Michael VanPutte - Academia.edu (original) (raw)

Uploads

Papers by Michael VanPutte

Research paper thumbnail of Doctoral Dissertation 5. FUNDING NUMBERS

This dissertation was completed in cooperation with the Institute for Information Superiority and... more This dissertation was completed in cooperation with the Institute for Information Superiority and Innovation and the MOVES Institute. Approved for public release, distribution is unlimited. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington

Research paper thumbnail of Challenges in Securing Crowdsourcing Solutions

The widespread adoption of mobile, digital and social media has produced tremendous growth and op... more The widespread adoption of mobile, digital and social
media has produced tremendous growth and opportunities
for crowdsourcing as a viable means to produce innovative,
cost effective solutions. However, the very strengths of
crowdsourcing technologies may be its greatest
weaknesses. This paper introduces the crowdsourcing
community to cyber security threats and mitigating actions.

Research paper thumbnail of DoD Enterprise-Wide Information Assurance (IA)

Research paper thumbnail of Innovations in Computer Generated Autonomy at the MOVES Institute

Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources,gathering and maintaining the data needed, and completing and reviewing the collection of ...

Research paper thumbnail of Innovations in Computer Generated Autonomy at the MOVES Institute

: The M6VES Institute's Computer-Generated Autonomy Group has focused on a research goal of m... more : The M6VES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling intensely complex and adaptive behavior while at the same time making the behavior far easier to create and control. This research has led to five new techniques for agent construction, which include a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure for capturing and applying procedural knowledge (tickets), and the ability to bring these technologies to bear at the right time and in the proper context through connectors. The MOVES Institute, located on the campus of the Naval Postgraduate School, specializes in Department of Defense related research and applications, including projects in 3D visual simulation, networked virtual environments, computer-generated autonomy, human performance engineering, technologies for immersion, evolving operational modeling and defense/entertainment collaboration ?http:/...

Research paper thumbnail of Ps-Mv-02-002 Naval Postgraduate School

Research paper thumbnail of Ps-Mv-02-002 Naval Postgraduate School

The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modelin... more The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling intensely complex and adaptive behavior while at the same time making the behavior far easier to create and control. This research has led to five new techniques for agent construction, which include a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure for capturing and applying procedural knowledge (tickets), and the ability to bring these technologies to bear at the right time and in the proper context through connectors.

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

The MOVES Institute’s Computer-Generated Autonomy Group has focused on a research goal of modelin... more The MOVES Institute’s Computer-Generated Autonomy Group has focused on a research goal of modeling complex and adaptive behavior while at the same time making the behavior easier to create and control. This research has led to several techniques for agent construction, that includes a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure for capturing and applying procedural knowledge (tickets), and the ability to bring these technologies to bear at the right time and in the proper context through connectors. This paper provides an overview of the architecture and discusses the implementation of this architecture in a multi-agent simulation of the information assurance domain.

Research paper thumbnail of A Computational Model and Multi-Agent Simulation for Information Assurance

: The field of information assurance (IA) is too complex for current modeling tools, While securi... more : The field of information assurance (IA) is too complex for current modeling tools, While security analysts may understand individual mechanisms at a particular moment, the interactions among the mechanisms, combined with evolving nature of the components, make understanding the entire system nearly impossible. This dissertation introduces a computational model of IA called the Social-Technical Information Assurance Model (STIAM). STIAM models organizations, information infrastructures, and human actors as a complex adaptive system. STIAM provides a structured approach to express organizational IA issues and a graphical notation for depicting the elements and interactions. The model can be implemented in a computational system to discover possible adaptive behavior in an IA environment. A multi-agent simulation is presented that introduces several innovations in multi-agent systems including iconnectors, a biologically inspired visual language and mechanism for inter-agent communic...

Research paper thumbnail of A Computational Model and Multi-Agent Simulation for Information Assurance

... Public reporting burden for this collection of information is estimated to average 1 hour per... more ... Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and ... implementation of that model. ...

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of mod... more The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling complex and adaptive behavior while at the same time making the behavior easier to create and control. This research has led to several techniques for agent construction, that includes a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of mod... more The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling complex and adaptive behavior while at the same time making the behavior easier to create and control. This research has led to several techniques for agent construction, that includes a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

Research paper thumbnail of A COMPUTATIONAL MODEL AND MULTI-AGENT SIMULATION FOR INFORMATION ASSURANCE

The field of information assurance (IA) is too complex for current modeling tools. While security... more The field of information assurance (IA) is too complex for current modeling tools. While security analysts may understand individual mechanisms at a particular moment, the interactions among the mechanisms, combined with evolving nature of the components, make understanding the entire system nearly impossible.
This dissertation introduces a computational model of IA called the Social-Technical Information Assurance Model (STIAM). STIAM models organizations, information infrastructures, and human actors as a complex adaptive system. STIAM provides a structured approach to express organizational IA issues and a graphical notation for depicting the elements and interactions. The model can be implemented in a computational system to discover possible adaptive behavior in an IA environment. A
multi-agent simulation is presented that introduces several innovations in multi-agent systems including iconnectors, a biologically inspired visual language and mechanism for inter-agent communications.
The computational model and simulation demonstrate how complex societies of autonomous entities interact. STIAM can be implemented as a hypothesis generator for scenario development in computer network defensive mechanisms.

