Academy Center for
Cyberspace Research
HQ USAFA/DFCS
2354 Fairchild Drive,
Suite 6G-101
USAFA, CO 80840
719 333-3945 (phone)
719 333-3338 (fax)

ACCR Webmaster

Date Last Updated:
12 Feb 2014
 
RESEARCH CENTERS
ACCR NEWS
ACCR RESEARCH PROJECTS
ABOUT ACCR


ACCR's mission is to enhance cadet education through research in the domain of Cyberspace. Our activities include:
  • Involve students in cyberspace research projects, both basic and applied
  • Provide opportunities for faculty professional development
  • Perform cyberspace research in support of sponsoring agencies
  • Assist in curriculum development, both within Computer Science and cross-disciplinary
  • Increase awareness and participation in cyberspace
    activities by all cadets
  • Place students in summer cyberspace research programs
  • Support the Cyber Warfare Club and
    Cyber Defense Exercise (CDX)
  • Participate in and promote regional Information
    Assurance activities such as FRISC and CANVAS
ACCR LINKS


ACCR PUBLICATIONS close window


"Querying Cyber-Networks Using Words", John Rickard and Allen Ott, Proceedings of the 4th World Conference on Soft Computing, Berkeley, California, May 2014.
"Cyber-Security Via Computing With Words", John Rickard and Allen Ott, Proceedings of The Third ASE International Conference on Cyber Security, Stanford, California, May 2014.
“Secured Distributed-Access Protection System: A New Construct Engineered for Digital Security Paradigms”, Sonya, S., Mullins, B. Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS 2014). March 2014.
"Heuristic Malware Detection via Basic Block Comparison", Frank Adkins, Luke Jones, Martin C. Carlisle, and Jason Upchurch, Proceedings of the 8th International Conference on Malicious and Unwanted Software "The Americas" (Malware 2013 The Americas), Fajardo Puerto Rico, October 2013.
"Provably Secure DNS: A Case Study in Reliable Software", Barry Fagin and Martin C. Carlisle, Proceedings of Ada Europe 2013, Berlin Germany, June 2013. (Best presentation award)
"ADS-B Encryption: Confidentiality in the Friendly Skies", Finke, C., Butts, J., and Mills, R. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW 13). January 2013.
"Evaluation of a Cryptographic Security Scheme for Air Traffic Control’s Next Generation Upgrade", Finke, C., Butts, J., Mills, R., and Grimaila. Proceedings of the 8th International Conference on Information Warfare and Security (ICIW 2013) . March 2013.
"Enhancing the Security of Aircraft Surveillance in the Next Generation Air Traffic Control System", Finke, C., Butts, J., Mills, R. and Grimaila, M. International Journal of Critical Infrastructure Protection (IFIP). March 2013.
"Suntext and After Winter", Talbot, Brent J.
"IRONSIDES: DNS With No Single-Packet Denial of Service or Remote Code Execution Vulnerabilities,"Carlisle, M., Fagin, B., Proceedings of IEEE GLOBECOM, December 2012.
"The Glowworm Hash: Increased Speed and Security for BBC Unkeyed Jam Resistance,"Leemon Baird, Martin Carlisle, William Bahn, and E. Smith. Proceedings of the 2012 IEEE Military Communications Conference, October 2012
"Provably Secure DNS: A Case Study in Reliable Software," Martin Carlisle and Barry Fagin, Proceedings of Ada Europe 2013, June 2013.
"Defining and exposing privacy issue with social media,"Jacob Blasbalg, Ryan Cooney, Steve Fulton. Computer Science Department, USAF Academy., Journal of Computing Sciences in Colleges archive, Volume 28 Issue 2, December 2012, Pages 6-14.
A Review of Anomaly Detection in Automated Surveillance,"Sodemann, A.A., Ross, M.P., and Borghetti, B.J., (2012), IEEE Transactions on Systems, Man, and Cybernetics, Part C, Manuscript no. SMCC-11-05-0211
"Impact of Giving Students a Choice of Homework Assignments in an Introductory Computer Science Class", Fulton, S. and Schweitzer, D., International Journal of the Scholarship of Teaching and Learning 5(1), 2011.
