Research - Computer Science
Computer Science Research
Much of our research is multidisciplinary, involving students and faculty from mathematics, electrical engineering, mechanical engineering, and physics. Our research environment is unique in its blend of theory and practice, and with students' determination to put their thesis results into practice. Many of our student theses have led to publications in major conferences and frequent best-paper awards. We have 6 major categories: Cyber Security and Defense, Network, Mobility, Autonomous Systems, Data Science, and Software Engineering.
Cyber Security and Defense (CSD)
Provides knowledge in all areas of Information Security (INFOSEC) and develops the necessary skills for those who will be involved in development, evolution, or implementation of secure computer systems.
Provides fundamental and advanced knowledge in network architecture and system software for real-time and multicomputer systems and in the rapidly growing areas of wireless networking, mobile devices, and related topics, including mobile computing and wireless security.
Provides an understanding of artificial intelligence and human factors techniques for creating highly capable software agents that interact effectively with human users.
Provides knowledge of all aspects of software development and develops skills needed to efficiently and reliably implement military systems and application software using the best available tools and techniques.
- Department of Defense
- The Defense Advanced Research Projects Agency (DARPA)
- National Security Agency
- National Science Foundation
- Air Force Institute of Technology
- Office of Naval Research
- Space and Naval Warfare Systems Command
- Department of the Navy Chief Information Officer
- Defense Information Systems Agency
2021 CS Department Publications
B. Hale. Escaping the Innovation Bunker. In Proceedings of U.S. Naval Institute (USNI) 2021.
C. Cremers, B. Hale, K. Kohbrok. The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter. In Proceedings of USENIX 2021.
B. Dowling and B. Hale. Secure Messaging Authentication against Active Man-in-the-Middle Attacks. In Proceedings of IEEE EuroS&P 2021.
B. Hale, D. J. Van Bossuyt, N. Papakonstantinou, and O’Halloran. A Zero-Trust Methodology for Security of Complex Systems With Machine Learning Components. In Proceedings of the ASME 2021 IDETC/CIE2021.
M. Sjoholmsierchio, B. Hale, D. Lukaszewski, and G. Xie. Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. In IEEE NetSoft. 2021.
N. Papakonstantinou, D. J. Van Bossuyt, J. Linnosmaa, B. Hale, B. and O’Halloran. A Zero Trust Hybrid Security and Safety Risk Analysis Method. In Proceedings of the Journal of Computing and Information Science in Engineering (JCISE) 2021.
D. Brutzman, T. Norbraten, J. Culbert, and B. Hale. Blockchain Mergence for Distributed Ledgers Supporting Fleet Logistics and Maintenance. In Acquisition Research Symposium 2021.
M. Troncoso and B. Hale. The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. In NDSS 2021.
D. Drusinsky, Who Is Authenticating My E-Commerce Logins? Computer 54 (04), 49-54.
P. Denning, D. Drusinsky, J. B. Michael, Military Intelligent Systems Pose Strategic Dilemmas, In Proceedings of U.S. Naval Institute, Vol. 147/4/1,418 April 27, 2021
Kroll, J.A., 2021, March. Outlining Traceability: A Principle for Operationalizing Accountability in Computing Systems. In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency (pp. 758-771).
J. A. Kroll, J. B. Michael, D. B. Thaw. “Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks”, Computer, June 2021.
T. Carter, J. B. Michael, J. A. Kroll, “Lessons Learned from Applying the NIST Privacy Framework”, IT Professional, July 2021.
Blais, C., "Extending the Command and Control System to Simulation System Interoperation (C2SIM) Standard to Address Exchange of Cybersecurity Information," 2021-SIW-010, Simulation Innovation Workshop, Simulation Interoperability Standards Organization. February 2021.
Blais, C., Dechand, M., Dembach, M., and Singapogu, S., "The Use of Automated Reasoning with the Command and Control System to Simulation System Interoperation (C2SIM) Standard," 2021-SIW-010, Simulation Innovation Workshop, Simulation Interoperability Standards Organization, February 2021.
2020 CS Department Publications
Brett Rajchel, John V. Monaco, Gurminder Singh, Angela Hu, Jarrod Shingleton and Thomas Anderson. Temporal Behavior in Network Traffic as a Basis for Insider Threat Detection. 2020 IEEE Symposium Series on Computational Intelligence (SSCI 2020).
Alejandro Acien, John V. Monaco, Aythami Morales, Ruben Vera-Rodriguez, Julian Fierrez. TypeNet: Scaling up Keystroke Biometrics. 2020 International Joint Conference on Biometrics (IJCB 2020).
