Department of Systems Engineering & Management

Department of Systems Engineering & Management
AFIT Faculty: Michael R. Grimaila
CONTACT INFORMATION
Name: Michael R. Grimaila
Title: Professor of Systems Engineering, Dept. of Systems Engineering and Management
Head, Department of Systems Engineering and Management
Commercial Phone: 937.255.3636 (4800)
DSN Phone: 785.3636 (4800)
EDUCATION

ACADEMIC DEGREES:

  • Post-Doctoral Fellowship in Information Assurance (2007); University of Maryland University College; Adelphi, Maryland; Awarded NSA 4011, NSA 4012, NSA 4013 IA Certificates.
  • Doctor of Philosophy in Computer Engineering (1999); Texas A&M University, College Station, TX. Research Fellowship: Semiconductor Research Consortium.
  • Master of Science in Electrical Engineering (1995);Texas A&M University, College Station, TX. Research Fellowship: Office of Naval Research.
  • Bachelor of Science in Electrical Engineering (1993); Texas A&M University, College Station, TX.

AFFILIATIONS:

  • Member - Center for Cyberspace Research (CCR),Air Force Cyberspace Technical Center of Excellence (AF CyTCoE).
  • Senior Member - Institute of Electrical and Electronics Engineers (IEEE).
  • Fellow - Information System Security Association (ISSA).
  • Advisory Board Member of IBM’s Network Science Research Center (NSRC).
  • Advisor to the Price of Wales Fellows / Prince Edward Fellows at MIT and Harvard.

PROFESSIONAL CERTIFICATIONS AND LICENSES:

  • Certified Information System Security Professional (CISSP) - International Information Systems Security Certification Consortium, Inc. (ISC)2.
  • Certified Information Security Manager (CISM)- Information Systems Audit and Control Association (ISACA).
  • INFOSEC Assessment Methodology (NSA-IAM) - National Security Agency.
  • INFOSEC Evaluation Methodology (NSA-IEM) - National Security Agency.
  • IS-001 Emergency Program Manager - Department of Homeland Security Emergency Management Institute.
  • IS-003 Radiological Emergency Management - Department of Homeland Security Emergency Management Institute.
  • IS-275 The Emergency Operations Center's Role in Community Preparedness, Response and Recovery Activities - Department of Homeland Security Emergency Management Institute.
  • Electronic Technician - Texas A&M University Extension Service; College Station, TX.
RESEARCH INTERESTS
  • Mission Assurance
  • Computer and Network Security
  • Quantum Cryptography and Information
  • Mission Impact Assessment
  • IA Metrics and Measurement
  • Strategic IA Resource Allocation and Decision Making
  • Civil Defense / CBRNE Response
EXPERTISE
  • ARTIFICIAL NEURAL NETWORKS
  • COMPLEX SYSTEMS
  • INFORMATION FUSION
  • SIMULATION MODELING AND ANALYSIS
  • SYSTEMS ENGINEERING
  • ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
  • COMMUNICATION AND NETWORKS
  • COMPUTER AND NETWORK SECURITY
  • QUANTUM CRYPTOGRAPHY
  • QUANTUM INFORMATION
PUBLICATIONS & RESEARCH PAPERS

Book Chapters (6):

  1. Mills, R.F.5, Peterson, G.L.5, and Grimaila, M.R., “Insider Threat Prevention, Detection and Mitigation,” Cyber Security and Global Information Assurance: Threat Analysis and Response Solution, K. J. Knapp (ed), U.S. Air Force Academy, Colorado, USA, 2010, pp. 48-74.
  2. Hass, M.6, Mills, R.F.5, and Grimaila, M.R., “Aiding Understanding of a Contested Information Environment's Effect on Operations,” Human-in-the-Loop Simulations - Methods and Practice, L. Rothrock and S. Narayanan, S. (Eds.), ISBN 978-0-85729-882-9, 2011, pp. 175-202.
  3. Beeker, K.R.2, Mills, R.F.5, Grimaila, M.R., and Haas, M.W.6, “Can an Operationally Responsive Cyberspace Play a Critical Role in the Strategic Deterrence Equation?,” Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century, A.B. Lowther, ed., New York : Palgrave-MacMillan, Dec 2012, pp. 17-32.†
  4. Morris, J.D. 1, Grimaila, M.R., Hodson, D.5, Jacques, D.5, and Baumgartner, G.6, “System Security Engineering for Information Systems,” Emerging Trends in Information System Security, 1st Ed., Elsevier, ISBN 9780124114746, Nov. 2013, pp. 141-151.†
  5. Mailloux, L.O. 1, Grimaila, M.R., Colombi, J.5, Hodson, D.5, and Baumgartner, G.6, “System Security Engineering for Information Systems,” Emerging Trends in Information System Security, 1st Ed., Elsevier, ISBN 9780124114746, Nov. 2013, pp. 5-23.†
  6. Beeker, K.R.2, Mills, R.F.5, Grimaila, M.R., and Haas, M.W.6, “Operationally Responsive Cyberspace: A Critical Piece in the Strategic Deterrence Equation,” Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century, A.B. Lowther, ed., Air Force Research Institute, Air University, , Dec. 2013.

