Education
Ph.D. (Computer Science), 2009, University of Texas at San Antonio.
M.S. (Computer Science), 2003, Air Force Institute of Technology, Dayton, OH.
B.S. (Computer Science), 1999, University of Portland, OR.
Awards
Awards
AFA (Wright Memorial Chapter) Colonel Charles A. Stone Award - 2023
DAF Outstanding STEM Outreach Champion Award - 2023
3rd Quarter Civilian Category IV Award Winner - 2022
Bernard A. Schriever Essay Contest Runner-Up - 2018
Bernard A. Schriever Essay Contest Winner - 2017
AFIT Team of the Quarter – 2017
Military Decorations
Meritorious Service Medal (Third Oak Leaf Cluster) – June 2011, June 2013, June 2015, July 2016
Joint Service Commendation Medal – May 2011
Air Force Commendation Medal (First Oak Leaf Cluster) – July 2001, August 2005
Army Commendation Medal - May 2018
Air Force Achievement Medal (First Oak Leaf Cluster) – June 2000, November 2000
National Defense Service Medal – September 2001
Armed Forces Expeditionary Medal – June 2000
Afghanistan Campaign Medal with one bronze star – May 2011
Global War on Terrorism Service Medal – September 2001
NATO ISAF Medal – May 2011
Publications
Book Chapters
- Reith, M., McCoy, R. and Moore, J., “Game-based Education: Theory”. In Intentional Technology for Teaching Practice: An AFIT Faculty Learning Community Publication, Vol 1, 2023, edited by Mike Frick and Jonathan Zemmer, 4-15. 2023.
- Reith, M., McCoy, R. and Moore, J., “Game-based Education: Practice”. In Intentional Technology for Teaching Practice: An AFIT Faculty Learning Community Publication, Vol 1, 2023, edited by Mike Frick and Jonathan Zemmer, 16-32. 2023.
- Poole, C.*, Bettinger, R. A., Reith, M., “Shifting Satellite Control Paradigms: Operational Cybersecurity in the Age of Mega-Constellations.” In Handbook of Scholarly Publications from the Air Force Institute of Technology (AFIT), Volume 1, 2000-2020, edited by Adedeji B. Badiru, Frank W. Ciarallo, and Eric G. Mbonimpa, 187-196. Boca Raton, FL: CRC Press, 2022.
Journal Publications
- Mooty, C. M.*, Bettinger, R. A., & Reith, M. G. (2023). Domain Restriction Zones: An Evolution of the Military Exclusion Zone. Air & Space Operations Research, 2(2), 20–36.
- Ryan, O. R.*, Reith, M. G., & Koschnick, C. M. (2023). Deconstructing the software factory: A practical application of interorganizational network analysis. Defense Acquisition Research Journal, 30(3), 200–227. https://doi.org/10.22594/dau.22-900.30.03
- Heffron, I.*, Reith, M. and Dean, J.D. “A Case for an Independent Cyber Force”, Æther: A Journal of Strategic Airpower & Spacepower, Vol. 2, No. 2 Summer 2023
- Ryan, Z.*, Reith, M. and Beach, P. “Defining the Department of Defense Software Factory: A Network Value Approach”, Crosstalk, The Journal of Defense Software Engineering. 11-18. July 2022.
- Noel, G. and Reith, M. “Cyber-Warfare Evolution and Role in Modern Conflict”, Journal of Information Warfare, 20(4), 30-44. Fall 2021.
- Poole, C., Bettinger, R., and Reith, M. “Shifting Satellite Control Paradigms: The Prospect of Operational Cybersecurity in the Age of Mega-Constellations”, Air & Space Power Journal, 35(3), 46-56. Fall 2021.
- Flack, N.*, Lin, A., Peterson, G., and Reith, M. “Battlespace NextTM: Developing a Serious Game to Explore Multi-Domain Operations”, International Journal of Serious Games, 7(2), 49 - 70. 1 June 2020.
- Tomcho, L.* and Reith, M. “Engaging Airmen with Cyber Education and Training: Designing a Platform Using Gamification”, Journal of The Colloquium on Information Systems Security Education, 6(2), March 2019.
- Reith, M. “Brandishing Our Air, Space & Cyber Swords: Recommendations for Deterrence & Beyond”, Air & Space Power Journal, 31(4), 103-114. Winter 2017.
- Reith, M. “Forging Tomorrow’s Air, Space and Cyber War Fighters: Recommendations for Integration and Development”, Air & Space Power Journal, 30(4), 106-117. Winter 2016.
- Niu, J., Reith, M. and Winsborough, W.H. "Formal Verification of Security Properties in Trust Management Policy”, Journal of Computer Security, 22(1), 69-153. 2014.
- Reith, M., Carr, C. and Gunsch G. “An Examination of Digital Forensic Models”, International Journal of Digital Evidence, 1(3), 1-12. Fall 2002.
