Dr. Michael R. Grimaila, Ph.D., CISM, CISSP

Professor of Systems Engineering

Bio Photo

 

Contact:
Comm: 937.255.3636 x4800
DSN: 785.3636 x4800
Click to E-mail
View Department

Education

ACADEMIC DEGREES:

  • Post-Doctoral Fellowship in Information Assurance (2007); University of Maryland University College; Adelphi, Maryland; Awarded NSA 4011, NSA 4012, NSA 4013 IA Certificates.
  • Doctor of Philosophy in Computer Engineering (1999); Texas A&M University, College Station, TX. Research Fellowship: Semiconductor Research Consortium.
  • Master of Science in Electrical Engineering (1995);Texas A&M University, College Station, TX. Research Fellowship: Office of Naval Research.
  • Bachelor of Science in Electrical Engineering (1993); Texas A&M University, College Station, TX.

AFFILIATIONS:

  • Member - Center for Cyberspace Research (CCR),Air Force Cyberspace Technical Center of Excellence (AF CyTCoE).
  • Senior Member - Institute of Electrical and Electronics Engineers (IEEE).
  • Fellow - Information System Security Association (ISSA).
  • Advisory Board Member of IBM’s Network Science Research Center (NSRC).
  • Advisor to the Prince of Wales Fellows at MIT and Harvard
  • Advisor to the Prince Edward Fellows at MIT and Harvard

PROFESSIONAL CERTIFICATIONS AND LICENSES:

  • Certified Information System Security Professional (CISSP) - International Information Systems Security Certification Consortium, Inc. (ISC)2.
  • Certified Information Security Manager (CISM)- Information Systems Audit and Control Association (ISACA).
  • INFOSEC Assessment Methodology (NSA-IAM) - National Security Agency.
  • INFOSEC Evaluation Methodology (NSA-IEM) - National Security Agency.
  • IS-001 Emergency Program Manager - Department of Homeland Security Emergency Management Institute.
  • IS-003 Radiological Emergency Management - Department of Homeland Security Emergency Management Institute.
  • IS-275 The Emergency Operations Center's Role in Community Preparedness, Response and Recovery Activities - Department of Homeland Security Emergency Management Institute.
  • Electronic Technician - Texas A&M University Extension Service; College Station, TX.

Awards

  • Advisory Board Member of IBM’s Network Science Research Center (2012).
  • AFIT Board of Visitors Colonel Charles Stone Award (2012).
  • AFIT/ENV Researcher of the Year (Spring 2012).
  • Advisor to the Prince of Wales Fellows at MIT and Harvard (2011).
  • Advisor to the Prince Edward Fellows at MIT and Harvard (2011).
  • Fellow of the Information System Security Association (2011).
  • ISC² 2011 U.S. Government Information Security Leadership Award (2011) – Member of AFIT’s Center for Cyberspace Research (CCR) Cyber 200/300 Professional Continuing Education Team.
  • National Research Council (NRC) Research Advisor (2010).
  • IEEE Conference on Information Privacy, Security, Risk and Trust Best Paper Award (2010).
  • 15th International Command and Control Research and Technology Symposium Best Paper Award (2010).
  • AFIT/ENV Teacher of the Year (Spring 2010).
  • AFIT Professional Performer (Winter 2010).
  • Air Force Center for Systems Engineering - Research Fellow (2009-2010).
  • Air Force Institute of Technology ENV Professor of the Quarter (Spring 2006).
  • Gage H. Crocker Outstanding Professor Award (2005).
  • Senior Member of the IEEE (Spring 2005).
  • Air Force Institute of Technology ENV Professor of the Quarter (Spring 2005).
  • Texas A&M University IEEE Outstanding Professor of the Year (2000-2001).
  • Texas A&M University Eta Kappa Nu Outstanding Professor of the Year (2000-2001).
  • Texas A&M University IEEE Outstanding Professor of the Year (1999-2000).
  • Texas A&M University Eta Kappa Nu Outstanding Professor of the Year (1999-2000).
  • IEEE VLSI Test Symposium Best Paper Award (2000).
  • IEEE VLSI Test Symposium Outstanding Research Contribution Award (1999).