Research paper thumbnail of Shortest path planning on topographical maps

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 1999

Research paper thumbnail of Doctoral Dissertation 5. FUNDING NUMBERS

This dissertation was completed in cooperation with the Institute for Information Superiority and... more This dissertation was completed in cooperation with the Institute for Information Superiority and Innovation and the MOVES Institute. Approved for public release, distribution is unlimited. REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington

Research paper thumbnail of Challenges in Securing Crowdsourcing Solutions

The widespread adoption of mobile, digital and social media has produced tremendous growth and op... more The widespread adoption of mobile, digital and social
media has produced tremendous growth and opportunities
for crowdsourcing as a viable means to produce innovative,
cost effective solutions. However, the very strengths of
crowdsourcing technologies may be its greatest
weaknesses. This paper introduces the crowdsourcing
community to cyber security threats and mitigating actions.

Research paper thumbnail of DoD Enterprise-Wide Information Assurance (IA)

Research paper thumbnail of Innovations in Computer Generated Autonomy at the MOVES Institute

Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources,gathering and maintaining the data needed, and completing and reviewing the collection of ...

Research paper thumbnail of Innovations in Computer Generated Autonomy at the MOVES Institute

: The M6VES Institute's Computer-Generated Autonomy Group has focused on a research goal of m... more : The M6VES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling intensely complex and adaptive behavior while at the same time making the behavior far easier to create and control. This research has led to five new techniques for agent construction, which include a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure for capturing and applying procedural knowledge (tickets), and the ability to bring these technologies to bear at the right time and in the proper context through connectors. The MOVES Institute, located on the campus of the Naval Postgraduate School, specializes in Department of Defense related research and applications, including projects in 3D visual simulation, networked virtual environments, computer-generated autonomy, human performance engineering, technologies for immersion, evolving operational modeling and defense/entertainment collaboration ?http:/...

Research paper thumbnail of Ps-Mv-02-002 Naval Postgraduate School

Research paper thumbnail of Ps-Mv-02-002 Naval Postgraduate School

The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modelin... more The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling intensely complex and adaptive behavior while at the same time making the behavior far easier to create and control. This research has led to five new techniques for agent construction, which include a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure for capturing and applying procedural knowledge (tickets), and the ability to bring these technologies to bear at the right time and in the proper context through connectors.

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

The MOVES Institute’s Computer-Generated Autonomy Group has focused on a research goal of modelin... more The MOVES Institute’s Computer-Generated Autonomy Group has focused on a research goal of modeling complex and adaptive behavior while at the same time making the behavior easier to create and control. This research has led to several techniques for agent construction, that includes a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure for capturing and applying procedural knowledge (tickets), and the ability to bring these technologies to bear at the right time and in the proper context through connectors. This paper provides an overview of the architecture and discusses the implementation of this architecture in a multi-agent simulation of the information assurance domain.

Research paper thumbnail of A Computational Model and Multi-Agent Simulation for Information Assurance

: The field of information assurance (IA) is too complex for current modeling tools, While securi... more : The field of information assurance (IA) is too complex for current modeling tools, While security analysts may understand individual mechanisms at a particular moment, the interactions among the mechanisms, combined with evolving nature of the components, make understanding the entire system nearly impossible. This dissertation introduces a computational model of IA called the Social-Technical Information Assurance Model (STIAM). STIAM models organizations, information infrastructures, and human actors as a complex adaptive system. STIAM provides a structured approach to express organizational IA issues and a graphical notation for depicting the elements and interactions. The model can be implemented in a computational system to discover possible adaptive behavior in an IA environment. A multi-agent simulation is presented that introduces several innovations in multi-agent systems including iconnectors, a biologically inspired visual language and mechanism for inter-agent communic...

Research paper thumbnail of A Computational Model and Multi-Agent Simulation for Information Assurance

... Public reporting burden for this collection of information is estimated to average 1 hour per... more ... Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and ... implementation of that model. ...

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of mod... more The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling complex and adaptive behavior while at the same time making the behavior easier to create and control. This research has led to several techniques for agent construction, that includes a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of mod... more The MOVES Institute's Computer-Generated Autonomy Group has focused on a research goal of modeling complex and adaptive behavior while at the same time making the behavior easier to create and control. This research has led to several techniques for agent construction, that includes a social and organization relationship management engine, a composite agent architecture, an agent goal apparatus, a structure

Research paper thumbnail of A Composite Agent Architecture for Multi-Agent Simulations

Research paper thumbnail of A COMPUTATIONAL MODEL AND MULTI-AGENT SIMULATION FOR INFORMATION ASSURANCE

The field of information assurance (IA) is too complex for current modeling tools. While security... more The field of information assurance (IA) is too complex for current modeling tools. While security analysts may understand individual mechanisms at a particular moment, the interactions among the mechanisms, combined with evolving nature of the components, make understanding the entire system nearly impossible.
This dissertation introduces a computational model of IA called the Social-Technical Information Assurance Model (STIAM). STIAM models organizations, information infrastructures, and human actors as a complex adaptive system. STIAM provides a structured approach to express organizational IA issues and a graphical notation for depicting the elements and interactions. The model can be implemented in a computational system to discover possible adaptive behavior in an IA environment. A
multi-agent simulation is presented that introduces several innovations in multi-agent systems including iconnectors, a biologically inspired visual language and mechanism for inter-agent communications.
The computational model and simulation demonstrate how complex societies of autonomous entities interact. STIAM can be implemented as a hypothesis generator for scenario development in computer network defensive mechanisms.

Research paper thumbnail of Shortest path planning on topographical maps

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 1999