James Bret Michael
Vice Provost for Academic Affairs
Professor of Computer Science and
Electrical & Computer Engineering
Naval Postgraduate School (https://nps.edu/)
Email: bmichael@nps.edu
IEEE Fellow
Associate Editor-in-Chief, Computer
(Electronic ISSN: 1558-0814)
See my official biographical
sketches at https://nps.edu/faculty-profiles/-/cv/bmichael
RECENT TEACHING
· CS3600, Introduction
to Computer Security (fall AY23)
· EC3740,
Reverse Engineering in Electronic Systems (spring AY23)
· EC4765,
Cyber Warfare (fall AY24)
PATENTS
·
D. Drusinsky and J. B.
Michael, Multiagent pathfinding for non-dynamic programming problems. U.S.
Patent no. 11,882,023 B2, 23 Jan. 2024.
·
D. Drusinsky, M. Litton,
and J. B. Michael, 2023. Machine-learned verification and advance notice
oracles for autonomous systems. U.S. provisional patent application filed Aug.
2023.
SELECTED RECENT PUBLICATIONS
Over 300 publications, including
books, chapters, journal articles, conference papers, and technical reports.
· M. L.
Litton, D. Drusinsky, and J. B. Michael,
"Discovering decision manifolds to assure trusted autonomous
systems," submitted to IEEE Syst. J., Feb. 2024. In review process.
· M. L.
Litton, D. Drusinsky, L. Bridget, and J. B. Michael,
"Machine learned correctness properties, runtime verification, and advance
warning oracles for autonomous systems," submitted to Science of
Computer Programming, Apr. 2024. In review process.
· M. L.
Litton, D. Drusinsky, J. B. Michael, “Reliable
autonomous vehicles: How do we get there?” IEEE Rel. Mag., vol. 1, no.
1, 2024, pp. 41-50.
- M. T. Swearingen, J. B Michael, J.
Weiss, and R. Radvanovsky, “Resilient without
Zero Trust,” Computer, vol. 57, no. 1, pp. 120-122, 2024.
- D. L. Litton, D. Drusinsky,
and J. B. Michael, “Assuring reliability of autonomous commercial drones
in the national airspace,” in Proc. 70th Annual Reliability &
Maintainability Symposium, Albuquerque, N.M., Jan. 2024.
- J. Weiss, J. B. Michael, and M. T.
Swearingen, “There is no chilling when your control system cybersecurity
is unfulfilling,” Computer, vol. 56, no. 12, pp. 120-124, 2023.
- D. Drusinsky,
M. Litton, and J. B. Michael, “Machine-learned verification and advance
notice oracles for autonomous systems,” Computer, vol. 56, no. 7, 121-130,
2023.
- T. C. Wingfield and J. B. Michael, “Waterfall:
Cascading effects of a strategic cyber campaign,” Computer, vol.
56, no. 4, pp. 143-148, 2023.
- Q. Lu, L. Zhu, J. Whittle, and J. B.
Michael, “Software engineering for responsible AI,” Computer, vol.
56, no. 4, pp. 13-16, 2023.
- J. Michael, D. Drusinsky,
and M. Litton, Update on machine-learned correctness properties, Tech.
report NPS-CS-23-001, Department of Computer Science, Naval Postgraduate
School, Monterey, Calif., Jan. 2023.
- D. Drusinsky,
J. B. Michael, M. Litton, “Machine-learned specifications for the
verification and validation of autonomous cyberphysical
systems,” in Proc. 33rd IEEE International Symposium on Software
Reliability Engineering, Charlotte, N.C., pp. 333-341, Nov. 2022.
- J. Weiss, M. Hood, N. Miller, C. Potorieko, and J. B. Michael, “Using machine learning
to work around the operational and cybersecurity limitations of legacy process
sensors,” Computer, vol. 55, no. 11, pp. 106-111, 2022.
- J. B. Michael, “Taking a measured
approach to investing in information infrastructure for attaining
leading-edge trustworthy artificial intelligence,” IEEE Security &
Privacy, vol. 20, no. 5, pp. 4-6, 2022.
- J. B. Michael, “Understanding
conversational artificial intelligence,” Computer, vol. 55, no. 9, pp.
115-119, 2022.
- J. B. Michael, G. C. Dinolt, F. B. Cohen, D. Wijesekera,
“Can you trust in Zero Trust,” Computer, vol. 55, no. 8, pp. 103-105,
2022.
- J. B. Michael, “Placing trust in
automated software development processes,” Computer, vol. 55, no.
7, pp. 78-81, 2022.
- J. B. Michael and M. Orescanin, “Developing and deploying artificial
intelligence systems,” Computer, vol. 55, no. 6, pp. 15-17, 2022.
- D. Drusinsky,
M. Litton, and J. B. Michael, “Lightweight verification and validation of cyberphysical systems using machine-learned
correctness properties,” Computer, vol 55, no. 2, pp. 102-108,
2022.
- J. B. Michael, “Trusting human-machine
teaming,” Computer, vol. 54, no. 11, pp. 104-107, 2021.