Publications

Book Chapters (6):

  1. Mills, R.F.5, Peterson, G.L.5, and Grimaila, M.R., “Insider Threat Prevention, Detection and Mitigation,” Cyber Security and Global Information Assurance: Threat Analysis and Response Solution, K. J. Knapp (ed), U.S. Air Force Academy, Colorado, USA, 2010, pp. 48-74.
  2. Hass, M.6, Mills, R.F.5, and Grimaila, M.R., “Aiding Understanding of a Contested Information Environment's Effect on Operations,” Human-in-the-Loop Simulations - Methods and Practice, L. Rothrock and S. Narayanan, S. (Eds.), ISBN 978-0-85729-882-9, 2011, pp. 175-202.
  3. Beeker, K.R.2, Mills, R.F.5, Grimaila, M.R., and Haas, M.W.6, “Can an Operationally Responsive Cyberspace Play a Critical Role in the Strategic Deterrence Equation?,” Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century, A.B. Lowther, ed., New York : Palgrave-MacMillan, Dec 2012, pp. 17-32.†
  4. Morris, J.D. 1, Grimaila, M.R., Hodson, D.5, Jacques, D.5, and Baumgartner, G.6, “System Security Engineering for Information Systems,” Emerging Trends in Information System Security, 1st Ed., Elsevier, ISBN 9780124114746, Nov. 2013, pp. 141-151.†
  5. Mailloux, L.O. 1, Grimaila, M.R., Colombi, J.5, Hodson, D.5, and Baumgartner, G.6, “System Security Engineering for Information Systems,” Emerging Trends in Information System Security, 1st Ed., Elsevier, ISBN 9780124114746, Nov. 2013, pp. 5-23.†
  6. Beeker, K.R.2, Mills, R.F.5, Grimaila, M.R., and Haas, M.W.6, “Operationally Responsive Cyberspace: A Critical Piece in the Strategic Deterrence Equation,” Deterrence: Rising Powers, Rogue Regimes, and Terrorism in the Twenty-First Century, A.B. Lowther, ed., Air Force Research Institute, Air University, , Dec. 2013.

Archival Journal Publications (70):