"Teaching Introductory Computer Graphics with the Processing Language", Schweitzer, D., Boleng, Graham, P., Journal of Computing Sciences in Colleges, October 2010.
"A Security Class Project in Graphical Passwords", Spitzer, J., Singh, C., Schweitzer D., Journal of Computing Sciences in Colleges, October 2010.)
"Unkeyed Jam Resistance 300 Times Faster: The Inchworm Hash", Baird, L., Carlisle, M., Bahn, W., MILCOM 2010 - Military Communications Conference, San Jose, CA, Oct. 2010.
"Converting educational applets to a mobile platform", Schweitzer, D. and Teel, S., FCS'10 - 6th International Conference on Foundations of Computer Science, Las Vegas, Nevada, July 2010.
"Complexity of the Game of Sprouts", Baird, L. and Schweitzer, D., FCS'10 - 6th International Conference on Foundations of Computer Science, Las Vegas, Nevada, July 2010.)
"A single-sheet icosahedral folding with improved efficiency, using a business card", Baird, L., Fagin, B., Fagin, M., Journal of Recreational Mathematics, 35:2, pages 132-140, 2010.
"Faster Methods for Identifying Nontrivial Energy Conservation Functions for Cellular Automata", Baird, L. and Fagin, B., AUTOMATA 2010 16th intl. workshop on cellular automata and discrete complex systems, Nancy, France, June 2010.
"Promoting Skepticism in the Security Classroom", Carlisle, M., Schweitzer, D., Proceedings of the 14th Colloquium for Information Systems Security Education, June 2010.
"PRISM: A Public Repository for Information Security Material". Garramone, V. and Schweitzer, D., Proceedings of the 14th Colloquium for Information Systems Security Education, June 2010.
"A Hands-on Approach to Information Operations Education and Training", Boleng, J., Schweitzer, D., Proceedings of the 14th Colloquium for Information Systems Security Education, June 2010.
"A Novel Visual Cryptography Coding System for Jam Resistant Communication", Baird, L., Schweitzer, D., Bahn, W., Journal of Issues in Informing Science and Information Technology, Vol. 7, 2010.
"A Hybrid Approach to Teaching Information Warfare", Schweitzer, D. and Fulton, S., Proceedings of the International Conference on Information Warfare and Security, ICIW 2010, April 2010.
"A Simple Machine Simulator for Teaching Stack Frames", Schweitzer, D. and Boleng, J., Proceedings of the 41st ACM Technical Symposium on Computer Science Education, SIGSCE 2010, March 2010.
"Using YouTube to Enhance Student Class Preparation in an Introductory Java Course", Carlisle, M., Proceedings of the 41st ACM Technical Symposium on Computer Science Education, SIGSCE 2010, March 2010.
"An O(log n) Running Median or Running Statistic Method, for Use with BBC Jam Resistance", Baird, L., and Bahn, W., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2009-ACCR-03, Nov. 2009.
"An Efficient Correlator for Implementations of BBC Jam Resistance", Baird, L. and Bahn, W., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2009-ACCR-02, Nov. 2009. (baird2009b)
"Parallel BBC Decoding With Little Interprocess Communication", Baird, L. and Bahn, W., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2009-ACCR-01, Nov. 2009.
"Visualizing Keyboard Pattern Passwords", Schweitzer, D., Boleng, J., Hughes, C., Murphy, L., Proceedings of the International Workshop on Visualization for Computer Security, VizSec'09, October 2009.
"Designing Web Labs for Teaching Security Concepts", Schweitzer, D. and Boleng, J., Journal of Computing Sciences in Colleges, October 2009.
"Building an Undergraduate Computer Science Research Experience", Hadfield, S. and Schweitzer, D., Proceedings of the 39th ASEE/IEEE Frontiers in Education Conference, October 2009.
"Providing an Undergraduate Research Experience in a Senior Level Security Course", Schweitzer, D., Boleng, J., Hadfield, S., Proceedings of the 13th Colloquium for Information Systems Security Education, June 2009.
"Two Frameworks for Discrete Mathematics", McMaster, K., Rague, B., Hadfield, S., Information Systems Education Journal, 7:68, May 2009.