- J. B. Michael and T. C. Wingfield,
“Defensive AI: The future is yesterday,” Computer, vol. 54, no. 9,
pp. 90-96, 2021.
- J. B. Michael, D. Drusinsky,
and D. Wijesekera, “Formal verification of
cyber-physical systems,” Computer, vol. 54, no. 9, pp. 15-24, 2021.
- J. B. Michael, D. Drusinsky,
and D. Wijesekera, “Formal methods in
cyber-physical system,” Computer, vol. 54, no. 9, pp. 25-29, 2021.
- T. Carter, J. B. Michael, J. A. Kroll,
“Lessons learned from applying the NIST Privacy Framework,” IT
Professional, vol. 23, no. 4, pp. 9-13, 2021.
- M. J. Lanoue,
J. B. Michael, and C. A. Bollmann, “Spoofed networks: Exploitation of GNSS
security vulnerability in 4G and 5G mobile networks,” Int. Symp. on Performance Evaluation of Computer and
Telecommunication Systems Conf., Fairfax, Va., pp. 1-8, July 2021.
- D. Drusinsky
and J. B. Michael, “Multiagent pathfinding under rigid, optimization, and
uncertainty constraints,” Computer, vol 54, no. 7, pp. 111-118,
2021.
- J. Viega and J. B. Michael, “Struggling with supply-chain security,” Computer,
vol. 54, no. 7, pp. 98-104, 2021.
- J. B. Michael, “Security and privacy
for edge artificial intelligence,” IEEE Security & Privacy,
vol. 19, no. 4, pp. 4-7, 2021.
- J. A. Kroll, J. B. Michael, and D. B.
Thaw, “Enhancing cybersecurity via artificial
intelligence: Risks, rewards, and frameworks,” Computer, vol
54, no. 6, pp. 64-71, 2021.
- J. F. DeFranco,
C. S. Eagle, J. B. Michael, J. Viega, and J. M. Voas,
“Hackathons 101,” Computer, vol. 54, no. 5, pp. 65-69, 2021.
- P. Denning, D. Drusinsky,
and J. B. Michael, “Military intelligent systems pose
strategic dilemmas,” U.S. Naval Institute Proceedings, Apr.
2021.
- M. Lanoue,
C. A. Bollmann, J. B. Michael, J. D. Roth, and D. Wijesekera,
“An attack vector taxonomy for mobile telephony security vulnerabilities,”
Computer, vol. 54, no. 4, pp. 76-84, 2021.
- S. Peisert,
B. Schneier, H. Okhravi,
F. Massacci, T. Benzel,
C. Landwehr, M. Mannan, J. Mirkovic, A. Prakash,
and J. B. Michael, “Perspectives on the SolarWinds
incident,” IEEE Security & Privacy, vol.19, no.2, pp. 7-13,
2021.
- R. D. Riehle and J. B. Michael,
“Improving the trustworthiness of software through rigorous data type
design,” Computer, vol 54, no. 1, pp. 89-95, 2021.
- N. Thiem, M.
Orescanin, and J. B. Michael, “Reducing
artifacts in GAN audio synthesis,” in Proc. 19th Int. Conf.
on Machine Learning and Applications, Miami, Fla., pp. 1268-1275, Dec.
2020.
- J. B. Michael and J. Voas, “Algorithms, algorithms, algorithms,” Computer,
vol. 53, no. 11, pp. 13-15, 2020.
- J. B. Michael, R. Kuhn, and J. Voas, “Security or privacy: Can you have both? Computer,
vol. 53, no. 9, pp. 20-30, 2020.
- J. B. Michael, R. Kuhn, and J. Voas, “Cyberthreats in 2025,” Computer, vol.
53, no. 6, pp. 16-27, 2020.
- J. B. Michael, “Practical aspects of
employing antireverse engineering.” IT
Professional, vol. 22, no. 3, pp. 11-13, 2020.
- J. B. Michael, G. W. Dinolt, and D. Drusinsky,
“Open questions in formal methods,” Computer,
vol. 53, no. 5, pp. 81-84, 2020.
- D. Drusinsky and J. B. Michael, “Obtaining trust in
executable derivatives using crowdsourced critiques with blind
signatures,” Computer, vol. 43,
no. 4, pp. 51-56, 2020.
- L. E. Peitso and J. B. Michael, “The promise of interactive
shared augmented reality,” Computer,
vol. 53, no. 1, pp. 45-52, 2020.
- J. B. Michael,
“Trustworthiness of autonomous machines in armed conflict,” IEEE Security & Privacy, vol.
17, no. 6, pp. 4-6, 2019.
- J. B. Michael,
“Assessing the trustworthiness of electronic systems,” Computer, vol. 52, no. 11, pp.
80-83, 2019.
- Tallinn Manual 2.0 on
the International Law Applicable to Cyber Operations, M. N. Schmitt, gen.
ed., Cambridge University Press, Cambridge, U.K., 2nd ed. 2017.
__________________________
Last updated on 14 May 2024