Archival Journal Publications (40):

  1. Grimaila, M.R. and Pineda de Gyvez, J.4, "Parametric Fault Identification and Dynamic Compensation Techniques for Cellular Neural Network Hardware," IET Circuits, Devices, and Systems; Vol. 143, Issue 5; Oct. 1996, pp. 295-301.†/D/F/Y
  2. Grimaila, M.R., Pineda de Gyvez, J.4 and Han, G., "Robust Functional Testing for VLSI Cellular Neural Network Implementations," IEEE Transactions on Circuits and Systems I; Vol. 44, Issue 2; Feb. 1997, pp. 161-166.†/D/F/Y
  3. Dworak, J.2, Wicker, J.2, Lee, S.2, Grimaila, M.R., Butler, K.6, Stewart, B.6, Wang, L.4, and Mercer, M.R.4, "Defect-Oriented Testing and Defective Part Level Prediction for Commercial Sub-Micron ICs," IEEE Computer Design and Test; Jan.-Feb. 2001, pp. 31-41.D
  4. Grimaila, M.R. and Kim, I.1, "An Undergraduate Business Information Security Course and Laboratory," Journal of Information Systems Education, Vol. 13(3); Oct. 2002, pp. 189-195.†
  5. Grimaila, M.R., "Maximizing the Educational Value of Business Information Security Curriculum,” IEEE Computer Security and Privacy, Vol. 2, Issue 1, Jan.-Feb. 2004, pp. 56-60. †
  6. Grimaila, M.R. and Kulkarni, A.S.1, “Information Security Challenges: Camera Phones,” The Information System Security Association (ISSA) Journal, 3(3), Aug. 2004, pp. 26-31. †
  7. Grimaila, M.R. and Kulkarni, A.S.1, “Challenges in Achieving Sarbanes-Oxley Compliance,” The Information System Security Association (ISSA) Journal, 3(9), Feb. 2005, pp. 9-13. †
  8. Anderson, E.6, Grimaila, M.R., and Richmond, W.6, "Enterprise Computing: Server Price/Performance Relationships," IEEE Transactions on Engineering Management, Vol. 52, Issue 3, Aug. 2005, pp. 329-335.
  9. Freedman, K.1 and Grimaila, M.R., “Contingency Planning for an Air Force Space Command Information System,” High Frontier Journal, Vol. 2, No. 3, Apr. 2006, pp. 76-81. †
  10. Gottrich, D.1 and Grimaila, M.R., “Managing the Integration of Space and Information Operations,” High Frontier Journal, Vol. 2, No. 3, Apr. 2006, pp. 44-49. †
  11. Hubenko, V.P.2, Raines, R.A.4, Mills, R.F.4, Baldwin, R.O.4, Mullins, B.E.4, and Grimaila, M.R., “Improving Global Information Grid’s Performance Through Satellite Communications Layer Enhancements”, IEEE Communications, Nov. 2006, Vol. 44, No. 11, pp. 66-72.
  12. Bailey, T.1 and Grimaila, M.R., “Information Technology, Terrorism, and the Transformation of the Islamic Mass-Culture in the Arab World,” Terrorism and Political Violence Journal, Vol. 18, No. 4, Jan. 2007, pp. 523-543. †/∞
  13. Grimaila, M.R., “RFID Security Concerns,” The Information System Security Association (ISSA) Journal, Â (6)1, Feb. 2007, pp. 30-35.†
  14. Hubenko, V.P.2, Raines, R.A.5, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “Improving Satellite Multicast Security Scalability by Reducing Re-Keying Requirements,” IEEE Network, vol. 21, no. 4, pp. 51-56, 2007.
  15. Edge, K.S.2, Raines, R.A.5, Baldwin, R.O.5, Grimaila, M.R., Bennington, R.W.6, and Reuter, C.E.6, "Analyzing Security Measures for Mobile Ad Hoc Networks Using Attack and Protection Trees," Journal of Information Warfare, April 2007, Vol. 6, No. 2, pp. 25-38.
  16. Choobineh, J.6, Dhillon, G.6, Grimaila, M.R., and Rees, J.6, “Management of Information Security: Challenges and Research Directions,” Communications of the Association for Information Systems, vol. 20, no. 57, 2007.
  17. Yates, H.1 and Grimaila, M.R., “A Systematic Approach to Securing our Space Assets,” High Frontier Journal, Vol. 4, No. 2, Mar. 2008, pp. 48-53. †
  18. Marsh, D.W.2, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “A Security Policy Language for Wireless Sensor Networks,” Journal of Systems and Software, January 2009, Vol. 82, No. 1, pp. 101-111.
  19. Ward, D. 2 and Grimaila, M.R., “Who Shall Defend Us? Determining National defense Roles in the Internet Age,” The Information System Security Association (ISSA) Journal, 7(3), March 2009, pp. 10-16.†
  20. Legradi, J.D.2, Grimaila, M.R., and Smith, D.5, “An Exploratory Social Network Analysis of Military and Civilian Emergency Operation Centers with a Focus on Organizational Structure,” Defense Threat Reduction Agency Journal, Vol. 1, No. 1, January 2010, pp. 1-21.
  21. Beeker, K.R.2, Mills, R.F.5, and Grimaila, M.R., “Applying Deterrence in Cyberspace,” Information Operations Journal, Information Operations Institute, Vol. 1, No. 4, February 2010, pp. 21-27.