"Using Visualization to Teach Security", Schweitzer, D. and Brown, W., Journal of Computing Sciences in Colleges, April 2009.
"RAPTOR: A Visual Programming Environment for Teaching Object-Oriented Programming", Carlisle, M., Journal of Computing Sciences in Colleges, Vol 24, No. 4, April 2009.
"Two Mathematical Gestalts for Computational Theory", McMaster, K., Rague, B., Hadfield, S., Proceedings of Special Interest Group in Computer Science Education (SIGCSE), March 2009.
"Active Learning in the Security Classroom", Schweitzer, D., Gibson, D., Collins, M., Proceedings of the Hawaii International Conference on System Science, HICSS-4, January 2009.
"Hardware-Centric Implementation Considerations for BBC-Based Concurrent Codecs", Baird, L. and Bahn, W., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2008-ACCR-03, Dec 2008.
"The Cellular Automata *0*0*000 Have No Nontrivial Conserved Functions", Baird, L., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2008-ACCR-04, Dec 2008.
"Extending Critical Mark Densities in Concurrent Codecs Through the Use of Interstitial Checksum Bits", Baird, L. and Bahn, W., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2008-ACCR-02, Dec 2008.
"Security Analysis of BBC Coding", Baird, L. and Bahn, W., Technical Report, U. S. Air Force Academy, Academy Center for Cyberspace Research, USAFA-TR-2008-ACCR-01, Dec 2008.
"Oscillator mismatch and jitter compensation in concurrent codecs",Bahn, W., Baird, L., Collins, M., IEEE Military Communication Conference (MILCOM08), San Diego, CA, Nov 17-19, 2008.
"Three Software Development Gestalts", McMaster, K., Rague, B., Hadfield, S., Information Systems Education Conference 2008, Phoenix, AZ, November 2008.
"Simplified Core War for Introducing Low-level Concepts", Schweitzer, D., Gibson, D., Baird, L., Journal of Computing Sciences in Colleges, October 2008.
"A graph drawing algorithm for the game of sprouts", Brown, W. and Baird, L., The 2008 International Conference on Computer Graphics and Virtual Reality, Las Vegas, Nevada, July 14-17, 2008.
"A non-trigonometric, pseudo area preserving, polyline smoothing algorithm", Brown, W. and Baird, L., Journal of Computing Sciences in Colleges, 2008.
"CANVAS: a Regional Assessment Exercise for Teaching Security Concepts", Collins, M., Schweitzer, D., Massey, D., Proceedings of the 12th Colloquium for Information Systems Security Education, June 2008.
"Developing Cyber Warriors", Boleng, J., Schweitzer, D., Gibson, D., Proceedings of the International Conference on Information Warfare and Security, ICIW 2008, April 2008.
"Sensor Collection and Analysis of Radio Frequencies (SCARF)", Boleng, J., Wirges, T., Schweitzer, D., Hagerman, S., Thurimella, R., Proceedings of the International Conference on Information Warfare and Security, ICIW 2008, April 2008.
"Jam-resistant communications without shared secret", Bahn, W., Baird, L., Michael D. Collins, 3rd International Conference on Information Warfare and Security (ICIW08), Omaha, Nebraska, 24-25 Apr 2008.
"Experiences with Software Engineering Capstone Projects", Hadfield, S., Association for Computing Machinery Special Interest Group in Computer Science Education, Portland, OR, March 2008.
"Interdisciplinary Research, Writing, and the Computer Science Programming Exercise", Hadfield, S., Weingart, T., Association for Computing Machinery Special Interest Group in Computer Science Education, Portland, OR, March 2008.
"Visually Understanding Jam Resistant Communication", Schweitzer, D., Baird, L., Bahn, W., Proceedings of the International Workshop on Visualization for Computer Security, VizSec'07, November 2007.
"Crafting a Capstone Software Engineering Project Course", Hadfield, S., Jensen, N., Journal of Computing Sciences in Colleges, 23:1, October 2007.
"The use of concurrent codes in computer programming and digital signal processing education", Bahn, W., Baird, L., Collins, M., Journal of Computing Sciences in Colleges, 23(1), October 2007.
