PUBLICATIONS

Research

Peer-reviewed papers on AI orchestration, synthetic identity detection, anticipatory cyber defense, and internet trust systems. All published via Zenodo with permanent DOIs.

PUB_01 — 2025 DOI: 10.5281/zenodo.18501586

The Helical Pipeline Architecture

A compounding multi-layer agent orchestration framework for autonomous SaaS platform construction. Introduces four-stage helical pipelines (FORGE, DEFINE, BUILD, VERIFY) with DAG-based scheduling and gradient auto-compaction.

Implemented in Helical Pipeline Architecture • Powers the orchestration layer for cross-model verification

Read on Zenodo open_in_new
PUB_02 — 2025 DOI: 10.5281/zenodo.18520205

Predictive Augmentation for Anticipatory Cyber Defense

Explores predictive augmentation techniques for proactive cyber defense, using AI-driven threat modeling to anticipate attack vectors before they materialize in production environments.

Applied in Helix Fabric threat anticipation layer • See temporal integrity checks (proposition 25)

Read on Zenodo open_in_new
PUB_03 — 2025 DOI: 10.5281/zenodo.18520286

Helix Fabric v2: Meta-Orchestrator

Demonstrates that AI can fabricate a completely believable organization — nine synthetic executives with digital provenance — for under $250. Presents an 8-signature detection engine and full defense playbook.

Core implementation: Helix Fabric • Foundational evidence for The Structural Credibility Gap (propositions 12–16)

Read on Zenodo open_in_new
PUB_04 — 2025 DOI: 10.5281/zenodo.18520609

Synthetic Organizational Depth

Examines how synthetic organizations can achieve structural depth indistinguishable from legitimate institutions, and proposes verification frameworks for institutional authenticity assessment.

Framework applied in structural due diligence module • Extends propositions 10–14 on recursive validation

Read on Zenodo open_in_new
PUB_05 — 2025 DOI: 10.5281/zenodo.18521459

Full-Spectrum Synthetic Organizations

Comprehensive analysis of full-spectrum synthetic organization creation and detection, covering the complete attack surface from personnel generation to infrastructure simulation.

Detection methodology: multi-signal detection frameworks • Operationalized in Helix Fabric scanner fleet

Read on Zenodo open_in_new
PUB_06 — 2025 DOI: 10.5281/zenodo.18645301

Entity-Level Deepfakes and Intellectual Provenance

Introduces the concept of entity-level deepfakes — fabricated institutions rather than individual media — and proposes intellectual provenance systems for verifying organizational authenticity at scale.

Provenance architecture: provenance infrastructure • Origin of The Structural Credibility Gap framework

Read on Zenodo open_in_new