  22. Grimaila, M.R. and Badiru, A.5, "A Hybrid Dynamic Decision Making Methodology for Defensive Information Technology Contingency Measure Selection in the Presence of Cyber Threats," Operational Research, Springer, DOI: 10.1007/s12351-010-0102-2, Vol. 10, No. 3, pp. 1-22, January 2011. †/∞
  23. Choobineh, J.6, Anderson, E.A.6, Fazen, M.2, and Grimaila, M.R., “Assessment of Mission Risk:Â Role of Protection of Information and Communication Technology Resources,” Journal of Information Warfare, 10:1, April 2011, pp. 1-17.
  24. Mills, R.F.5, Grimaila, M.R., Peterson, G.5, and Butts, J.5, “A Scenario-Based Approach to Mitigating the Insider Threat,” The Information System Security Association (ISSA) Journal, 9(5), May 2011, pp. 12-19.†
  25. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics,” IEEE Communications Surveys and Tutorials, Vol. 14, No. 2, 2012, pp. 579-606.
  26. Bryant, A.R.2, Mills, R. F.5, Peterson, G. L.5, and Grimaila, M.R., “Software Reverse Engineering as a Sensemaking Task,” Journal of Information Assurance and Security. 6(6), 2011, pp 483-494.
  27. Dube, T.2, Raines, R.5, Peterson, G.5, Bauer, K.5, Grimaila, M.R. and Rogers,S.5, “Malware Target Recognition via Static Heuristics,” Journal of Computers and Security, Vol. 31, Issue 1, February 2012, pp. 137-147.
  28. Grimaila, M.R., Morris, J1., Hodson, D.5, “Quantum Key Distribution: A Revolutionary Security Technology,” The Information System Security Association (ISSA) Journal, 10(6), June 2012, pp. 20-27.†
  29. Grimaila, M.R., Myers, J.1, Mills, R.F.5, and Peterson, G.5, “Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512911399303, Vol. 9(3), pp. 219-241, 2012. †/∞
  30. Vaarandi, R.6 and Grimaila, M.R., “Security Event Processing with Simple Event Correlator,” The Information System Security Association (ISSA) Journal, 10(8), August 2012, pp. 30-37.†
  31. Gilman, J.M.2, Miller, M.E.5, and Grimaila, M.R., “A Simplified Control Scheme for a Daylight-Matched LED Lamp,” Lighting Research and Technology, Sage Press, DOI: 10.1177/1477153512452276, September 26, 2012, pp. 614-629.
  32. Sturtevant, M.2, Grimaila, M.R., and Sitzabee, W.5, “An Asset Management-Based Methodology for Integrating Guardrail Sensors Into an Existing Intelligent Transportation System,” Public Works Management & Policy, Sage Press, DOI: 10.1177/1087724X12469508, December 26, 2012. †
  33. Finke, C.2, Butts, J.5, Mills, R.5, Grimaila, M.R., “Enhancing the security of aircraft surveillance in the next generation air traffic control system,” International Journal of Critical Infrastructure Protection, 6(1), March 2013, ISSN 1874-5482, 10.1016/j.ijcip.2013.02.001, pp.3-11.
  34. Bryant, A.R.2, Mills, R.F.5, Grimaila, M.R., and Peterson, G L.5, “Top Level Goals in Reverse Engineering Software,” Journal of Information Warfare. 12(1), 2013, pp. 32-43.
  35. Bochert, J.R.2,7, Grimaila, M.R., and Kim, Y6. “Software Protection Against Side Channel Analysis Through a Hardware Level Power Difference Eliminating Mask,” Journal of Cyber Security & Information Systems, May 2013, pp. 22-29. †
  36. Musman, S.6 and Grimaila, M.R., “Mission Assurance Challenges within the Military Environment,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN), IGI Global, 5(2), DOI: 10.4018/jitn.2013040105, April-June 2013, pp. 51-65. †
  37. T. Dube2, R. Raines5, M.R. Grimaila, K. Bauer5 and S. Rogers5, "Malware Target Recognition of Unknown Threats," IEEE Systems Journal, 7(3), DOI 10.1109/JSYST.2012.2221913, September 2013, pp. 467-477.
  38. Johnson, J.2,7, Grimaila, M.R., Humphries, J.5, and Baumgartner, G.6, “An Analysis of Error Reconciliation Protocols used in Quantum Key Distribution Systems,” Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512913503418, pp. 1-11, September 2013.†/∞
  39. Mailloux, L.O.1, Grimaila, M.R., Hodson, D.D.5, and Colombi, J.M.5, “A Practical Assessment of Security Design Patterns,” The Information System Security Association (ISSA) Journal, 11(9), September 2013, pp. 29-35. †
  40. Panton, B.C.2, Colombi, J.M.5, Grimaila, M.R., and Mills, R.F.5, “Secure DoD Software: Considerations for the Vulnerability Market,” Cross Talk, The Journal of Defense Software Engineering, November/December 2013, pp. 18-21.