"Locating Rogue Access Points Using Visualization", Schweitzer, D., Brown, W., Boleng, J., Journal of Computing Sciences in Colleges, October 2007.
"Impediments to systems thinking: Communities separated by a common language", Bahn, W., Baird, L., Collins, M., Proceedings of the 4th International Conference on Cybernetics, Information Technologies, Systems and Applications (CITSA), (III): pages 122-127, Orlando, Florida, 12-15 Jul 2007.
"Design and Use of a Secure Testing Environment on Untrusted Hardware", Carlisle, M. and Baird, L., Proceedings of the 2007 IEEE SMC Information Assurance Workshop, West Point NY, June 2007.
"A Global Look at Authentication", Hamilton, S., Carlisle, M., Hamilton, J., Proceedings of the 2007 IEEE SMC Information Assurance Workshop, West Point NY, June 2007.
"Teaching Information Security with Skepticism and Critical Thinking", Fagin, B., Baird, L., Humphries, J., Schweitzer D., Proceedings of the 11th Colloquium for Information Systems Security Education, June 2007.
"A Visual Approach to Teaching Formal Access Models in Security", Schweitzer D., Collins M., Baird L., Proceedings of the 11th Colloquium for Information Systems Security Education, June 2007.
"Keyless jam resistance", Baird , L., Bahn, W., Collins, M., Carlisle, M., Butler, S., Proceedings of the Eighth IEEE SMC Information Assurance Workshop (IAW), pages 143-150, West Point, New York, 20-22 Jun 2007.
"An analysis of XML compression efficiency", Augeri, C., Bulutoglu, D., Mullins, B., Baldwin, R., Baird, L., Proceedings of the Workshop on Experimental Computer Science (ExpCS), ACM Press, San Diego, CA, June 2007.
"A new approach for boolean query processing in text information retrieval", Baird, L. and Kraft, D., Proceedings of the International Fuzzy Systems Association (IFSA), 2007 World Congress. Cancun, Mexico, 18-21 June, 2007.
"On Efficient Bijections between permutations and functions", Baird, L. and Collins, M., Technical Report, U. S. Air Force Academy, Academy Center for Information Security, USAFA-ACIS-2007-02, May 26, 2007.
"New higher-order conservation functions for 1-D cellular automata", Baird, L. and Fagin, B., Proceedings of the IEEE Symposium on Artificial Life, Honolulu, HI, April 1-5, 2007.
"Interactive Learning for the Active Learning Classroom", Schweitzer, D. and Brown, W., Proceedings of the 38th ACM Technical Symposium on Computer Science Education, SIGSCE 2007, March 2007.
"A Performance Analysis of the SPRiNG Protocol Through Simulation", Richardson, K., Hamilton, J., Carlisle, M., Proceedings of the 2007 SCS/ACM Simulation Software Security Symposium, Spring Simulation Multiconference, Norfolk VA, March 2007.
"Jam-Resistant Communication Without Shared Secrets Through the Use of Concurrent Codes", Baird , L., Bahn, W., Collins, M., U.S. Air Force Academy Technical Report USAFA-TR-2007-01, 14 February 2007.
"Conservation functions for 1-D automata: Efficient algorithms, new results, and a partial taxonomy", Baird, L. and Fagin, B., Journal of Cellular Automata, 2007.
"An algorithm for determining isomorphism using lexicographic sorting and the matrix inverse", Augeri, C., Mullins, B., Baird, L., Bulutoglu, D., Baldwin, R., Congressus Numerantium Journal, 2007.
"Discovering an RC4 anomaly through visualization", Schweitzer, D. and Baird, L., Proceedings of the International Workshop on Visualization for Computer Security, VizSec'06, November 2006.
"Automatic OO Parser Generation using Visitors for Ada 2005", Carlisle, M., Proceedings of SIGAda 2006, Albuquerque NM, November 2006.
"Integrating Ada 2005 into Visual Studio 2005", Carlisle, M. and Hamilton, J., Proceedings of SIGAda 2006, Albuquerque NM, November 2006.
"Toward a More Effective Visualization Tool to Teach Novice Programmers", Giordano, J and Carlisle, M., Proceedings of SIGITE 2006, Minneapolis MN, October 2006.
"Meeting the criteria for a center of academic excellence (CAE) in information assurance education", Schweitzer, D., Humphries, J., Baird, L., Journal of Computing Sciences in Colleges, October 2006.