  1. Grimaila, M.R. and Pineda de Gyvez, J.4, "Parametric Fault Identification and Dynamic Compensation Techniques for Cellular Neural Network Hardware," IET Circuits, Devices, and Systems; Vol. 143, Issue 5; Oct. 1996, pp. 295-301.†/D/F/Y
  2. Grimaila, M.R., Pineda de Gyvez, J.4 and Han, G., "Robust Functional Testing for VLSI Cellular Neural Network Implementations," IEEE Transactions on Circuits and Systems I; Vol. 44, Issue 2; Feb. 1997, pp. 161-166.†/D/F/Y
  3. Dworak, J.2, Wicker, J.2, Lee, S.2, Grimaila, M.R., Butler, K.6, Stewart, B.6, Wang, L.4, and Mercer, M.R.4, "Defect-Oriented Testing and Defective Part Level Prediction for Commercial Sub-Micron ICs," IEEE Computer Design and Test; Jan.-Feb. 2001, pp. 31-41.D
  4. Grimaila, M.R. and Kim, I.1, "An Undergraduate Business Information Security Course and Laboratory," Journal of Information Systems Education, Vol. 13(3); Oct. 2002, pp. 189-195.†
  5. Grimaila, M.R., "Maximizing the Educational Value of Business Information Security Curriculum,” IEEE Computer Security and Privacy, Vol. 2, Issue 1, Jan.-Feb. 2004, pp. 56-60. †
  6. Grimaila, M.R. and Kulkarni, A.S.1, “Information Security Challenges: Camera Phones,” The Information System Security Association (ISSA) Journal, 3(3), Aug. 2004, pp. 26-31. †
  7. Grimaila, M.R. and Kulkarni, A.S.1, “Challenges in Achieving Sarbanes-Oxley Compliance,” The Information System Security Association (ISSA) Journal, 3(9), Feb. 2005, pp. 9-13. †
  8. Anderson, E.6, Grimaila, M.R., and Richmond, W.6, "Enterprise Computing: Server Price/Performance Relationships," IEEE Transactions on Engineering Management, Vol. 52, Issue 3, Aug. 2005, pp. 329-335.
  9. Freedman, K.1 and Grimaila, M.R., “Contingency Planning for an Air Force Space Command Information System,” High Frontier Journal, Vol. 2, No. 3, Apr. 2006, pp. 76-81. †
  10. Gottrich, D.1 and Grimaila, M.R., “Managing the Integration of Space and Information Operations,” High Frontier Journal, Vol. 2, No. 3, Apr. 2006, pp. 44-49. †
  11. Hubenko, V.P.2, Raines, R.A.4, Mills, R.F.4, Baldwin, R.O.4, Mullins, B.E.4, and Grimaila, M.R., “Improving Global Information Grid’s Performance Through Satellite Communications Layer Enhancements”, IEEE Communications, Nov. 2006, Vol. 44, No. 11, pp. 66-72.
  12. Bailey, T.1 and Grimaila, M.R., “Information Technology, Terrorism, and the Transformation of the Islamic Mass-Culture in the Arab World,” Terrorism and Political Violence Journal, Vol. 18, No. 4, Jan. 2007, pp. 523-543. †/∞
  13. Grimaila, M.R., “RFID Security Concerns,” The Information System Security Association (ISSA) Journal, Â (6)1, Feb. 2007, pp. 30-35.†
  14. Hubenko, V.P.2, Raines, R.A.5, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “Improving Satellite Multicast Security Scalability by Reducing Re-Keying Requirements,” IEEE Network, vol. 21, no. 4, pp. 51-56, 2007.
  15. Edge, K.S.2, Raines, R.A.5, Baldwin, R.O.5, Grimaila, M.R., Bennington, R.W.6, and Reuter, C.E.6, "Analyzing Security Measures for Mobile Ad Hoc Networks Using Attack and Protection Trees," Journal of Information Warfare, April 2007, Vol. 6, No. 2, pp. 25-38.
  16. Choobineh, J.6, Dhillon, G.6, Grimaila, M.R., and Rees, J.6, “Management of Information Security: Challenges and Research Directions,” Communications of the Association for Information Systems, vol. 20, no. 57, 2007.
  17. Yates, H.1 and Grimaila, M.R., “A Systematic Approach to Securing our Space Assets,” High Frontier Journal, Vol. 4, No. 2, Mar. 2008, pp. 48-53. †
  18. Marsh, D.W.2, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “A Security Policy Language for Wireless Sensor Networks,” Journal of Systems and Software, January 2009, Vol. 82, No. 1, pp. 101-111.
  19. Ward, D. 2 and Grimaila, M.R., “Who Shall Defend Us? Determining National defense Roles in the Internet Age,” The Information System Security Association (ISSA) Journal, 7(3), March 2009, pp. 10-16.†
  20. Legradi, J.D.2, Grimaila, M.R., and Smith, D.5, “An Exploratory Social Network Analysis of Military and Civilian Emergency Operation Centers with a Focus on Organizational Structure,” Defense Threat Reduction Agency Journal, Vol. 1, No. 1, January 2010, pp. 1-21.