Peer Reviewed Conference Publications (81):

  1. Grimaila, M.R. and Pineda de Gyvez, J.4, "A Macromodel Fault Generator for Cellular Neural Networks," Third IEEE International Workshop on Cellular Networks and their Applications (CNNA 94), Rome, Italy; Dec. 1994, pp. 369-374.†/D/F/Y
  2. Grimaila, M.R., Lee, S.2, Dworak, J.2, Butler, K.M.6, Stewart, B.6, Balachandran, H.6, Houchins, B.6, Mathur, V.6, Park, J.5, Wang, L.5, and Mercer, M.R.5, "REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experiment," Proceedings of the 1999 IEEE VLSI Test Symposium (VTS 99); Dana Point, CA; April 1999, pp. 268-274. (Best Paper Award)†/D/F/Y
  3. Dworak, J.2, Grimaila, M.R., Lee, S.2, Wang, L.4, and Mercer, M.R.4, "Modeling the Probability of Defect Excitation for a Commercial IC with Implications for Stuck-at Fault-Based ATPG Strategies," Proceedings of the 1999 Intl. Test Conference (ITC 99); Atlantic City, NJ; Sept. 1999, pp. 1031-1037.D
  4. Dworak, J.2, Grimaila, M.R., Lee, S.2, Wang, L.4, and Mercer, M.R.4, "Enhanced DO-RE-ME Based Defect Level Prediction Using Defect Site Aggregation – MPGD," Proceedings of the 2000 International Test Conference (ITC 2000); Atlantic City, NJ; Sept. 2000, pp. 930-939.D
  5. Dworak, J.2, Grimaila, M.R., Cobb, B.2, Wang, T.C.4, Wang, L.C.4, and Mercer, M.R.4, "On the Superiority of DO-RE-ME / MPG-D Over Stuck-at-Based Defective Part Level Prediction," Proceedings of the 2000 IEEE Asian Test Symposium (ATS 2000); Taipei, Taiwan; Dec, 2000, pp. 151-157.D
  6. Lee, S.2, Dworak, J.2, Cobb, B.2, Grimaila, M.R., and Mercer, M.R.4, "A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults," Design, Automation, and Test in Europe (DATE 2002); Paris, France; Mar. 4-8, 2002, pp. 94-99.
  7. Anderson, E.4, Choobineh, J.4, and Grimaila, M.R., "The Management of Information Security in Private Sector Organizations: Research Questions and Directions," Texas Workshop on Information System Security (TWISS 2003); College Station, TX; April 2, 2003. †
  8. Tian, Y.1, Grimaila, M.R., Shi, W.4, and Mercer, M.R.4, "Minimizing Defective Part Level Using a Linear Programming Based Optimal Test Selection Method," Twelfth Annual Asian Test Symposium (ATS 2003); Xian, China; Nov. 17-19, 2003.
  9. Grimaila, M.R., “A Novel Scenario-Based Information Security Management Exercise,” The Information Security Curriculum Development Conference (InfoSecCD04), Kennesaw, GA. Oct. 8, 2004.†
  10. Anderson, E.4, Choobineh, J.4, and Grimaila, M.R., "An Enterprise Level Security Requirements Specification Model," Proceedings of the 38th Annual Hawaii International Conference (HICSS 2005), The Big Island, HI, Jan. 2005, pp. 186-196. †
  11. Tian, Y.1, Grimaila, M.R., Shi, W.4, and Mercer, M.R.4, “An Optimal Test Pattern Selection Method to Improve the Defect Coverage,” Proceedings of the 36th IEEE International Test Conference (ITC 2005); Austin, TX; Nov. 8-10, 2005.
  12. Scurlock, A.1 and Grimaila, M.R., “Naval Information Assurance Education and Training within the Navy Marine Corps Intranet,” Proceedings of the 2006 Phoenix Challenge Conference (PC2006); Johns Hopkins University; Laurel, MD; Jan. 31–Feb. 2, 2006. †
  13. Grimaila, M.R. and Crawford, J.A.1, “A Total Cost of Ownership (TCO) Model for Software Protection Schemes,” Proceedings of the 2006 International Conference on Information Warfare and Security (ICIW 2006); University of Maryland Eastern Shore, MD; March 15-16, 2006. †
  14. Lawson, J.1 and Grimaila, M.R., “Improving TCP/IP Performance over Geosynchronous Satellite Links,” Proceedings of the 2006 Information Resources Management Association Conference (IRMA 2006); Washington, D.C.; May 21-24, 2006. †
  15. Schroeder, N.1 and Grimaila, M.R., “Revealing Prospect Theory Bias in Information Security Decision Making,” Proceedings of the 2006 Information Resources Management Association Conference (IRMA 2006); Washington, D.C.; May 21-24, 2006. †
  16. Valentine, J.2, Mills, R.4, Grimaila, M.R., and Elder, K.4, “Network Centric Warfare and E-Business – It’s About More Than Just New Technology,” Proceedings of the 11th Coalition Command and Control in the Networked Era (ICCRTS 2006); Cambridge, UK; Sept. 26-28, 2006.
  17. Levoy, T.1, Grimaila, M.R., and Mills, R.4, “A Methodology for Customizing Security Auditing Templates for Malicious Insider Detection,” Proceedings of the 8th International Symposium on System and Information Security (ISSIS 2006); Sao Jose dos Campos, Sao Paulo, Brazil; Nov. 08-10, 2006. †
  18. Edge, K.2, Raines, R.5, Grimaila, M.R., Baldwin, R.5, Bennington, B.6, and Reuter, C.6, “The Use of Attack and Protection Trees to Analyze Security for an Online Banking System,” Proceedings of the 40th Annual Hawaii International Conference (HICSS 2007), Honolulu, HI., Jan. 2007, pp. 144-154.