Aythami Morales, Alejandro Acien, Julian Fierrez, John V. Monaco, Ruben Tolosana, Ruben Vera-Rodriguez, Javier Ortega-Garcia. Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic. 2020 IEEE Annual Computers, Software, and Applications Conference (COMPSAC 2020).
John V. Monaco, Ryad B Benosman. General Purpose Computation with Spiking Neural Networks: Programming, Design Principles, and Patterns. 2020 Neuro-inspired Computational Elements Workshop (NICE 2020).
John V. Monaco. Bug or Feature? Covert Impairments to Human Computer Interaction. 2020 ACM Conference on Human Factors in Computing Systems (CHI 2020).
Luckie, Matthew, Robert Beverly, Ryan Koga, Ken Keys, Joshua A. Kroll, and K. Claffy. "Network hygiene, incentives, and regulation: deployment of source address validation in the Internet." In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 465-480. 2019.
Kroll, Joshua A. “Accountability in Computer Systems” In Oxford Handbook of the Ethics of AI, Markus Dubber, Frank Pasquale, and Sunit Das, Eds. Oxford University Press, 2020.
T. D. Nguyen, S. C. Austin, and C. E. Irvine, “A strategy for security testing industrial firewalls,” in Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop, ICSS, (New York, NY, USA), pp. 38–47, Association for Computing Machinery, December 2019.
Matthew Timmerman, Amela Sadagic, and Cynthia E. Irvine, “Peering Under the Hull: Enhanced Decision Making via an Augmented Environment.” IEEE Conference on Virtual Reality and 3D User Interfaces - IEEE VR 2020, Atlanta, GA, USA, March 2020, DOI: 10.1109/VR46266.2020.00093
Kayla N. Afanador and Cynthia E. Irvine, Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT). In 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20). USENIX Association. https://www. Usenix.org/conference/cset20/presentation/afanador
L. E. Peitso and J. B. Michael, “The Promise of Interactive Shared Augmented Reality,” Computer, vol. 53, no. 1, Jan. 2020, pp. 45-52
D. Drusinsky and J. B. Michael, “Obtaining Trust in Executable Derivatives Using Crowdsourced Critiques with Blind Signatures,” Computer, vol. 53, no. 4, April 2020, pp. 51-56
J. B. Michael, G. W. Dinolt, and D. Drusinsky, “Open Questions in Formal Methods,” Computer, vol. 53, no. 5, May 2020, pp. 81-84
J. B. Michael, R. Kuhn, and J. Voas, “Cyberthreats in 2025,” Computer, vol 53, no. 6, June 2020, pp. 16-27.
J. B. Michael, R. Kuhn, and J. Voas, “Security or Privacy: Can You Have Both?” Computer, vol. 53, no. 9, Sept. 2020, pp. 20-30.
R. D. Riehle and J. B. Michael, “Improving the Trustworthiness of Software through Rigorous Data Type Design,” Computer, vol. 54, no. 1, Jan. 2021.
S. Miller, C. Blais, and J. Green, Modeling the Operational Value of Data Fusion on ASW and Other Missions, Technical Report NPS-IS-20-004, Naval Postgraduate School, Oct. 2020.
P. Denning and Ted Lewis. Uncertainty. In Best Writings in Mathematics 2020, (Mircea Pitici, ed.) Princeton University Press 2020. Original paper in Communications of ACM 62, 12 (Dec 2019), 26-28.
P. Denning and D. Denning. Dilemmas of artificial intelligence. Communications of ACM 63, 3 (March 2020), 26-28.
P. Denning. Technology Adoption (with Ted Lewis). Communications of ACM 63, 6 (June 2020), 27-29.
P. Denning. Avalanches make us all innovators. Communications of ACM 63, 9 (September 2020), 32-34.
P. Denning. Navigating in real-time environments (with Jim Selman). Communications of ACM 63, 12 (December 2020), 26-28.
Computer Science Department
Address: Computer Science Dept., Glasgow Hall East, Building 305, Room 311, 1411 Cunningham Rd, Monterey, CA, 93943
Phone: Admin: 831.656.3389, DSN 756-, Program Office: 831.656.7980/7981, DSN 756-.
Fax: Admin: 831. 656.2814, DSN 756-, Program Office:831.656.3681, DSN 756-
Email: The following email addresses can be reached using the '@nps.edu' suffix: Chairman - CS_Chair, Program Officer - ProgramOfficer_CS, Computer Science Academic Associate - AcademicAssociate_CS, Software Engineering Academic Associate - AcademicAssociate_SE, Computer Science Search Committee - cssrch, Additional contact information is available for CS Department faculty members.