Refereed Conference Publications (Full Paper Review)
- Fleming, C.*, Reith, M. and Henry, C.W. “Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework”, 18th International Conference on Cyber Warfare and Security, Towson University, Maryland, USA. 9-10 March 2023
- Reyneke, M.*, Reith, M. and Mullins, B. “LoRaWAN & The Helium Blockchain: A Study on Military IoT Deployment”, 18th International Conference on Cyber Warfare and Security, Towson University, Maryland, USA. 9-10 March 2023
- Chan, J.* and Reith, M. “Cyber Concerns with Cloud Computing”, 21st European Conference on Cyber Warfare and Security, University of Chester, UK. 16-17 June 2022.
- Franck, B.* and Reith, M. “Developing Mandatory Reporting for Cyber-Attacks on U.S. Businesses”, 21st European Conference on Cyber Warfare and Security, University of Chester, UK. 16-17 June 2022.
- Thebarge, J.*, Reith, M. and Henry, C.W. “Increasing Industry Profitability and Cyber Hygiene Utilizing Awareness Progression Methods”, 17th International Conference on Cyber Warfare and Security, State University of New York at Albany, USA. 17-18 March 2022.
- Richardson, C.*, Reith, M. and Henry, C.W. “Ensuring the Security of Space Systems from Eavesdropping Attacks”, 17th International Conference on Cyber Warfare and Security, State University of New York at Albany, USA. 17-18 March 2022.
- Kokotajlo, T.*, Reith, M., Dill, R. and Long D. “Artificial Intelligence within Agile Software Development: Projected Impacts to Cyber Offense-Defense Balance”, 3rd European Conference on the Impact of Artificial Intelligence and Robotics, Instituto Universitário de Lisboa, Portugal. 18-19 November 2021.
- Poole, C.*, Bettinger, R., and Reith, M. “Satellite Control Shifts: How to Fly in the Age of Mega Constellations while Maintaining Operational Cybersecurity”, 20th European Conference on Cyber Warfare and Security, The University of Chester, United Kingdom. 24-25 June 2021
- Lin, B.*, Henry, W. and Reith, M. “Mandatory Cybersecurity Training for All Space Force Guardians”, 20th European Conference on Cyber Warfare and Security, The University of Chester, United Kingdom. 24-25 June 2021.
- Creek, T.*, Reith, M. and Mullins, B. “Effectiveness of Covert Communication Channel Mitigation Across the OSI Model”, 20th European Conference on Cyber Warfare and Security, The University of Chester, United Kingdom. 24-25 June 2021.
- Voltz, C.*, Reith, M., Long, D. and Dill, R. “Improving Joint All Domain Operations (JADO) Education”, 16th International Conference on Cyber Warfare and Security, Cookeville, TN. 25-26 February 2021.
- Woods, T.* and Reith, M. “Information Warfare: Current Posture and Ideas for Improvement”, 16th International Conference on Cyber Warfare and Security, Cookeville, TN. 25-26 February 2021.
- Flack, N.*, Voltz, C.*, Dill, R., Lin, A. and Reith, M. “Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study”, 15th International Conference on Cyber Warfare & Security, Norfolk, VA. 12-13 March 2020.
- Park, Y.*, Reith, M. and Mullins, B. “Operational Risk Assessment on Internet of Things: Mitigating Inherent Vulnerabilities”, 18th European Conference on Cyber Warfare & Security, Coimbra, Portugal. 4-5 July 2019.
- Newlin, M.*, Reith, M. and DeYoung, M. “Synthetic Data Generation with Machine Learning for Network Intrusion Detection Systems”, 18th European Conference on Cyber Warfare & Security, Coimbra, Portugal. 4-5 July 2019.
- Dukarm, C.*, Dill, M.* and Reith, M. “Improving Phishing Awareness in the United States Department of Defense”, 18th European Conference on Cyber Warfare & Security, Coimbra, Portugal. 4-5 July 2019.
- Flack, N.* and Reith, M. “Self-Directed Learning Tools in USAF Multi-Domain Operations Education”, 18th European Conference on Cyber Warfare & Security, Coimbra, Portugal. 4-5 July 2019.
- Tomcho, L.*, Reith, M., Long, D., Coggins, M. and Lin, A. “Applying Game Elements to Cyber eLearning”, 14th International Conference on Cyber Warfare & Security, Stellenbosch, South Africa. 28 February – 1 March 2019.
- Martin, S.* and Reith, M. “Rethinking USAF Cyber Education and Training”, 14th International Conference on Cyber Warfare & Security, Stellenbosch, South Africa. 28 February – 1 March 2019.
- Pendleton, A.* and Reith, M. “Quantifying Cyber Vulnerability Risk in Acquisitions”, 14th International Conference on Cyber Warfare & Security, Stellenbosch, South Africa. 28 February – 1 March 2019.
- Dillon, P.* and Reith M. “Building Irrefutable Trust throughout Computer Networks using Blockchains”, 14th International Conference on Cyber Warfare & Security, Stellenbosch, South Africa. 28 February – 1 March 2019.
- Martin, S.* and Reith, M. “Cybersecurity is like Medicine, Users are Patients, Let’s Communicate That Way”, 22nd Colloquium on Information Systems Security Education, Washington DC. 11-13 June 2018.