"Teaching computer security concepts - let's get physical!", Collins, M. and Schweitzer, D., Proceedings of the Annual Conference on Education in Information Security, ACEIS'06, September 2006.
"The New Java Security Architecture", Ruffin, I., Hamilton, J., Carlisle, M., Crosstalk: the Journal of Defense Software Engineering, July 2006.
"U.S. Air Force Academy's Cadet Homepage", Hadfield, S., Vollmer, D., Portal 2006 Conference, Gettysburg, PA, June 2006.
"Safely Redistributing Untrusted Code using .NET", Carlisle, M., Humphries, J., Hamilton, J., Proceedings of the 2006 IEEE SMC Information Assurance Workshop, West Point NY, June 2006.
"Fault-Tolerant Overlay Protocol Network", Shelly, N., Jensen, N., Baird, L., Moore, J., 2006 IEEE Workshop on Information Assurance, West Point, NY, June 2006.
"GRASP: A visualization tool for teaching security protocols", Schweitzer, D., Baird, L., Collins, M., Sherman, M., Proceedings of the 10th Colloquium for Information Systems Security Education, June 2006.
"The design and use of interactive visualization applets for teaching ciphers", Schweitzer, D. and Baird, L., Proceedings of the 7th IEEE Workshop on Information Assurance, June 2006.
"Critical thinking and computer science: Implicit and explicit connections", Fagin, B., Harper, J., Baird, L., Hadfield, S., Sward, R., Journal of Computing Science in Colleges, 21:4, April 21-22, 2006.
"Work in Progress - A Visual Cache Memory Simulator", Neebel, D., Augeri, C., MacMillan, G., Baird, L., de Freitas, Adrian A., Proceedings of the Frontiers in Education Conference, Oct 19-22, 2005.
"UAV Communications: Integrating a Real-World Scenario with Computer Architecture", Neebel, D., Augeri, C., MacMillan, G., Baird, L., de Freitas, Adrian A., Proceedings of the Frontiers in Education Conference, Oct 19-22, 2005.
"One-step neural network inversion with PDF learning and emulation", Baird, L., Smalenberger, D., Ingkiriwang, S., Proceedings of the International Joint Conference on Neural Networks, August 2005.
"Bounding Optimality of Ballistic Missile Defense Engagements Using Post-Event Analysis", Hadfield, S., Boedigheimer, R., Rathbun, T., Proceedings of the 73rd Military Operations Research Society Symposium, June 2005.
"Proving Functional Equivalence for Program Slicing in SPARK", Baird, L. and Sward, R., Proceedings of the 10th International Conference on Reliable Software Technologies - Ada Europe, June 2005.
"Optimizing the SPARK Program Slicer", Sward, R. and Baird, L., Ada Letters, 2005.
"Evaluating Secure Overlay Services through OPNET Simulation", Fletcher, H., Richardson, K., Carlisle, M., Hamilton, J., SCS Spring Simulation Multiconference, San Diego CA, April 2005.
"RAPTOR: A Visual Programming Environment for Teaching Algorithmic Problem Solving", Carlisle, M., Wilson, T., Humphries, J., Hadfield, S., Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, Saint Louis MO, February 2005.

end of list

ACCR TOOLSclose window


Cipher Applets
Shift Cipher
add a constant to each plaintext character
Affine Cipher
multiply each plaintext character by one constant, then add another constant
Vigenere Cipher
add each plaintext character to the next character in the repeated key
Simple Substitution Cipher
each letter of the alphabet is replaced by some other letter, like a cryptogram in the newspaper
Feistel (a simplified DES)
a block cipher: XOR half of the block with a function of the other half, and repeat
RC4 encryption
a simple stream cipher used in SSL (which protects HTTPS secure web pages)
Probability distribution after key setup
 
Dependency on the first few bytes of the key
 
Download a ZIP file containing all these pages.


U.S. Air Force Academy, USAFA, CO 80840, (719) 333-1110 DSN: 333-1110, 26 Nov 14  |   Accessibility/Section 508
Privacy & Security Notice   |   External Link Disclaimer   |   Contact Us / Submit Feedback / Webmaster