default search action
Michael R. Grimaila
Person information
- affiliation: Texas A&M University, College Station, Texas, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j27]J. Scott Thompson, Douglas D. Hodson, Michael R. Grimaila, Nicholas Hanlon, Richard Dill:
Toward a Simulation Model Complexity Measure. Inf. 14(4): 202 (2023) - [j26]Sarah Bolton, Richard Dill, Michael R. Grimaila, Douglas D. Hodson:
ADS-B classification using multivariate long short-term memory-fully convolutional networks and data reduction techniques. J. Supercomput. 79(2): 2281-2307 (2023) - [j25]Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry:
Distribution of DDS-cerberus authenticated facial recognition streams. J. Supercomput. 79(3): 3471-3488 (2023) - [j24]Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry:
Quantifying DDS-cerberus network control overhead. J. Supercomput. 79(4): 3616-3642 (2023) - 2021
- [c45]Noah W. Scott, Douglas D. Hodson, Richard Dill, Michael R. Grimaila:
Prediction and Convergence Calculations using Rust-based NAlgebra GLM. CSCI 2021: 1800-1804 - 2020
- [j23]James S. Okolica, Gilbert L. Peterson, Robert F. Mills, Michael R. Grimaila:
Sequence Pattern Mining with Variables. IEEE Trans. Knowl. Data Eng. 32(1): 177-187 (2020)
2010 – 2019
- 2018
- [j22]Logan O. Mailloux, Michael R. Grimaila:
Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce. IT Prof. 20(3): 23-30 (2018) - [c44]Martin Trae Span, Logan O. Mailloux, Michael R. Grimaila, William Bill Young:
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems. Cyber Security 2018: 1-8 - 2017
- [c43]Logan O. Mailloux, Benjamin N. Sargeant, Douglas D. Hodson, Michael R. Grimaila:
System-level considerations for modeling space-based quantum key distribution architectures. SysCon 2017: 1-6 - 2016
- [j21]Logan O. Mailloux, Douglas D. Hodson, Michael R. Grimaila, Ryan D. L. Engle, Colin V. McLaughlin, Gerald B. Baumgartner:
Using Modeling and Simulation to Study Photon Number Splitting Attacks. IEEE Access 4: 2188-2197 (2016) - [j20]Logan O. Mailloux, Charlton D. Lewis II, Casey Riggs, Michael R. Grimaila:
Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals. IT Prof. 18(5): 42-47 (2016) - [c42]Michael Quigg, Juan Lopez Jr., Mason Rice, Michael R. Grimaila, Benjamin W. P. Ramsey:
Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment. Critical Infrastructure Protection 2016: 3-25 - 2015
- [j19]Logan O. Mailloux, Jeffrey D. Morris, Michael R. Grimaila, Douglas D. Hodson, David R. Jacques, John M. Colombi, Colin V. McLaughlin, Jennifer A. Holes:
A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities. IEEE Access 3: 110-130 (2015) - [j18]Logan O. Mailloux, Michael R. Grimaila, John M. Colombi, Douglas D. Hodson, Ryan D. L. Engle, Colin V. McLaughlin, Gerald Baumgartner:
Quantum key distribution: examination of the decoy state protocol. IEEE Commun. Mag. 53(10): 24-31 (2015) - [j17]Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Gerald Baumgartner, Colin McLaughlin:
Performance Evaluations of Quantum Key Distribution System Architectures. IEEE Secur. Priv. 13(1): 30-40 (2015) - [j16]Benjamin W. P. Ramsey, Barry E. Mullins, Michael A. Temple, Michael R. Grimaila:
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation. IEEE Trans. Dependable Secur. Comput. 12(5): 585-596 (2015) - [i1]Ryan D. L. Engle, Douglas D. Hodson, Michael R. Grimaila, Logan O. Mailloux, Colin V. McLaughlin, Gerald Baumgartner:
Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++. CoRR abs/1509.03091 (2015) - 2014
- [j15]Robert D. Larkin, Juan Lopez Jr., Jonathan W. Butts, Michael R. Grimaila:
Evaluation of security solutions in the SCADA environment. Data Base 45(1): 38-53 (2014) - [c41]Sandra L. Vaughan, Robert F. Mills, Michael R. Grimaila, Gilbert L. Peterson, Steven K. Rogers:
Narratives as a Fundamental Component of Consciousness. CMN 2014: 246-250 - [c40]Adam J. Smith, Robert F. Mills, Adam R. Bryant, Gilbert L. Peterson, Michael R. Grimaila:
REDIR: Automated static detection of obfuscated anti-debugging techniques. CTS 2014: 173-180 - [c39]Richard Agbeyibor, Jonathan Butts, Michael R. Grimaila, Robert F. Mills:
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection. Critical Infrastructure Protection 2014: 245-261 - 2013
- [j14]Cindy Finke, Jonathan Butts, Robert F. Mills, Michael R. Grimaila:
Enhancing the security of aircraft surveillance in the next generation air traffic control system. Int. J. Crit. Infrastructure Prot. 6(1): 3-11 (2013) - [j13]Scott Musman, Michael R. Grimaila:
Mission Assurance Challenges within the Military Environment. Int. J. Interdiscip. Telecommun. Netw. 5(2): 51-65 (2013) - [j12]Michael R. Grimaila, Adedeji B. Badiru:
A hybrid dynamic decision making methodology for defensive information technology contingency measure selection in the presence of cyber threats. Oper. Res. 13(1): 67-88 (2013) - [j11]Thomas E. Dube, Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer Jr., Steven K. Rogers:
Malware Target Recognition of Unknown Threats. IEEE Syst. J. 7(3): 467-477 (2013) - 2012
- [j10]Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers:
Malware target recognition via static heuristics. Comput. Secur. 31(1): 137-147 (2012) - [j9]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Michael R. Grimaila, Barry E. Mullins:
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics. IEEE Commun. Surv. Tutorials 14(2): 579-606 (2012) - [c38]Adam R. Bryant, Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila:
Eliciting a Sensemaking Process from Verbal Protocols of Reverse Engineers. CogSci 2012 - [c37]Joobin Choobineh, Evan E. Anderson, Michael R. Grimaila:
Measuring Impact on Missions and Processes: Assessment of Cyber Breaches. HICSS 2012: 3307-3316 - 2011
- [c36]Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila:
Addressing the need for independence in the CSE model. CICS 2011: 68-75 - [c35]James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas:
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. CICS 2011: 76-83 - [c34]Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas:
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. CICS 2011: 84-91 - [c33]Timothy Calver, Michael R. Grimaila, Jeffrey W. Humphries:
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution. CSIIRW 2011: 58 - [c32]Justin Myers, Michael R. Grimaila, Robert F. Mills:
Log-Based Distributed Security Event Detection Using Simple Event Correlator. HICSS 2011: 1-7 - 2010
- [c31]Joobin Choobineh, Evan E. Anderson, Michael R. Grimaila:
Security Management Life Cycle (SMLC): A Comparative Study. AMCIS 2010: 406 - [c30]Michael R. Grimaila:
Mission assurance: challenges and opportunities. CSIIRW 2010: 14 - [c29]James D. Parham, Jeffrey Todd McDonald, Michael R. Grimaila, Yong C. Kim:
A Java based component identification tool for measuring the strength of circuit protections. CSIIRW 2010: 26 - [c28]Justin Myers, Michael R. Grimaila, Robert F. Mills:
Adding value to log event correlation using distributed techniques. CSIIRW 2010: 32 - [c27]Joseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila:
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining. CSIIRW 2010: 74 - [c26]Vinod Naga, John M. Colombi, Michael R. Grimaila, Kenneth M. Hopkinson:
Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods. Security and Management 2010: 529-535 - [c25]Tay Johannes, Michael R. Grimaila:
Achieving Situational Awareness in Extreme Events. Security and Management 2010: 536-541 - [c24]David Sorrels, Michael R. Grimaila:
Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking. Security and Management 2010: 542-547 - [c23]Michael R. Grimaila, Robert F. Mills, Michael W. Haas, Douglas J. Kelly:
Mission Assurance: Issues and Challenges. Security and Management 2010: 651-657 - [c22]Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila:
Using logic-based reduction for adversarial component recovery. SAC 2010: 1993-2000 - [c21]Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers:
Malware Type Recognition and Cyber Situational Awareness. SocialCom/PASSAT 2010: 938-943 - [c20]Robert K. Abercrombie, Frederick T. Sheldon, Michael R. Grimaila:
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP). SocialCom/PASSAT 2010: 1153-1158 - [c19]Abhijit Kulkarni, Emilio Williams, Michael R. Grimaila:
Mitigating Security Risks for End User Computing Application (EUCA) Data. SocialCom/PASSAT 2010: 1171-1176 - [e1]Hamid R. Arabnia, Kevin Daimi, Michael R. Grimaila, George Markowsky, Selim Aissi, Victor A. Clincy, Leonidas Deligiannidis, Donara Gabrielyan, Gevorg Margarov, Ashu M. G. Solo, Craig Valli, Patricia A. H. Williams:
Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2010, ISBN 1-60132-163-5 [contents]