  19. Blomme, M.E.2 and Grimaila, M.R., “Merging Cultures: Integrating MASINT into Air Operations,” Proceedings of the 2007 Phoenix Challenge Conference (PC2007); Kirtland Air Force Base; Albuquerque, NM; Feb. 28-Mar. 1, 2007. †
  20. Grimaila, M.R., Roehl, J.1, and Turner, J.4, “Internet Geolocation for Cyber Attack Attribution,” Proceedings of the 2007 Phoenix Challenge Conference (PC2007); Kirtland Air Force Base; Albuquerque, NM; Feb. 28-Mar. 1, 2007. †
  21. Edge, K. 2, Raines, R. 5, Grimaila, M.R., Baldwin, R. 5, Reuter, C. 6, and Bennington, B. 6, “Analyzing Security Measures for Mobile Ad Hoc Networks Using Attack and Protection Trees,” Proceedings of the 2007 International Conference on Information Warfare and Security (ICIW 2007); Naval Postgraduate School, Monterey, CA; March 8-9, 2007.
  22. Fortson, L.W.1 and Grimaila, M.R., “Development of a Defensive Cyber Damage Assessment Framework,” Proceedings of the 2007 International Conference on Information Warfare and Security (ICIW 2007); Naval Postgraduate School, Monterey, CA; Mar. 8-9, 2007. †
  23. Bryant, S.A.1 and Grimaila, M.R., “Security Risks in USAF Geospatial Information Sharing” Proceedings of the 2007 International Conference on Information Warfare and Security (ICIW 2007); Naval Postgraduate School, Monterey, CA; Mar. 8-9, 2007. †
  24. Bryant, A.R.1 and Grimaila, M.R., “Developing a Framework to Improve Information Assurance Battlespace Knowledge” Proceedings of the 2007 International Conference on Information Warfare and Security; Naval Postgraduate School, Monterey, CA; Mar. 8-9, 2007. †
  25. Grimaila, M.R. and Fortson, L.W.1, “Towards an Information Asset-Based Defensive Cyber Damage Assessment Process,” Proceedings of the 2007 IEEE Computational Intelligence for Security and Defense Applications (CISDA 2007); Honolulu, HI; April 1-5, 2007, pp. 206-212. †
  26. Hubenko, V.P., Raines, R.A.5, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “Applying a Secure and Efficient Low Earth Orbit Satellite-Based Multicast Architecture in a Deployed Environment,” Proceedings of the 2007 IEEE Military Communications Conference (MILCOM 07), Orlando FL, 29-31 October 2007.
  27. Hubenko, V.P.2, Raines, R.A.5, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “A Secure and Efficient Satellite-based Multicast Architecture,” Proceedings of the 2008 IEEE Radio and Wireless Symposium, Orlando FL, 21-23 January 2008.
  28. Harris, R.2 and Grimaila, M.R., “Information Technology Contingency Planning,” Proceedings of the 2008 Southern Association for Information Systems Conference (SAIS 2008), Virginia Commonwealth University, Richmond, VA, 13-15 March 2008.
  29. Nicholson, B.2, Grimaila, M.R., Strouble, D.5, “Electronic Medical Record (EMR) Informatics Security,” Proceedings of the 2008 Southern Association for Information Systems Conference (SAIS 2008), Virginia Commonwealth University, Richmond, VA, 13-15 March 2008 (Nominated for Best Paper Award).
  30. Griffin, J.2 and Grimaila, M.R., “Insider Threats to Information Systems,” Proceedings of the 2008 Southern Association for Information Systems Conference (SAIS 2008), Virginia Commonwealth University, Richmond, VA, 13-15 March 2008.
  31. Grimaila, M.R., Stratton, M.A.1, Leach, S.E.5, and Roehl, J.6, “An Investigation of Limitations in the Accuracy of Time-To-Location Internet Protocol Geolocation,” Proceedings of the 2008 Phoenix Challenge Conference (PC 2008), Monterey, CA, 1-5 April 2008.
  32. Kelly, D.2, Raines, R.A.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., "Analyzing Anonymity in Cyberspace," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  33. Kelly, D.2, Raines, R.A.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., "A Framework for Classifying Anonymous Networks in Cyberspace," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  34. Scheeres, J.2, Mills, R.5, and Grimaila, M.R., "Establishing the Human Firewall: Improving Resistance to Social Engineering Attacks," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  35. Carls, J.1, Raines, R.A.5, Grimaila, M.R., and Rogers, S.6, "Biometric Security Enhancements Through Template Aging matching Score Analysis," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  36. Strouble, D.5 and Grimaila, M.R., “Legal Aspects of Warfare in Cyberspace,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  37. Sorrels, D.1, Grimaila, M.R., Fortson, L.W.6, and Mills, R.F.5, “An Architecture for Cyber Incident Mission Impact Assessment (CIMIA),” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  38. Hellesen, D.1, Grimaila, M.R., Fortson, L.W.6, and Mills, R.F.5, “Information Asset Value Quantification,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  39. Haan, N.1, Grimaila, M.R., and Patel, R.6, “Insider Threat Detection within Embedded Weapon Systems,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  40. Cowan, R.1, Grimaila, M.R., and Patel, R.6, “Using Attack and Protection Trees to Evaluate Risk in an Embedded Weapon System,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  41. Ashe, E.1, Grimaila, M.R., and Carter, B.6, “A Framework for Improving Consistency of the Protection of Critical Technologies,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  42. Grimaila, M.R., “Improving the Cyber Incident Mission Impact Assessment Process,” Cyber Security and Information Intelligence Research Workshop (CSIIRW 2008), Oak Ridge National Laboratory, Oak Ridge, TN, May 12-14, 2008.