  21. Beeker, K.R.2, Mills, R.F.5, and Grimaila, M.R., “Applying Deterrence in Cyberspace,” Information Operations Journal, Information Operations Institute, Vol. 1, No. 4, February 2010, pp. 21-27.
  22. Grimaila, M.R. and Badiru, A.5, "A Hybrid Dynamic Decision Making Methodology for Defensive Information Technology Contingency Measure Selection in the Presence of Cyber Threats," Operational Research, Springer, DOI: 10.1007/s12351-010-0102-2, Vol. 10, No. 3, pp. 1-22, January 2011. †/∞
  23. Choobineh, J.6, Anderson, E.A.6, Fazen, M.2, and Grimaila, M.R., “Assessment of Mission Risk:Â Role of Protection of Information and Communication Technology Resources,” Journal of Information Warfare, 10:1, April 2011, pp. 1-17.
  24. Mills, R.F.5, Grimaila, M.R., Peterson, G.5, and Butts, J.5, “A Scenario-Based Approach to Mitigating the Insider Threat,” The Information System Security Association (ISSA) Journal, 9(5), May 2011, pp. 12-19.†
  25. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics,” IEEE Communications Surveys and Tutorials, Vol. 14, No. 2, 2012, pp. 579-606.
  26. Bryant, A.R.2, Mills, R. F.5, Peterson, G. L.5, and Grimaila, M.R., “Software Reverse Engineering as a Sensemaking Task,” Journal of Information Assurance and Security. 6(6), 2011, pp 483-494.
  27. Dube, T.2, Raines, R.5, Peterson, G.5, Bauer, K.5, Grimaila, M.R. and Rogers,S.5, “Malware Target Recognition via Static Heuristics,” Journal of Computers and Security, Vol. 31, Issue 1, February 2012, pp. 137-147.
  28. Grimaila, M.R., Morris, J1., Hodson, D.5, “Quantum Key Distribution: A Revolutionary Security Technology,” The Information System Security Association (ISSA) Journal, 10(6), June 2012, pp. 20-27.†
  29. Grimaila, M.R., Myers, J.1, Mills, R.F.5, and Peterson, G.5, “Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512911399303, Vol. 9(3), pp. 219-241, 2012. †/∞
  30. Vaarandi, R.6 and Grimaila, M.R., “Security Event Processing with Simple Event Correlator,” The Information System Security Association (ISSA) Journal, 10(8), August 2012, pp. 30-37.†
  31. Gilman, J.M.2, Miller, M.E.5, and Grimaila, M.R., “A Simplified Control Scheme for a Daylight-Matched LED Lamp,” Lighting Research and Technology, Sage Press, DOI: 10.1177/1477153512452276, September 26, 2012, pp. 614-629.
  32. Sturtevant, M.2, Grimaila, M.R., and Sitzabee, W.5, “An Asset Management-Based Methodology for Integrating Guardrail Sensors Into an Existing Intelligent Transportation System,” Public Works Management & Policy, Sage Press, DOI: 10.1177/1087724X12469508, December 26, 2012. †
  33. Finke, C.2, Butts, J.5, Mills, R.5, Grimaila, M.R., “Enhancing the security of aircraft surveillance in the next generation air traffic control system,” International Journal of Critical Infrastructure Protection, 6(1), March 2013, ISSN 1874-5482, 10.1016/j.ijcip.2013.02.001, pp.3-11.
  34. Bryant, A.R.2, Mills, R.F.5, Grimaila, M.R., and Peterson, G L.5, “Top Level Goals in Reverse Engineering Software,” Journal of Information Warfare. 12(1), 2013, pp. 32-43.
  35. Bochert, J.R.2,7, Grimaila, M.R., and Kim, Y6. “Software Protection Against Side Channel Analysis Through a Hardware Level Power Difference Eliminating Mask,” Journal of Cyber Security & Information Systems, May 2013, pp. 22-29. †
  36. Musman, S.6 and Grimaila, M.R., “Mission Assurance Challenges within the Military Environment,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN), IGI Global, 5(2), DOI: 10.4018/jitn.2013040105, April-June 2013, pp. 51-65. †
  37. T. Dube2, R. Raines5, M.R. Grimaila, K. Bauer5 and S. Rogers5, "Malware Target Recognition of Unknown Threats," IEEE Systems Journal, 7(3), DOI 10.1109/JSYST.2012.2221913, September 2013, pp. 467-477.
  38. Johnson, J.2,7, Grimaila, M.R., Humphries, J.5, and Baumgartner, G.6, “An Analysis of Error Reconciliation Protocols used in Quantum Key Distribution Systems,” Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512913503418, pp. 1-11, September 2013.†/∞