2000 – 2009
- 2009
- [j8]David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. J. Syst. Softw. 82(1): 101-111 (2009) - [c18]Douglas J. Kelly, Richard A. Raines, Rusty Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Tree-Based Taxonomy of Anonymous Networks. CCNC 2009: 1-2 - [c17]Justin Myers, Michael R. Grimaila, Robert F. Mills:
Towards insider threat detection using web server logs. CSIIRW 2009: 54 - [c16]Michael R. Grimaila, Larry Fortson, Janet Sutton:
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. Security and Management 2009: 386-391 - [c15]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Taxonomy of Wired and Wireless Anonymous Networks. ICC 2009: 1-8 - 2008
- [c14]Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins:
A survey of state-of-the-art in anonymity metrics. NDA 2008: 31-40 - [c13]Michael R. Grimaila, Robert F. Mills, Larry W. Fortson:
Improving the cyber incident mission impact assessment (CIMIA) process. CSIIRW 2008: 32:1-32:2 - [c12]John W. Carls, Richard A. Raines, Michael R. Grimaila, Steven K. Rogers:
Biometric enhancements: Template aging error score analysis. FG 2008: 1-8 - [c11]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. IPCCC 2008: 524-531 - 2007
- [j7]Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, Jackie Rees:
Management of Information Security: Challenges and Research Directions. Commun. Assoc. Inf. Syst. 20: 57 (2007) - [j6]Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. IEEE Netw. 21(4): 51-56 (2007) - [c10]Michael R. Grimaila, Larry Fortson:
Towards an Information Asset-Based Defensive Cyber Damage Assessment Process. CISDA 2007: 206-212 - [c9]Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert W. Bennington, Christopher E. Reuter:
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. HICSS 2007: 144 - 2006
- [j5]Victor P. Hubenko Jr., Richard A. Raines, Robert F. Mills, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements. IEEE Commun. Mag. 44(11): 66-72 (2006) - 2005
- [j4]Evan E. Anderson, Michael R. Grimaila, William Richmond:
Enterprise computing: economies and diseconomies of scale in server price/performance relationships. IEEE Trans. Engineering Management 52(3): 329-335 (2005) - [c8]Evan E. Anderson, Joobin Choobineh, Michael R. Grimaila:
An Enterprise Level Security Requirements Specification Model. HICSS 2005 - [c7]Yuxin Tian, Michael R. Grimaila, Weiping Shi, M. Ray Mercer:
An optimal test pattern selection method to improve the defect coverage. ITC 2005: 9 - 2004
- [j3]Michael R. Grimaila:
Maximizing Business Information Security's Educational Value. IEEE Secur. Priv. 2(1): 56-60 (2004) - 2003
- [c6]Yuxin Tian, Michael R. Grimaila, Weiping Shi, M. Ray Mercer:
Minimizing Defective Part Level Using a Linear Programming-Based Optimal Test Selection Method. Asian Test Symposium 2003: 354-359 - 2002
- [j2]Michael R. Grimaila, Inkoo Kim:
An Undergraduate Business Information Security Course and Laboratory. J. Inf. Syst. Educ. 13(3): 189-196 (2002) - [c5]Sooryong Lee, Brad Cobb, Jennifer Dworak, Michael R. Grimaila, M. Ray Mercer:
A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults. DATE 2002: 94-99 - 2001
- [j1]Jennifer Dworak, Jason D. Wicker, Sooryong Lee, Michael R. Grimaila, M. Ray Mercer, Kenneth M. Butler, Bret Stewart, Li-C. Wang:
Defect-Oriented Testing and Defective-Part-Level Prediction. IEEE Des. Test Comput. 18(1): 31-41 (2001) - 2000
- [c4]Jennifer Dworak, Michael R. Grimaila, Brad Cobb, Ting-Chi Wang, Li-C. Wang, M. Ray Mercer:
On the superiority of DO-RE-ME/MPG-D over stuck-at-based defective part level prediction. Asian Test Symposium 2000: 151- - [c3]Jennifer Dworak, Michael R. Grimaila, Sooryong Lee, Li-C. Wang, M. Ray Mercer:
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D. ITC 2000: 930-939
1990 – 1999
- 1999
- [c2]Jennifer Dworak, Michael R. Grimaila, Sooryong Lee, Li-C. Wang, M. Ray Mercer:
Modeling the probability of defect excitation for a commercial IC with implications for stuck-at fault-based ATPG strategies. ITC 1999: 1031-1037 - [c1]Michael R. Grimaila, Sooryong Lee, Jennifer Dworak, Kenneth M. Butler, Bret Stewart, Hari Balachandran, Bryan Houchins, Vineet Mathur, Jaehong Park, Li-C. Wang, M. Ray Mercer:
REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experimen. VTS 1999: 268-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint