals/tkde/tkde32.html#OkolicaPMG20</url>
</article>
</r>
<r><inproceedings key="conf/flairs/OkolicaPM20" mdate="2022-10-26">
<author pid="65/6571">James S. Okolica</author>
<author pid="59/722">Gilbert L. Peterson</author>
<author pid="93/1861">Michael J. Mendenhall</author>
<title>Middleware Unifying Framework for Independent Nodes System (MUFFINS).</title>
<pages>205-208</pages>
<year>2020</year>
<booktitle>FLAIRS</booktitle>
<ee type="oa">https://aaai.org/ocs/index.php/FLAIRS/FLAIRS20/paper/view/18432</ee>
<crossref>conf/flairs/2020</crossref>
<url>db/conf/flairs/flairs2020.html#OkolicaPM20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ncs/OkolicaLP20" mdate="2020-09-18">
<author pid="65/6571">James S. Okolica</author>
<author pid="81/4600">Alan C. Lin</author>
<author pid="59/722">Gilbert L. Peterson</author>
<title>Gaming DevSecOps - A Serious Game Pilot Study.</title>
<pages>61-77</pages>
<year>2020</year>
<booktitle>NCS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-58703-1_4</ee>
<crossref>conf/ncs/2020</crossref>
<url>db/conf/ncs/ncs2020.html#OkolicaLP20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gala/PendletonO19" mdate="2019-11-20">
<author pid="253/2240">Aaron Pendleton</author>
<author pid="65/6571">James S. Okolica</author>
<title>Creating Serious Games with the Game Design Matrix.</title>
<pages>530-539</pages>
<year>2019</year>
<booktitle>GALA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-34350-7_51</ee>
<crossref>conf/gala/2019</crossref>
<url>db/conf/gala/gala2019.html#PendletonO19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdf2c/SchelkophPO18" mdate="2020-10-25">
<author pid="262/1672">Daniel J. Schelkoph</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<author pid="65/6571">James S. Okolica</author>
<title>Digital Forensics Event Graph Reconstruction.</title>
<pages>185-203</pages>
<year>2018</year>
<booktitle>ICDF2C</booktitle>
<ee>https://doi.org/10.1007/978-3-030-05487-8_10</ee>
<crossref>conf/icdf2c/2018</crossref>
<url>db/conf/icdf2c/icdf2c2018.html#SchelkophPO18</url>
</inproceedings>
</r>
<r><article key="journals/di/LapsoPO17" mdate="2022-10-02">
<author orcid="0000-0003-2061-028X" pid="198/5570">Joshua A. Lapso</author>
<author pid="59/722">Gilbert L. Peterson</author>
<author orcid="0000-0003-3988-1186" pid="65/6571">James S. Okolica</author>
<title>Whitelisting system state in windows forensic memory visualizations.</title>
<pages>2-15</pages>
<year>2017</year>
<volume>20</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2016.12.002</ee>
<url>db/journals/di/di20.html#LapsoPO17</url>
</article>
</r>
<r><article key="journals/compsec/BaileyOP14" mdate="2023-08-28">
<author pid="144/9731">Kyle O. Bailey</author>
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<title>User identification and authentication using multi-modal behavioral biometrics.</title>
<pages>77-89</pages>
<year>2014</year>
<volume>43</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2014.03.005</ee>
<ee>https://www.wikidata.org/entity/Q115060769</ee>
<url>db/journals/compsec/compsec43.html#BaileyOP14</url>
</article>
</r>
<r><article key="journals/compsec/OkolicaP11" mdate="2023-08-28">
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<title>Windows driver memory analysis: A reverse engineering methodology.</title>
<pages>770-779</pages>
<year>2011</year>
<volume>30</volume>
<journal>Comput. Secur.</journal>
<number>8</number>
<ee>https://doi.org/10.1016/j.cose.2011.08.001</ee>
<ee>https://www.wikidata.org/entity/Q115061484</ee>
<url>db/journals/compsec/compsec30.html#OkolicaP11</url>
</article>
</r>
<r><article key="journals/di/OkolicaP11" mdate="2025-11-02">
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<title>Extracting the windows clipboard from physical memory.</title>
<pages>S118-S124</pages>
<year>2011</year>
<volume>8</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.diin.2011.05.014</ee>
<url>db/journals/di/di8.html#OkolicaP11</url>
</article>
</r>
<r><article key="journals/di/OkolicaP10" mdate="2022-01-03">
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<title>Windows operating systems agnostic memory analysis.</title>
<pages>S48-S56</pages>
<year>2010</year>