  39. Mailloux, L.O.1, Grimaila, M.R., Hodson, D.D.5, and Colombi, J.M.5, “A Practical Assessment of Security Design Patterns,” The Information System Security Association (ISSA) Journal, 11(9), September 2013, pp. 29-35. †
  40. Panton, B.C.2, Colombi, J.M.5, Grimaila, M.R., and Mills, R.F.5, “Secure DoD Software: Considerations for the Vulnerability Market,” Cross Talk, The Journal of Defense Software Engineering, November/December 2013, pp. 18-21.
  41. Larkin, R.D.2, Lopez, J.5, Butts, J.W.5, and Grimaila, M.R., “Evaluation of Security Solutions in the SCADA Environment,” The DATA BASE for Advances in Information Systems,” Vol. 45, No. 1, February 2014, pp. 38-53.
  42. Morris, J.D.1, Hodson, D.D.5, Grimaila, M.R., Jacques, D.R.5, and Baumgartner, G.6, “Towards the Modeling and Simulation of Quantum Key Distribution Systems,” International Journal of Emerging Technology and Advanced Engineering, Vol. 4, No. 2, February 2014, pp. 11-22.
  43. Panton, B.2, C., Colombi5, J.M., Grimaila, M.R., and Mills, R.F.5, “Strengthening DoD cyber security with the vulnerability market,” Defense Acquisition review journal (DARJ). Defense Acquisition Review Journal (DARJ), 21(1), 2014, pp. 466-484.
  44. Tran, T.2, Racz, L.5, Grimaila, M.R., Miller, M.5, and Harper, W.F.5, “Comparison of continuous versus pulsed ultraviolet light emitting diode use for the inactivation of Bacillus globigii spores,” Water Science and Technology, doi: 10.2166/wst.2014.395, 70(9), 2014, pp. 1473-1480.
  45. Morris, J.D.1, Grimaila, M.R., Hodson, D.5, McLaughlin, C.6, and Jacques, D.5, “Using the Discrete Event System Specification to Model Quantum Key Distribution System Components,” Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512914554404, October 17, 2014, pp 1-24.
  46. Ramsey, B.2, Mullins, B.5, Temple, M.5, and Grimaila, M.R., “Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation, IEEE Transactions on Dependable and Secure Computing, PP(99), DOI:  10.1109/TDSC.2014.2366455, November 2014, pp. 1-14.
  47. Mailloux, L.O.1, Grimaila, M.R., Hodson, D.D.5, Baumgartner, G.6, and McLaughlin, C.6, “Performance Evaluations of Quantum Key Distribution System Architectures,” IEEE Security and Privacy, 13(1), January-February 2015, pp. 30-40.
  48. Mailloux, L.O.1, Morris, J.D.1, Grimaila, M.R., Hodson, D.D.5, Jacques, D.R.5, Colombi, J.M.5, McLaughlin, C.V.6, and Holes, J.A.1, “A Flexible Modeling Framework for Studying Quantum Key Distribution System Implementation Non-Idealities, IEEE Access, Vol. 3, January 2015, pp. 110–130.
  49. Sorensen, N.T.1 and Grimaila, M.R., “Discrete Event Simulation of the quantum channel within a Quantum Key Distribution system,” Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, Sage Press, DOI: 10.1177/1548512915569743, February 2014, pp. 1-8. †/∞
  50. Mailloux, L.O.1, Engle, R.D.1, Grimaila, M.R., Hodson, D.5, Colombi, J.M.5, and McLaughlin, C.6, “Modeling Decoy State Quantum Key Distribution Systems,” Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, DOI: 10.1177/1548512915588572, June 2015, pp. 1-18.
  51. Mailloux, L.O.1, Grimaila, M.R., Colombi, J.M.5, Hodson, D.5, McLaughlin, C.6, Engle, R.1, and Baumgartner, G.6, “Quantum Key Distribution: Examination of Decoy State Performance,” IEEE Communications.
  52. Mailloux, L.O. 1, Hodson, D.D. 5, Grimaila, M.R., Colombi, J.M. 5, McLaughlin, C.V. 6, and Baumgartner, G. 6, “Test and Evaluation of Complex Cybersecurity Systems: A Case Study in Using Modeling and Simulation to Understand, Test, and Evaluate the Security of Quantum Key Distribution Systems,” The International Test and Evaluation Association (ITEA) Journal, 2015, 36(3), pp. 199-207.
  53. Engle, R.D.1, Hodson, D.D.5, Mailloux, L.O.5, Grimaila, M.R., McLaughlin, C.V. 6, & Baumgartner, G.B. 6, “A module-based simulation framework to facilitate the modeling of quantum key distribution system post-processing functionalities,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, September 5, 2016, DOI: 10.1177/1548412916666740, pp. 1-12.