  43. Grimaila, M.R., Mills, R.F.5, and Fortson, L.W.6, “An Automated Information Asset Tracking Methodology to Enable Timely Cyber Incident Mission Impact Assessment,” Proceedings of the 2008 International Command and Control Research and Technology Symposium (ICCRTS 2008), Bellevue, WA, 17-19 June 2008.
  44. Kelly, D.2, Raines, R.5, Grimaila, M.R., Baldwin, R.5, and Mullins, B.5, “A Survey of the State-of-the-Art in Anonymity Metrics,” Proceedings of the 1st ACM Workshop on Network Data Anonymization (NDA), pp. 31-40, George Mason University, Alexandria, VA., October 2008.
  45. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary,” Proceedings of the IEEE IPCCC International Workshop on Information and Data Assurance (WIDA), Austin, TX, December 2008.
  46. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Towards a Tree-based Taxonomy of Anonymous Networks,” Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 1-2, Las Vegas, NV, January 2009.
  47. Moore, T.W.1, Grimaila, M.R., and Strouble, D.5, “Laws and Regulations of USAF Military Operations in Cyberspace,” Proceedings of the 2009 International Conference on Information Warfare and Security (ICIW 2008), University of Cape Town, Breakwater Campus, Cape Town, South Africa, 26-27 March 2009.
  48. Grimaila, M.R., Fortson, L.W.1, Sutton, J.L.6, and Mills, R.F.5, “Developing Methods for Timely and Relevant Mission Impact Estimation,” Proceedings of the 2009 SPIE Defense, Security and Sensing Conference (SPIE DSS 2009), Orlando, FL, April 13-17, 2009.
  49. Myers, J.1, Grimaila, M.R., and Mills, R.F.5, “Towards Insider Threat Detection using Web Server Logs,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2009), Oak Ridge National Laboratory, Oak Ridge, TN, April 13-15, 2009.
  50. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Towards a Taxonomy of Wired and Wireless Anonymous Networks,” IEEE International Communications Conference 2009, Dresden Germany, June 2009.
  51. Grimaila, M.R., Schechtman, G.5, and Mills, R.F.5, “Improving Cyber Incident Notification in Military Operations,” Proceedings of the 2009 Institute of Industrial Engineers Annual Conference, Miami, FL, May 30, 2009 - June 3, 2009.
  52. Grimaila, M.R., Fortson, L.W.1, and Sutton, J.L.6, “Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process,” Proceedings of the 2009 International Conference on Security and Management (SAM09), Las Vegas, NV, July 13-16, 2009.
  53. McDonald, T.J.5, Kim, Y.C.5, and Grimaila, M.R., “Protecting Reprogrammable Hardware with Polymorphic Circuit Variation,” Proceedings of the 2nd Cyberspace Research Workshop, Shreveport, LA, June 15, 2009.
  54. McDonald, T.J.5, Trias, E.D.5, Kim, Y.C.5, and Grimaila, M.R., “Using Logic-Based Reduction For Adversarial Component Recovery,” Proceedings of the 25th ACM Symposium on Applied Computing, Lausanne, Switzerland, March 22-26, 2010.
  55. Anderson, E.6, Choobineh, J.6, Fazen, M.2, and Grimaila, M.R., “Mission Impact:Â Role of Protection of Information Systems,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  56. Hellesen, D.1 and Grimaila, M.R., “Information Asset Value Quantification Expanded,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  57. Myers, J.1, Grimaila, M.R., and Mills, R.F.5, “Insider Threat Detection using Distributed Event Correlation of Web Server Logs,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  58. Hale, B.1, Grimaila, M.R., Mills, R.F.5, Haas, M.6, and Maynard, P.6, “Communicating Potential Mission Impact using Shared Mission Representations,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  59. Erskine, J.R.2, Peterson, G.L.5, Mullins, B.E.5, and Grimaila, M.R., “Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  60. Parham, J.D.2, McDonald, J.T.5, Grimaila, M.R., and Kim, Y.C.5, “A Java Based Component Identification Tool for Measuring the Strength of Circuit Protections,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  61. Myers, J.1, Grimaila, M.R., and Mills, R.F.5, “Adding Value to Log Event Correlation Using Distributed Techniques,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  62. Naga, V.2, Colombi, J.5, Grimaila, M.R., and Hopkinson, K.5, "Mission-Related Execution and Planning Through Quality of Service Methods," Proceedings of the 15th International Command and Control Research and Technology Symposium, Santa Monica, CA, June 22-24, 2010 (Best Paper Award).