<volume>7</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.diin.2010.05.007</ee>
<url>db/journals/di/di7.html#OkolicaP10</url>
</article>
</r>
<r><inproceedings key="conf/ifip11-9/OkolicaP10" mdate="2020-10-25">
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<title>A Compiled Memory Analysis Tool.</title>
<pages>195-204</pages>
<year>2010</year>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-15506-2_14</ee>
<ee type="oa">http://dl.ifip.org/db/conf/ifip11-9/df2010/OkolicaP10.pdf</ee>
<crossref>conf/ifip11-9/2010</crossref>
<url>db/conf/ifip11-9/df2010.html#OkolicaP10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scsc/DodgeMPO10" mdate="2011-06-29">
<author pid="47/9804">Dustyn A. Dodge</author>
<author pid="56/5722">Barry E. Mullins</author>
<author pid="59/722">Gilbert L. Peterson</author>
<author pid="65/6571">James S. Okolica</author>
<title>Simulating windows-based cyber attacks using live virtual machine introspection.</title>
<pages>550-555</pages>
<year>2010</year>
<booktitle>SummerSim</booktitle>
<ee>http://portal.acm.org/citation.cfm?id=1999487&#38;CFID=29315481&#38;CFTOKEN=81718596</ee>
<crossref>conf/scsc/2010</crossref>
<url>db/conf/scsc/scsc2010.html#DodgeMPO10</url>
</inproceedings>
</r>
<r><article key="journals/ijsn/OkolicaPM08" mdate="2020-04-01">
<author pid="65/6571">James S. Okolica</author>
<author pid="59/722">Gilbert L. Peterson</author>
<author pid="55/717">Robert F. Mills</author>
<title>Using PLSI-U to detect insider threats by datamining e-mail.</title>
<pages>114-121</pages>
<year>2008</year>
<volume>3</volume>
<journal>Int. J. Secur. Networks</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJSN.2008.017224</ee>
<url>db/journals/ijsn/ijsn3.html#OkolicaPM08</url>
</article>
</r>
<r><article key="journals/di/OkolicaPM07" mdate="2020-10-26">
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<author pid="55/717">Robert F. Mills</author>
<title>Using Author Topic to detect insider threats from email traffic.</title>
<pages>158-164</pages>
<year>2007</year>
<volume>4</volume>
<journal>Digit. Investig.</journal>
<number>3-4</number>
<ee>https://doi.org/10.1016/j.diin.2007.10.002</ee>
<url>db/journals/di/di4.html#OkolicaPM07</url>
</article>
</r>
<r><inproceedings key="conf/ifip11-9/OkolicaPM06" mdate="2020-03-12">
<author pid="65/6571">James S. Okolica</author>
<author pid="59/722">Gilbert L. Peterson</author>
<author pid="55/717">Robert F. Mills</author>
<title>Using PLSI-U to Detect Insider Threats from Email Traffic.</title>
<pages>91-103</pages>
<year>2006</year>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<crossref>conf/ifip11-9/2006</crossref>
<ee type="oa">http://dl.ifip.org/db/conf/ifip11-9/df2006/OkolicaPM06.pdf</ee>
<url>db/conf/ifip11-9/df2006.html#OkolicaPM06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isi/OkolicaPM06" mdate="2020-10-25">
<author pid="65/6571">James S. Okolica</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<author pid="55/717">Robert F. Mills</author>
<title>Using Author Topic to Detect Insider Threats from Email Traffic.</title>
<pages>642-643</pages>
<year>2006</year>
<crossref>conf/isi/2006</crossref>
<booktitle>ISI</booktitle>
<ee>https://doi.org/10.1007/11760146_71</ee>
<url>db/conf/isi/isi2006.html#OkolicaPM06</url>
</inproceedings>
</r>
<coauthors n="11" nc="1">
<co c="0"><na f="b/Bailey:Kyle_O=" pid="144/9731">Kyle O. Bailey</na></co>
<co c="0"><na f="d/Dodge:Dustyn_A=" pid="47/9804">Dustyn A. Dodge</na></co>
<co c="0"><na f="g/Grimaila:Michael_R=" pid="g/MichaelRGrimaila">Michael R. Grimaila</na></co>
<co c="0"><na f="l/Lapso:Joshua_A=" pid="198/5570">Joshua A. Lapso</na></co>
<co c="0"><na f="l/Lin:Alan_C=" pid="81/4600">Alan C. Lin</na></co>
<co c="0"><na f="m/Mendenhall:Michael_J=" pid="93/1861">Michael J. Mendenhall</na></co>
<co c="0"><na f="m/Mills:Robert_F=" pid="55/717">Robert F. Mills</na></co>
<co c="0"><na f="m/Mullins:Barry_E=" pid="56/5722">Barry E. Mullins</na></co>
<co c="-1"><na f="p/Pendleton:Aaron" pid="253/2240">Aaron Pendleton</na></co>
<co c="0"><na f="p/Peterson:Gilbert_L=" pid="59/722">Gilbert L. Peterson</na></co>
<co c="0"><na f="s/Schelkoph:Daniel_J=" pid="262/1672">Daniel J. Schelkoph</na></co>
</coauthors>
</dblpperson>