  54. Mailloux, L.O.1, Hodson, D.D.5, Grimaila, M.R., McLaughlin, C.V.6, and Baumgartner, G.6, “Quantum Key Distribution: Boon or Bust,” Journal of Cyber Security & Information Systems (CSIAC) Journal, June 2016, 4(2), pp. 18-25.
  55. Mailloux, L.O.5, Lewis II, C.D. 5, Riggs, C.1, & Grimaila, M.R., “Post-quantum cryptography: what advancements in quantum computing mean for IT professionals,” IT Professional, 2016, 8(5), 42-47.
  56. Mailloux, L.O. 1, Hodson, D.D. 5, Grimaila, M.R., Engle, R.D. 1, McLaughlin, C.V. 6, and Baumgartner, G. 6, “Using Modeling and Simulation to Study Photon Number Splitting Attacks,” IEEE Access, DOI: 10.1109/ACCESS.2016.2555759, 2016, Vol. 4, pp. 2188-2197.
  57. Engle, R.D.1, Mailloux, L.O. 5, Grimaila, M.R., Hodson, D.D.5, McLaughlin, C.V., & Baumgartner, G.B.6, “Implementing the decoy state protocol in a practically-oriented quantum key distribution system-level model,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, March 23, 2017, DOI: 10.1177/1548512917698053, pp. 1-18.
  58. Hodson, D.D.5, Grimaila, M.R., Mailloux, L.O. 5, Grimaila, M.R., McLaughlin, C.V. 6, & Baumgartner, G.B. 6,” Modeling quantum optics for quantum key distribution system simulation,” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, January 12, 2017, DOI: 10.1177/1548512916684561, pp. 1-12.
  59. Mailloux, L.O.5, Grimaila, M.R., Hodson, D.D. 5, and Baumgartner, G. 6, “The benefits of joining a multidisciplinary research team,” IEEE Potentials, 2017, 36(3), 18-22.
  60. Denton, J.C.1, Hodson, D.D. 5, Cobb, R.G. 5, Mailloux, L.O. 5, Grimaila, M.R., & Baumgartner, G.B.6, "A model to estimate performance of space-based quantum communication protocols including quantum key distribution systems," The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, January 16, 2017, DOI: 10.1177/1548512916684562, pp. 1-19.
  61. Mailloux, L.O.5, Grimaila, M.R., Hodson, D.D.5, McLaughlin, C.6, & Baumgartner, G.6, “Modeling, simulation, and performance analysis of decoy state enabled quantum key distribution systems,” Applied Sciences, 2017, 7(2), 212.
  62. Mailloux, L.O. 5 and Grimaila, M.R., “Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce,” IEEE IT Professional, 2018, 20(3), 23-30.
  63. Span, M.T. 5, Mailloux, L.O. 5, Grimaila, M.R., “Cybersecurity Architectural Analysis for Complex Cyber-Physical Systems,” The Cyber Defense Review, Army Cyber Institute, Vol. 3, No. 2, pp. 115-134, August 2018.
  64. Engle, R.1, Langhals, B.T.5, Grimaila, M. R., Hodson, D.5, “Evaluation Criteria for Selecting NoSQL Databases in a Single-Box Environment,” International Journal of Database Management Systems, Vol 10, No 4, August 2018.
  65. Okolica, J.S.5, Peterson, G.5, Mills, R.F.5, and Grimaila, M.R., “Sequence Pattern Mining with Variables,” IEEE Transactions on Knowledge and Data Engineering, pp. 1-20, 19 November 2018, DOI: 10.1109/TKDE.2018.2881675.
  66. Engle R.2, Langhals, B.5, Grimaila, M.R., Hodson, D.D.5, “A Methodology for Storing Log Data with Changing Structure in a Relational Database,” Journal of DoD Research and Engineering, Vol 4, Issue 1, January 2021.
  67. Tryhorn, D.2, Dill, R.5, Hodson, D.D.5, Grimaila, M.R., and Myers, C.W.6, "Modeling fog of war effects in AFSIM," The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology; August 27, 2021; https://doi.org/10.1177/15485129211041963, pp. 21-39.
  68. Llewellyn, L.C.1, Grimaila, M.R., Hodson, D.D.5, and Graham, S.5, "A metric for quantifying nonlinearity in k-dimensional complex-valued functions," The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology; March 3, 2022, DOI: https://doi.org/10.1177/15485129221080399, pp. 1-11.
  69. Tryhorn, D.2, Dill, R.5, Hodson, D.D.5, Grimaila, M.R., and Myers, C.W.6, "Applying FOG Analysis to AFSIM Multi-Domain Class Scenarios," Journal of Information Warfare; April 26, 2022; 21.2: pp. 77-94.
  70. DeBerry, W.T.2, Dill, R.5, Hopkinson, K.5, Hodson, D.D.5, & Grimaila, M.R., “The wargame commodity course of action automated analysis method,” The Journal of Defense Modeling and Simulation; July 19, 2021; DOI: https://doi.org/10.1177/15485129211028318; pp 102-117.