  63. Johannes, T.W.5 and Grimaila, M.R., “Achieving Early Situational Awareness in Extreme Events,” Proceedings of 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 529-535.
  64. Naga, V.2, Colombi, J.5, Grimaila, M.R., and Hopkinson, K.5, “Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods,” Proceedings of the 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 529-535.
  65. Sorrels, D.M.1 and Grimaila, M.R., “Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking,” Proceedings of the 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 542-547.
  66. Grimaila, M.R., Mills, R.F.5, Haas, M.5, and Kelly, D.6, “Mission Assurance: Issues and Challenges,” Proceedings of the 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 651-657.
  67. Choobineh, J.6, Anderson, E.6, and Grimaila, M.R., "Security Management Life Cycle (SMLC): A Comparative Study," Proceedings of the 16th Americas Conference on Information Systems (AMCIS 2010), Lima, Peru, August 12-15, 2010, Paper 406.
  68. Dube, T.2, Raines, R.5, Peterson, G.5, Bauer, K.5, Grimaila, M.R., and Rogers, S.5, “Malware Type Recognition and Cyber Situational Awareness,” Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, MN, August 20-22, 2010, pp. 938 – 943 (Best Paper Award).
  69. Abercrombie, R.6, Sheldon, F.6, and Grimaila, M.R., “A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance,” Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, MN, August 20-22, 2010, pp. 1153-1158.
  70. Kulkarni, A.6, Williams, E.6, and Grimaila, M.R., “Mitigating Security Risks for End User Computing Application (EUCA) Data,” Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, MN, August 20-22, 2010, pp. 1171 - 1176 .
  71. Myers, J.1, Grimaila, M.R., and Mills, R.F.6, “Log-Based Distributed Security Event Detection Using Simple Event Correlator,” the 44th Annual Hawaii International Conference (HICSS 2011), Oahu, HI, January 2011, pp. 1-7.
  72. Carvalho, M.6, Perez, C.6, Dasgupta, D.5, and Grimaila, M.R., “Mission Resilience in Cloud Computing: A Biologically Inspired Approach,” Proceedings of the 2011 International Conference on Information Warfare and Security (ICIW 2011), Washington, D.C., March 17-18, 2011.
  73. Miller, J.2, Mills, R.F.5, Grimaila, M.R., and Haas M.W.6, “A Scalable Architecture for Improving the Timeliness and Relevance of Cyber Incident Notifications,” Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  74. Woskov, S.1, Grimaila, M.R., Mills, R.F.5, and Haas M.W.6, “Design Consideration for a Case-Based Reasoning Engine for Scenario-Based Cyber Incident Notification,” Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  75. Abercrombie, R.K.6, Ferragut, E.6, Sheldon, F.T.6, and Grimaila, M.R., “Addressing the Need for Independence in the CSE Model,” Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  76. Peterson, C.1, Grimaila, M.R., Mills, R.F.5, Haas M.W.6, Thomas, G.6, and Kelly, D.6, “Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process,” Proceedings of the 2011 International Conference on Security and Management (SAM11), Las Vegas, NV, July 18-21, 2011.
  77. Naga, V.2, Colombi, J.5, Grimaila, M.R., and Hopkinson, K.5, “A Method to Determine Superior QoS Configurations for Mission Objectives: Aligning the Network with the Mission” Proceedings of the 2011 International Conference on Security and Management (SAM11), Las Vegas, NV, July 18-21, 2011.
  78. Calver, T.I.1, Grimaila, M.R., and Humphries, J.5, “An Empirical Analysis of the Cascade Error Reconciliation Protocol for Quantum Key Distribution,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2011), Oak Ridge National Laboratory, Oak Ridge, TN, October 12-14, 2011.
  79. Evans, M.1, Grimaila, M.R., and Mills, R.F.5, “A Survey of Cyberspace Mission Assurance within United States Air Force Communications Squadrons ,” Proceedings of the 2012 International Conference on Security and Management (SAM12), Las Vegas, NV, July 16-19, 2012.
  80. Harper, C.1, Grimaila, M.R., and Baumgartner, G.6, “Security Standards and Best Practices for Quantum Key Distribution,” Proceedings of the 2013 International Conference on Security and Management (SAM13), Las Vegas, NV, July 22-25, 2013.
  81. Mailloux, L.1, Langhals, B.T.5, and Grimaila, M.R., “A Systems Engineering Approach for Assured Cyber Systems,” Proceedings of the 2013 International Conference on Security and Management (SAM13), Las Vegas, NV, July 22-25, 2013.

