Photo of COL Thomas Babbit

COL Tom Babbitt

Director, Cyber Research Center

Associate Professor


COL Tom Babbitt is an Infantry Officer and former Information System Management Officer (FA53). His assignments include Rifle Platoon Leader, Rifle Company Executive Officer and Support Platoon Leader in 1st Battalion, 14th Infantry Regiment, 25th Infantry Division, Schofield Barracks, Hawaii; Assistant Battalion S3 and Charlie Company Commander, 4th Battalion, 23d Infantry Regiment, 172d Stryker Brigade Combat Team, Fort Richardson, Alaska; Information Systems Management Officer in the C2IN Cell, Early Entry Command Post, U.S. Army Pacific, Fort Richardson, Alaska; Instructor and Assistant Professor in the Department of Electrical Engineering and Computer Science, USMA, West Point, NY; and Future Operations and Plans OIC in the Southwest Asia Cyber Center, Camp Arifjan, Kuwait. COL Babbitt is a graduate of the Command and General Staff College, Combined Arms and Staff School, Infantry Captains Career Course, Infantry Officer Basic Course, Airborne and Air Assault School. He deployed to Bosnia-Herzegovina in support of Operation Joint Forge in 2002, to Iraq in support of Operation Iraqi Freedom from August 2005 to November 2006 and Kuwait from July 2012 to July 2013. His academic interests include Network Protocols, Network Security, and Cyber Policy.

Publications & Presentations

C. Johnson, B. Curtin, N. Shyamkumar, R. David, E. Dunham, P. C. Haney, H. L. Moore, Jr., T. A. Babbitt, and S. J. Matthews, “A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security,” in 2019 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, pp. 0001-0007 Oct. 2019.

E. M. Sturzinger, D. S. Hawthorne, and T. A. Babbitt, “Hacking the Non-Technical Brain: Maximizing Retention in a Core Introductory IT Course: A Quantitative Study on the Performance Impacts of High-Frequency, No-Risk Quizzing,” in Proceedings of the 20th Annual SIG Conference on Information Technology Education (SIGITE '19). Tacoma, WA, USA, Oct. 19, pp. 112-117. 

B. H. Curtin, R. H. David, E. D. Dunham, C. D. Johnson, N. Shyamkumar, T. A. Babbitt, and S. J. Matthews, “Designing a Raspberry Pi sensor network for remote observation of wildlife,” in Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (HotSoS '19), Nashville, Tennessee ACM, USA, Apr. 2019, Article 17, 2 pages.

T. Babbitt, C. Schooler, and K. King, “Punch Cards to Python: A Case Study of a CS0 Core Course,” in Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE '19), Minneapolis, MN, USA, Mar. 2019, pp. 811-817.

T. A. Babbitt and B. K. Szymanski, “Trust based secure routing in delay tolerant networks,” in Eighth IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2016), San Francisco, USA, Apr. 2016, pp. 846–851.

T. A. Babbitt and B. K. Szymanski, “Trust metric integration in resource constrained networks via data fusion,” in 18th International Conference on Information Fusion (Fusion 2015), Washington, USA, Jul. 2015, pp. 582–589.

T. A. Babbitt and B. K. Szymanski, “Trust management in delay tolerant networks utilizing erasure coding,” in IEEE ICC 2015 - Ad-hoc and Sensor Networking Symposium (ICC’15 (09) AHSN), London, United Kingdom, Jun. 2015, pp. 7959–7965.

T. A. Babbitt and B. K. Szymanski, “Trust management in resource constraint networks,” in Proceedings of the 10th Annual Symposium on Information Assurance (ASIA ’15), Albany, NY, Jun. 2015, pp. 51– 56.

M. Love, M. Greene, H. Burgess, M. Luehrmann, S. Mead, and T. Babbitt, “Airborne geo-location for search and rescue applications,” in Proceedings of the 3rd International Conference on Computing for Geospatial Research and Applications, ser. COM.Geo ’12, Washington, D.C., USA: ACM, Jun. 2012, 29:1–29:6.

G. Conti, T. Babbitt, and J. Nelson, “Hacking competitions and their untapped potential for security education,” Security Privacy, IEEE, vol. 9, no. 3, pp. 56–59, May 2011.

T. Babbitt, C. Morrell, and B. Szymanski, “Self-selecting reliable path routing in diverse wireless sensor network environments,” Computers and Communications, 2009. ISCC 2009. IEEE Symposium on, pp. 1–7, Jul. 2009.

B. K. Szymanski, C. Morrell, S. C. Geyik, and T. Babbitt, “Bio-inspired computing and communication: First workshop on bio-inspired design of networks, biowire 2007 cambridge, uk, april 2-5, 2007 revised selected papers,” in, P. Li`o, E. Yoneki, J. Crowcroft, and D. C. Verma, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, ch. Biologically Inspired Self Selective Routing with Preferred Path Selection, pp. 229–240.

T. A. Babbitt, C. Morrell, B. K. Szymanski, and J. W. Branch, “Self-selecting reliable paths for wireless sensor network routing,” Computer Communications, vol. 31, no. 16, pp. 3799–3809, Oct. 2008.