James Bret Michael
Professor of Computer Science and
Electrical & Computer Engineering
Chair, Cyber Academic Group (https://nps.edu/web/cag)
Naval Postgraduate School (https://nps.edu/)
Email: bmichael@nps.edu
IEEE Fellow (effective January 1,
2023)
Associate Editor-in-Chief, Computer
(Electronic ISSN: 1558-0814)
See my official biographical
sketches at https://nps.edu/faculty-profiles/-/cv/bmichael and https://nps.edu/web/cag/faculty
ACADEMIC YEAR 2023 TEACHING
· CS3101,
Theory of Formal Languages and Automata
· EC3740,
Reverse Engineering in Electronic Systems
· CS3600, Introduction
to Computer Security
PATENTS
· D. Drusinsky, M. Litton, and J. B. Michael, 2023. Machine-learned
verification and advance notice oracles for autonomous systems. U.S.
provisional patent in the process of being filed.
·
D. Drusinsky and J. B.
Michael, 2021. Multiagent pathfinding for non-dynamic programming problems.
U.S. provisional patent filed 7 Dec. 2021.
SELECTED RECENT PUBLICATIONS
Over 300 publications, including
books, chapters, journal articles, conference papers, and technical reports.
- D. Drusinsky,
M. Litton, and J. B. Michael, “Machine-learned verification and advance
notice oracles for autonomous systems,” Computer, vol. 56, no. 7,
2023.
- T. C. Wingfield and J. B. Michael, “Waterfall:
Cascading effects of a strategic cyber campaign,” Computer, vol.
56, no. 4, pp. 143-148, 2023.
- Q. Lu, L. Zhu, J. Whittle, and J. B.
Michael, “Software engineering for responsible AI,” Computer, vol.
56, no. 4, pp. 13-16, 2023.
- J. Michael, D. Drusinsky,
and M. Litton, Update on machine-learned correctness properties, Tech.
report NPS-CS-23-001, Department of Computer Science, Naval Postgraduate
School, Monterey, Calif., Jan. 2023.
- D. Drusinsky,
J. B. Michael, M. Litton, “Machine-learned specifications for the
verification and validation of autonomous cyberphysical
systems,” in Proc. 33rd IEEE International Symposium on Software
Reliability Engineering, Charlotte, N.C., pp. 333-341, Nov. 2022.
- J. Weiss, M. Hood, N. Miller, C. Potorieko, and J. B. Michael, “Using machine learning
to work around the operational and cybersecurity limitations of legacy process
sensors,” Computer, vol. 55, no. 11, pp. 106-111, 2022.
- J. B. Michael, “Taking a measured
approach to investing in information infrastructure for attaining
leading-edge trustworthy artificial intelligence,” IEEE Security &
Privacy, vol. 20, no. 5, pp. 4-6, 2022.
- J. B. Michael, “Understanding
conversational artificial intelligence,” Computer, vol. 55, no. 9, pp.
115-119, 2022.
- J. B. Michael, G. C. Dinolt, F. B. Cohen, D. Wijesekera,
“Can you trust in Zero Trust,” Computer, vol. 55, no. 8, pp. 103-105,
2022.
- J. B. Michael, “Placing trust in
automated software development processes,” Computer, vol. 55, no.
7, pp. 78-81, 2022.
- J. B. Michael and M. Orescanin, “Developing and deploying artificial
intelligence systems,” Computer, vol. 55, no. 6, pp. 15-17, 2022.
- D. Drusinsky,
M. Litton, and J. B. Michael, “Lightweight verification and validation of cyberphysical systems using machine-learned
correctness properties,” Computer, vol 55, no. 2, pp. 102-108,
2022.
- J. B. Michael, “Trusting human-machine
teaming,” Computer, vol. 54, no. 11, pp. 104-107, 2021.
- J. B. Michael and T. C. Wingfield,
“Defensive AI: The future is yesterday,” Computer, vol. 54, no. 9,
pp. 90-96, 2021.
- J. B. Michael, D. Drusinsky,
and D. Wijesekera, “Formal verification of
cyber-physical systems,” Computer, vol. 54, no. 9, pp. 15-24, 2021.
- J. B. Michael, D. Drusinsky,
and D. Wijesekera, “Formal methods in
cyber-physical system,” Computer, vol. 54, no. 9, pp. 25-29, 2021.
