Michael R. Grimaila
Orcid: 0000-0002-8355-7992Affiliations:
- Texas A&M University, College Station, Texas, USA
According to our database1,
Michael R. Grimaila
authored at least 73 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
J. Supercomput., 2023
ADS-B classification using multivariate long short-term memory-fully convolutional networks and data reduction techniques.
J. Supercomput., 2023
2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2020
2018
IT Prof., 2018
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
2017
System-level considerations for modeling space-based quantum key distribution architectures.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017
2016
Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals.
IT Prof., 2016
IEEE Access, 2016
Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment.
Proceedings of the Critical Infrastructure Protection X, 2016
2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Secur. Priv., 2015
CoRR, 2015
IEEE Commun. Mag., 2015
A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities.
IEEE Access, 2015
2014
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection VIII, 2014
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014
Proceedings of the 2014 Workshop on Computational Models of Narrative, 2014
2013
A hybrid dynamic decision making methodology for defensive information technology contingency measure selection in the presence of cyber threats.
Oper. Res., 2013
Int. J. Interdiscip. Telecommun. Netw., 2013
Enhancing the security of aircraft surveillance in the next generation air traffic control system.
Int. J. Crit. Infrastructure Prot., 2013
2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the 34th Annual Meeting of the Cognitive Science Society, 2012
2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
A scalable architecture for improving the timeliness and relevance of cyber incident notifications.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP).
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking.
Proceedings of the 2010 International Conference on Security & Management, 2010
Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods.
Proceedings of the 2010 International Conference on Security & Management, 2010
Achieving Situational Awareness in Extreme Events.
Proceedings of the 2010 International Conference on Security & Management, 2010
Mission Assurance: Issues and Challenges.
Proceedings of the 2010 International Conference on Security & Management, 2010
A Java based component identification tool for measuring the strength of circuit protections.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
Proceedings of IEEE International Conference on Communications, 2009
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008
2007
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007
Commun. Assoc. Inf. Syst., 2007
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007
2006
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006
2005
Enterprise computing: economies and diseconomies of scale in server price/performance relationships.
IEEE Trans. Engineering Management, 2005
Proceedings of the Proceedings 2005 IEEE International Test Conference, 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
2004
IEEE Secur. Priv., 2004
2003
Minimizing Defective Part Level Using a Linear Programming-Based Optimal Test Selection Method.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003
2002
J. Inf. Syst. Educ., 2002
A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults.
Proceedings of the 2002 Design, 2002
2001
IEEE Des. Test Comput., 2001
2000
Proceedings of the Proceedings IEEE International Test Conference 2000, 2000
On the superiority of DO-RE-ME/MPG-D over stuck-at-based defective part level prediction.
Proceedings of the 9th Asian Test Symposium (ATS 2000), 4-6 December 2000, Taipei, Taiwan, 2000
1999
REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experimen.
Proceedings of the 17th IEEE VLSI Test Symposium (VTS '99), 1999
Modeling the probability of defect excitation for a commercial IC with implications for stuck-at fault-based ATPG strategies.
Proceedings of the Proceedings IEEE International Test Conference 1999, 1999