Michael R. Grimaila

Orcid: 0000-0002-8355-7992

Affiliations:
  • Texas A&M University, College Station, Texas, USA


According to our database1, Michael R. Grimaila authored at least 73 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Toward a Simulation Model Complexity Measure.
Inf., April, 2023

Quantifying DDS-cerberus network control overhead.
J. Supercomput., March, 2023

Distribution of DDS-cerberus authenticated facial recognition streams.
J. Supercomput., 2023

ADS-B classification using multivariate long short-term memory-fully convolutional networks and data reduction techniques.
J. Supercomput., 2023

2021
Prediction and Convergence Calculations using Rust-based NAlgebra GLM.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Sequence Pattern Mining with Variables.
IEEE Trans. Knowl. Data Eng., 2020

2018
Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce.
IT Prof., 2018

A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
System-level considerations for modeling space-based quantum key distribution architectures.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

2016
Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals.
IT Prof., 2016

Using Modeling and Simulation to Study Photon Number Splitting Attacks.
IEEE Access, 2016

Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.
Proceedings of the Critical Infrastructure Protection X, 2016

2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.
IEEE Trans. Dependable Secur. Comput., 2015

Performance Evaluations of Quantum Key Distribution System Architectures.
IEEE Secur. Priv., 2015

Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++.
CoRR, 2015

Quantum key distribution: examination of the decoy state protocol.
IEEE Commun. Mag., 2015

A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities.
IEEE Access, 2015

2014
Evaluation of security solutions in the SCADA environment.
Data Base, 2014

Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection VIII, 2014

REDIR: Automated static detection of obfuscated anti-debugging techniques.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Narratives as a Fundamental Component of Consciousness.
Proceedings of the 2014 Workshop on Computational Models of Narrative, 2014

2013
Malware Target Recognition of Unknown Threats.
IEEE Syst. J., 2013

A hybrid dynamic decision making methodology for defensive information technology contingency measure selection in the presence of cyber threats.
Oper. Res., 2013

Mission Assurance Challenges within the Military Environment.
Int. J. Interdiscip. Telecommun. Netw., 2013

Enhancing the security of aircraft surveillance in the next generation air traffic control system.
Int. J. Crit. Infrastructure Prot., 2013

2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012

Malware target recognition via static heuristics.
Comput. Secur., 2012

Measuring Impact on Missions and Processes: Assessment of Cyber Breaches.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Eliciting a Sensemaking Process from Verbal Protocols of Reverse Engineers.
Proceedings of the 34th Annual Meeting of the Cognitive Science Society, 2012

2011
Log-Based Distributed Security Event Detection Using Simple Event Correlator.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

An empirical analysis of the cascade error reconciliation protocol for quantum key distribution.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Design considerations for a case-based reasoning engine for scenario-based cyber incident notification.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

A scalable architecture for improving the timeliness and relevance of cyber incident notifications.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Addressing the need for independence in the CSE model.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Mitigating Security Risks for End User Computing Application (EUCA) Data.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Malware Type Recognition and Cyber Situational Awareness.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP).
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Using logic-based reduction for adversarial component recovery.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking.
Proceedings of the 2010 International Conference on Security & Management, 2010

Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods.
Proceedings of the 2010 International Conference on Security & Management, 2010

Achieving Situational Awareness in Extreme Events.
Proceedings of the 2010 International Conference on Security & Management, 2010

Mission Assurance: Issues and Challenges.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Java based component identification tool for measuring the strength of circuit protections.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Adding value to log event correlation using distributed techniques.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Mission assurance: challenges and opportunities.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Security Management Life Cycle (SMLC): A Comparative Study.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
A security policy language for wireless sensor networks.
J. Syst. Softw., 2009

Towards a Taxonomy of Wired and Wireless Anonymous Networks.
Proceedings of IEEE International Conference on Communications, 2009

Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process.
Proceedings of the 2009 International Conference on Security & Management, 2009

Towards insider threat detection using web server logs.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Towards a Tree-Based Taxonomy of Anonymous Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary.
Proceedings of the 2008 IEEE International Performance, 2008

Biometric enhancements: Template aging error score analysis.
Proceedings of the 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), 2008

Improving the cyber incident mission impact assessment (CIMIA) process.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

A survey of state-of-the-art in anonymity metrics.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007

Management of Information Security: Challenges and Research Directions.
Commun. Assoc. Inf. Syst., 2007

The Use of Attack and Protection Trees to Analyze Security for an Online Banking System.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Towards an Information Asset-Based Defensive Cyber Damage Assessment Process.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

2006
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006

2005
Enterprise computing: economies and diseconomies of scale in server price/performance relationships.
IEEE Trans. Engineering Management, 2005

An optimal test pattern selection method to improve the defect coverage.
Proceedings of the Proceedings 2005 IEEE International Test Conference, 2005

An Enterprise Level Security Requirements Specification Model.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
Maximizing Business Information Security's Educational Value.
IEEE Secur. Priv., 2004

2003
Minimizing Defective Part Level Using a Linear Programming-Based Optimal Test Selection Method.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
An Undergraduate Business Information Security Course and Laboratory.
J. Inf. Syst. Educ., 2002

A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults.
Proceedings of the 2002 Design, 2002

2001
Defect-Oriented Testing and Defective-Part-Level Prediction.
IEEE Des. Test Comput., 2001

2000
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D.
Proceedings of the Proceedings IEEE International Test Conference 2000, 2000

On the superiority of DO-RE-ME/MPG-D over stuck-at-based defective part level prediction.
Proceedings of the 9th Asian Test Symposium (ATS 2000), 4-6 December 2000, Taipei, Taiwan, 2000

1999
REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experimen.
Proceedings of the 17th IEEE VLSI Test Symposium (VTS '99), 1999

Modeling the probability of defect excitation for a commercial IC with implications for stuck-at fault-based ATPG strategies.
Proceedings of the Proceedings IEEE International Test Conference 1999, 1999


  Loading...