- T. Carter, J. B. Michael, J. A. Kroll,
“Lessons learned from applying the NIST Privacy Framework,” IT
Professional, vol. 23, no. 4, pp. 9-13, 2021.
- M. J. Lanoue,
J. B. Michael, and C. A. Bollmann, “Spoofed networks: Exploitation of GNSS
security vulnerability in 4G and 5G mobile networks,” Int. Symp. on Performance Evaluation of Computer and Telecommunication
Systems Conf., Fairfax, Va., pp. 1-8, July 2021.
- D. Drusinsky
and J. B. Michael, “Multiagent pathfinding under rigid, optimization, and
uncertainty constraints,” Computer, vol 54, no. 7, pp. 111-118,
2021.
- J. Viega and J. B. Michael, “Struggling with supply-chain security,” Computer,
vol. 54, no. 7, pp. 98-104, 2021.
- J. B. Michael, “Security and privacy
for edge artificial intelligence,” IEEE Security & Privacy,
vol. 19, no. 4, pp. 4-7, 2021.
- J. A. Kroll, J. B. Michael, and D. B.
Thaw, “Enhancing cybersecurity via artificial
intelligence: Risks, rewards, and frameworks,” Computer, vol
54, no. 6, pp. 64-71, 2021.
- J. F. DeFranco,
C. S. Eagle, J. B. Michael, J. Viega, and J. M. Voas,
“Hackathons 101,” Computer, vol. 54, no. 5, pp. 65-69, 2021.
- P. Denning, D. Drusinsky,
and J. B. Michael, “Military intelligent systems pose
strategic dilemmas,” U.S. Naval Institute Proceedings, Apr.
2021.
- M. Lanoue,
C. A. Bollmann, J. B. Michael, J. D. Roth, and D. Wijesekera,
“An attack vector taxonomy for mobile telephony security vulnerabilities,”
Computer, vol. 54, no. 4, pp. 76-84, 2021.
- S. Peisert,
B. Schneier, H. Okhravi,
F. Massacci, T. Benzel,
C. Landwehr, M. Mannan, J. Mirkovic, A. Prakash,
and J. B. Michael, “Perspectives on the SolarWinds
incident,” IEEE Security & Privacy, vol.19, no.2, pp. 7-13,
2021.
- R. D. Riehle and J. B. Michael,
“Improving the trustworthiness of software through rigorous data type
design,” Computer, vol 54, no. 1, pp. 89-95, 2021.
- N. Thiem, M.
Orescanin, and J. B. Michael, “Reducing
artifacts in GAN audio synthesis,” in Proc. 19th Int. Conf.
on Machine Learning and Applications, Miami, Fla., pp. 1268-1275, Dec.
2020.
- J. B. Michael and J. Voas, “Algorithms, algorithms, algorithms,” Computer,
vol. 53, no. 11, pp. 13-15, 2020.
- J. B. Michael, R. Kuhn, and J. Voas, “Security or privacy: Can you have both? Computer,
vol. 53, no. 9, pp. 20-30, 2020.
- J. B. Michael, R. Kuhn, and J. Voas, “Cyberthreats in 2025,” Computer, vol.
53, no. 6, pp. 16-27, 2020.
- J. B. Michael, “Practical aspects of
employing antireverse engineering.” IT
Professional, vol. 22, no. 3, pp. 11-13, 2020.
- J. B. Michael, G. W. Dinolt, and D. Drusinsky,
“Open questions in formal methods,” Computer,
vol. 53, no. 5, pp. 81-84, 2020.
- D. Drusinsky and J. B. Michael, “Obtaining trust in
executable derivatives using crowdsourced critiques with blind
signatures,” Computer, vol. 43,
no. 4, pp. 51-56, 2020.
- L. E. Peitso and J. B. Michael, “The promise of interactive
shared augmented reality,” Computer,
vol. 53, no. 1, pp. 45-52, 2020.
- J. B. Michael,
“Trustworthiness of autonomous machines in armed conflict,” IEEE Security & Privacy, vol.
17, no. 6, pp. 4-6, 2019.
- J. B. Michael,
“Assessing the trustworthiness of electronic systems,” Computer, vol. 52, no. 11, pp.
80-83, 2019.
- Tallinn Manual 2.0 on
the International Law Applicable to Cyber Operations, M. N. Schmitt, gen.
ed., Cambridge University Press, Cambridge, U.K., 2nd ed. 2017.
__________________________
Last updated on 9 June 2023