Peer Reviewed Conference Publications (105):

  1. Grimaila, M.R. and Pineda de Gyvez, J.4, "A Macromodel Fault Generator for Cellular Neural Networks," Third IEEE International Workshop on Cellular Networks and their Applications (CNNA 94), Rome, Italy; Dec. 1994, pp. 369-374.†/D/F/Y
  2. Grimaila, M.R., Lee, S.2, Dworak, J.2, Butler, K.M.6, Stewart, B.6, Balachandran, H.6, Houchins, B.6, Mathur, V.6, Park, J.5, Wang, L.5, and Mercer, M.R.5, "REDO - Probabilistic Excitation and Deterministic Observation - First Commercial Experiment," Proceedings of the 1999 IEEE VLSI Test Symposium (VTS 99); Dana Point, CA; April 1999, pp. 268-274. (Best Paper Award)†/D/F/Y
  3. Dworak, J.2, Grimaila, M.R., Lee, S.2, Wang, L.4, and Mercer, M.R.4, "Modeling the Probability of Defect Excitation for a Commercial IC with Implications for Stuck-at Fault-Based ATPG Strategies," Proceedings of the 1999 Intl. Test Conference (ITC 99); Atlantic City, NJ; Sept. 1999, pp. 1031-1037.D
  4. Dworak, J.2, Grimaila, M.R., Lee, S.2, Wang, L.4, and Mercer, M.R.4, "Enhanced DO-RE-ME Based Defect Level Prediction Using Defect Site Aggregation – MPGD," Proceedings of the 2000 International Test Conference (ITC 2000); Atlantic City, NJ; Sept. 2000, pp. 930-939.D
  5. Dworak, J.2, Grimaila, M.R., Cobb, B.2, Wang, T.C.4, Wang, L.C.4, and Mercer, M.R.4, "On the Superiority of DO-RE-ME / MPG-D Over Stuck-at-Based Defective Part Level Prediction," Proceedings of the 2000 IEEE Asian Test Symposium (ATS 2000); Taipei, Taiwan; Dec, 2000, pp. 151-157.D
  6. Lee, S.2, Dworak, J.2, Cobb, B.2, Grimaila, M.R., and Mercer, M.R.4, "A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults," Design, Automation, and Test in Europe (DATE 2002); Paris, France; Mar. 4-8, 2002, pp. 94-99.
  7. Anderson, E.4, Choobineh, J.4, and Grimaila, M.R., "The Management of Information Security in Private Sector Organizations: Research Questions and Directions," Texas Workshop on Information System Security (TWISS 2003); College Station, TX; April 2, 2003. †
  8. Tian, Y.1, Grimaila, M.R., Shi, W.4, and Mercer, M.R.4, "Minimizing Defective Part Level Using a Linear Programming Based Optimal Test Selection Method," Twelfth Annual Asian Test Symposium (ATS 2003); Xian, China; Nov. 17-19, 2003.
  9. Grimaila, M.R., “A Novel Scenario-Based Information Security Management Exercise,” The Information Security Curriculum Development Conference (InfoSecCD04), Kennesaw, GA. Oct. 8, 2004.†
  10. Anderson, E.4, Choobineh, J.4, and Grimaila, M.R., "An Enterprise Level Security Requirements Specification Model," Proceedings of the 38th Annual Hawaii International Conference (HICSS 2005), The Big Island, HI, Jan. 2005, pp. 186-196. †
  11. Tian, Y.1, Grimaila, M.R., Shi, W.4, and Mercer, M.R.4, “An Optimal Test Pattern Selection Method to Improve the Defect Coverage,” Proceedings of the 36th IEEE International Test Conference (ITC 2005); Austin, TX; Nov. 8-10, 2005.
  12. Scurlock, A.1 and Grimaila, M.R., “Naval Information Assurance Education and Training within the Navy Marine Corps Intranet,” Proceedings of the 2006 Phoenix Challenge Conference (PC2006); Johns Hopkins University; Laurel, MD; Jan. 31–Feb. 2, 2006. †
  13. Grimaila, M.R. and Crawford, J.A.1, “A Total Cost of Ownership (TCO) Model for Software Protection Schemes,” Proceedings of the 2006 International Conference on Information Warfare and Security (ICIW 2006); University of Maryland Eastern Shore, MD; March 15-16, 2006. †
  14. Lawson, J.1 and Grimaila, M.R., “Improving TCP/IP Performance over Geosynchronous Satellite Links,” Proceedings of the 2006 Information Resources Management Association Conference (IRMA 2006); Washington, D.C.; May 21-24, 2006. †
  15. Schroeder, N.1 and Grimaila, M.R., “Revealing Prospect Theory Bias in Information Security Decision Making,” Proceedings of the 2006 Information Resources Management Association Conference (IRMA 2006); Washington, D.C.; May 21-24, 2006. †
  16. Valentine, J.2, Mills, R.4, Grimaila, M.R., and Elder, K.4, “Network Centric Warfare and E-Business – It’s About More Than Just New Technology,” Proceedings of the 11th Coalition Command and Control in the Networked Era (ICCRTS 2006); Cambridge, UK; Sept. 26-28, 2006.
  17. Levoy, T.1, Grimaila, M.R., and Mills, R.4, “A Methodology for Customizing Security Auditing Templates for Malicious Insider Detection,” Proceedings of the 8th International Symposium on System and Information Security (ISSIS 2006); Sao Jose dos Campos, Sao Paulo, Brazil; Nov. 08-10, 2006. †
  18. Edge, K.2, Raines, R.5, Grimaila, M.R., Baldwin, R.5, Bennington, B.6, and Reuter, C.6, “The Use of Attack and Protection Trees to Analyze Security for an Online Banking System,” Proceedings of the 40th Annual Hawaii International Conference (HICSS 2007), Honolulu, HI., Jan. 2007, pp. 144-154.
  19. Blomme, M.E.2 and Grimaila, M.R., “Merging Cultures: Integrating MASINT into Air Operations,” Proceedings of the 2007 Phoenix Challenge Conference (PC2007); Kirtland Air Force Base; Albuquerque, NM; Feb. 28-Mar. 1, 2007. †