- Bradford L.*, Mullins, B., Dunlap, S. and Reith, M. “Developing Low-Cost and Effective ICS Cyber Training Environments”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Bramlette, C.* and Reith, M. “Framework for Assessing Cyber Risk/Effects in Context of Air Force Operations”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Guion, J.* and Reith, M. “Building Mission-Centric Cyber Risk Assessments”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Kang, M.*, Hopkinson, K., Betances, A. and Reith, M. “Mitigation of Cyber Warfare in Space through Reed Solomon Codes”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Reith, M., Trias, E., Dacus, C., Martin, S.* and Tomcho, L.* “Rethinking USAF Cyber Education and Training”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Swihart, E.* and Reith, M. “Redefining the Air-gap for our Weapon Systems”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Mayer, S.*, Reith, M. and Mullins, B. “Look Again, Neo: A Software-Defined Networking Moving Target Defense”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Roldan, H.* and Reith, M. “A Strategic Framework for Cyber Attacks in the Military”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Bruza, M.* and Reith, M. “Teaming with Silicon Valley to Enable Multi-Domain Command and Control”, 13th International Conference on Cyber Warfare & Security, Washington DC. 8-9 March 2018.
- Guion, J.* and Reith, M. “Cyber Terrain Mission Mapping”, 2017 International Conference on Cyber Conflict U.S., Washington DC. 7-8 Nov 2017.
- Bruza, M.* and Reith, M. “Multi-Domain Command and Control: The Need for Capability Transparency”, 2017 International Command & Control Research & Technology Symposium, Los Angeles CA. 6-8 Nov 2017.
- Pentecost, S.* and Reith, M. “An Advanced Maintenance Model for GPS Modernization”, 2017 Joint Navigation Conference, Dayton OH. 6 June 2017.
- Guion, J.* and Reith, M. “Dynamic Cyber Mission Mapping”, 2017 Industrial & Systems Engineers Conference, Pittsburgh PA. 20-23 May 2017.
- Kang, M.* and Reith, M. “Profiling in the Air Force to Reduce Insider Threat”, 2017 Industrial & Systems Engineers Conference, Pittsburgh PA. 20-23 May 2017.
- Mayer, S.* and Reith, M. “Sins of the Father: Avoiding Design Mistakes via Abuse Cases”, 2017 Industrial & Systems Engineers Conference, Pittsburgh PA. 20-23 May 2017.
- Reith, M., Pentecost, S.*, Celebucki, D.* and Kaufman, R. “Operationalizing Cyber: Recommendations for Future Research”, 12th International Conference on Cyber Warfare & Security, Dayton OH. 2-3 March 2017.
- Reith, M., Niu, J. and Winsborough, W.H. "Towards Practical Analysis for Trust Management Policy", Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), pp 310-321, March 2009.
- Reith, M., Niu, J. and Winsborough, W.H. "Engineering Trust Management into Software Models", Proceedings of ICSE Workshop on Modeling in Software Engineering (MISE07), May 2007.
- Reith, M., Niu, J. and Winsborough, W.H. "Apply Model Checking to Security Analysis in Trust Management", Proceedings of the ICDE Workshop SECOBAP, April 2007.
Conference Publications (Refereed Abstract)
- Dukes, A.* and Reith, M. “A Usability Framework for Designing Digital Engineering Solutions”, 26th Annual Systems & Mission Engineering Conference, Norfolk, VA, 16-19 October 2023.
- Larkin, R.*#, Jensen, S.*, Koranek, D.*, Mullins, B. and Reith, M. “Towards Dynamically Shifting Cyber Terrain with Software-Defined Networking and Moving Target Defense”, 16th International Conference on Cyber Warfare and Security, Cookeville, TN. 25-26 February 2021.
- Reith, M. “Software Acquisition in the Age of Cyber Warfare”, 23rd Systems & Software Technology Conference, Salt Lake City UT. 16-19 May 2011.
- Reith, M. “A Brief Study of Software Engineering Professional Continuing Education in DoD Acquisition”, 22nd Systems & Software Technology Conference, Salt Lake City UT. 26-29 April 2010.
- Reith, M., Niu, J. and Winsborough, W.H. "Role-Based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE)", Proceedings of the 30th ACM/IEEE International Conference on Software Engineering (ICSE) Research Demonstration, pp 929-930, May 2008.
Invited Talks
- Reith, M. (2023) “Examining the Value of Serious Games in DoD Workforce Development”, Air Force Learning Professionals Q&A, 26 July 2023.
- Moore, J.*# and Reith, M. “Applying Serious Game Design Frameworks to Existing Games for Integration of Custom Learning Objectives”, International Research Conference 2022, 9-10 Dec 2022, New York
- Reith, M. “How Industry and Academia Can Partner on Cybersecurity”, Academic Panel, Dayton Defense Cyber Dialogue with Industry, 27 February 2023
- Reith, M. “Using Game-based Learning & Assessment in Higher Education”, AFIT/LS Faculty Development, 17 February 2023