Other Professional Publications (3):

  1. Grimaila, M.R., "The Role of Bastille Linux in Information Security," System Administration, Networking, and Security (SANS) Institute, Bethesda, MD; Feb. 2002.
  2. Badiru, A., Smith, D. Grimaila, M.R., Slagley, J. Kee, P., and Thal, A. (2007), “IE Techniques Aid Air Force Disaster Response,” Institute of Industrial Engineers, Online Digest, www.iienet.org; http://www.iienet2.org/Details.aspx?id=10178; September 18, 2007.
  3. Grimaila, M.R. and Fortson, L.W.6, “Improving the Accuracy and Timeliness of Cyber Incident Damage and Mission Impact Assessment, “Information Assurance Technology Analysis Center (IATAC) IA Newsletter, Spring 2008.
AWARDS & HONORS
  • Advisory Board Member of IBM’s Network Science Research Center (2012).
  • AFIT Board of Visitors Colonel Charles Stone Award (2012).
  • AFIT/ENV Researcher of the Year (Spring 2012).
  • Advisor to the Prince of Wales Fellows at MIT and Harvard (2011).
  • Advisor to the Prince Edward Fellows at MIT and Harvard (2011).
  • Fellow of the Information System Security Association (2011).
  • ISC² 2011 U.S. Government Information Security Leadership Award (2011) – Member of AFIT’s Center for Cyberspace Research (CCR) Cyber 200/300 Professional Continuing Education Team.
  • National Research Council (NRC) Research Advisor (2010).
  • IEEE Conference on Information Privacy, Security, Risk and Trust Best Paper Award (2010).
  • 15th International Command and Control Research and Technology Symposium Best Paper Award (2010).
  • AFIT/ENV Teacher of the Year (Spring 2010).
  • AFIT Professional Performer (Winter 2010).
  • Air Force Center for Systems Engineering - Research Fellow (2009-2010).
  • Air Force Institute of Technology ENV Professor of the Quarter (Spring 2006).
  • Gage H. Crocker Outstanding Professor Award (2005).
  • Senior Member of the IEEE (Spring 2005).
  • Air Force Institute of Technology ENV Professor of the Quarter (Spring 2005).
  • Texas A&M University IEEE Outstanding Professor of the Year (2000-2001).
  • Texas A&M University Eta Kappa Nu Outstanding Professor of the Year (2000-2001).
  • Texas A&M University IEEE Outstanding Professor of the Year (1999-2000).
  • Texas A&M University Eta Kappa Nu Outstanding Professor of the Year (1999-2000).
  • IEEE VLSI Test Symposium Best Paper Award (2000).
  • IEEE VLSI Test Symposium Outstanding Research Contribution Award (1999).
COURSES
  • IMGT 561 Database Management
  • IMGT 657 Data Communications for Managers
  • IMGT 662 Database Security
  • IMGT 687 Management Aspects of Information Warfare
  • SENG 520 Systems Engineering
  • SENG 593 Software Systems Engineering
  • SENG 640 Systems Architecture