Bruce Caulkins

Bruce Caulkins is a Research Assistant Professor and Director of the Modeling & Simulation (M&S) of Behavioral Cybersecurity Program at the Institute for Simulation & Training (IST) at the University of Central Florida (UCF). He is a retired Army Colonel with over 28 years of experience in tactical, operational, and strategic communications and cyberspace operations. In his last military assignment, he was the Chief of the Cyber Strategy, Plans, Policy, and Exercises Division (J65) within the U.S. Pacific Command. In this capacity, he gained extensive insight into cyber capabilities, operational requirements, combatant command requirements, coalition and partner cyber/communications interoperability, and human factor requirements. He also led over a dozen coalition and partner interoperability exercises, to include the HADR-focused PACIFIC ENDEAVOR. Bruce previously taught at and ran several communications and cyber-related schools within the Army’s Training and Doctrine Command. He earned his Ph.D. in Modeling and Simulation at the University of Central Florida, focusing on anomaly detection within intrusion-detection systems. His research interests include behavioral aspects of cybersecurity; threat modeling; cyber workforce development; anomaly detection; cyber security and analysis; cyber education and training methodologies; predictive modeling; data mining; cyber strategy; and, cyber policy.


  • Ph.D. Modeling and Simulation, University of Central Florida, Orlando, FL, December 2005, Dissertation: Session-Based Intrusion Detection System to Map Anomalous Network Traffic
  • M.S. Computer Science, University of Central Florida, Orlando, FL, 2005
  • M.SST. Strategic Studies, United States Army War College, Carlisle, PA, June 2009
  • B.S. Computer Science-Mathematics, Furman University, Greenville, SC, December 1986

Research Topics

  • Behavioral Cybersecurity
  • Threat modeling
  • Cyber Workforce Development
  • Proactive cyber defense
  • Cyber Strategy, Policy, and Legal Issues
  • Cyber Modeling for Zero Day Attacks
  • Simulation, Modeling, and Analysis

Courses taught requiring students to produce research papers:

Dr. Bruce Caulkins has taught the following graduate courses that require students to complete several papers researching on cybersecurity-related topics:

  • IDC 5602 – Cybersecurity: A Multidisciplinary Approach
  • IDC 6601 – Behavioral Aspects of Cybersecurity
  • IDS 6916 – Simulation Research Methods and Practicum (Cyber focus)


  • Caulkins, B. D., Leis, R., Badillo-Urquiola, K., Bockelman, P. (2016, October). Cyber workforce development using a behavioral cybersecurity paradigm. In Proceedings of the CyCon US 2016 Conference. Washington, D.C.

  • Leis, R., Badillo-Urquiola, K., Caulkins, B. D., Bockelman, P. (2016, November). Modeling and simulation education for behavioral cybersecurity. In Proceedings of the Interservice/Industry, Training, Simulation and Education Conference (I/ITSEC). Orlando, FL.

  • Caulkins, B. (2012). The future of military mobile computing. Army Communicator, Vol. 37, No. 2, Augusta, GA.

  • Caulkins, B., Moelter, J., Massie, T. (2011, August). Army cellular capability development strategy: vision for the future of Army mobile computing. Association of Old Crows.

  • Caulkins, B. (2009, October). Proactive self-defense in cyberspace. Institute for Land Warfare Paper #72, Association of the United States Army (AUSA). Washington, D.C.

  • Caulkins, B., Berry, A. (2006). Change is one constant for FA53 officer training. Army Communicator, Vol. 31, No. 2. Augusta, GA

  • Caulkins, B., Lee, J., Wang, M. (2006, March). Bootstrapping methodology for the session based anomaly notification detector (SAND), In Proceedings of the 44th annual Southeast regional conference (pp.175-179). ACM.

  • Caulkins, B., Lee, J., Wang, M. (2005, April). Packet- vs. session-based modeling for intrusion detection systems. In International Conference on Information Technology: Coding and Computing (ITCC ‘05) – Volume II (Vol. 1, pp. 116-121. IEEE.

  • Caulkins, B., Lee, J., Wang, M. (2005, March). A dynamic data mining technique for intrusion detection systems. In Proceedings of 43rd annual Southeast regional conference-Volume 2 (pp. 148-153). ACM.