  20. Grimaila, M.R., Roehl, J.1, and Turner, J.4, “Internet Geolocation for Cyber Attack Attribution,” Proceedings of the 2007 Phoenix Challenge Conference (PC2007); Kirtland Air Force Base; Albuquerque, NM; Feb. 28-Mar. 1, 2007. †
  21. Edge, K. 2, Raines, R. 5, Grimaila, M.R., Baldwin, R. 5, Reuter, C. 6, and Bennington, B. 6, “Analyzing Security Measures for Mobile Ad Hoc Networks Using Attack and Protection Trees,” Proceedings of the 2007 International Conference on Information Warfare and Security (ICIW 2007); Naval Postgraduate School, Monterey, CA; March 8-9, 2007.
  22. Fortson, L.W.1 and Grimaila, M.R., “Development of a Defensive Cyber Damage Assessment Framework,” Proceedings of the 2007 International Conference on Information Warfare and Security (ICIW 2007); Naval Postgraduate School, Monterey, CA; Mar. 8-9, 2007. †
  23. Bryant, S.A.1 and Grimaila, M.R., “Security Risks in USAF Geospatial Information Sharing” Proceedings of the 2007 International Conference on Information Warfare and Security (ICIW 2007); Naval Postgraduate School, Monterey, CA; Mar. 8-9, 2007. †
  24. Bryant, A.R.1 and Grimaila, M.R., “Developing a Framework to Improve Information Assurance Battlespace Knowledge” Proceedings of the 2007 International Conference on Information Warfare and Security; Naval Postgraduate School, Monterey, CA; Mar. 8-9, 2007. †
  25. Grimaila, M.R. and Fortson, L.W.1, “Towards an Information Asset-Based Defensive Cyber Damage Assessment Process,” Proceedings of the 2007 IEEE Computational Intelligence for Security and Defense Applications (CISDA 2007); Honolulu, HI; April 1-5, 2007, pp. 206-212. †
  26. Hubenko, V.P., Raines, R.A.5, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “Applying a Secure and Efficient Low Earth Orbit Satellite-Based Multicast Architecture in a Deployed Environment,” Proceedings of the 2007 IEEE Military Communications Conference (MILCOM 07), Orlando FL, 29-31 October 2007.
  27. Hubenko, V.P.2, Raines, R.A.5, Baldwin, R.O.5, Mullins, B.E.5, Mills, R.F.5, and Grimaila, M.R., “A Secure and Efficient Satellite-based Multicast Architecture,” Proceedings of the 2008 IEEE Radio and Wireless Symposium, Orlando FL, 21-23 January 2008.
  28. Harris, R.2 and Grimaila, M.R., “Information Technology Contingency Planning,” Proceedings of the 2008 Southern Association for Information Systems Conference (SAIS 2008), Virginia Commonwealth University, Richmond, VA, 13-15 March 2008.
  29. Nicholson, B.2, Grimaila, M.R., Strouble, D.5, “Electronic Medical Record (EMR) Informatics Security,” Proceedings of the 2008 Southern Association for Information Systems Conference (SAIS 2008), Virginia Commonwealth University, Richmond, VA, 13-15 March 2008 (Nominated for Best Paper Award).
  30. Griffin, J.2 and Grimaila, M.R., “Insider Threats to Information Systems,” Proceedings of the 2008 Southern Association for Information Systems Conference (SAIS 2008), Virginia Commonwealth University, Richmond, VA, 13-15 March 2008.
  31. Grimaila, M.R., Stratton, M.A.1, Leach, S.E.5, and Roehl, J.6, “An Investigation of Limitations in the Accuracy of Time-To-Location Internet Protocol Geolocation,” Proceedings of the 2008 Phoenix Challenge Conference (PC 2008), Monterey, CA, 1-5 April 2008.
  32. Kelly, D.2, Raines, R.A.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., "Analyzing Anonymity in Cyberspace," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  33. Kelly, D.2, Raines, R.A.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., "A Framework for Classifying Anonymous Networks in Cyberspace," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  34. Scheeres, J.2, Mills, R.5, and Grimaila, M.R., "Establishing the Human Firewall: Improving Resistance to Social Engineering Attacks," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  35. Carls, J.1, Raines, R.A.5, Grimaila, M.R., and Rogers, S.6, "Biometric Security Enhancements Through Template Aging matching Score Analysis," Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  36. Strouble, D.5 and Grimaila, M.R., “Legal Aspects of Warfare in Cyberspace,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  37. Sorrels, D.1, Grimaila, M.R., Fortson, L.W.6, and Mills, R.F.5, “An Architecture for Cyber Incident Mission Impact Assessment (CIMIA),” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  38. Hellesen, D.1, Grimaila, M.R., Fortson, L.W.6, and Mills, R.F.5, “Information Asset Value Quantification,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  39. Haan, N.1, Grimaila, M.R., and Patel, R.6, “Insider Threat Detection within Embedded Weapon Systems,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  40. Cowan, R.1, Grimaila, M.R., and Patel, R.6, “Using Attack and Protection Trees to Evaluate Risk in an Embedded Weapon System,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  41. Ashe, E.1, Grimaila, M.R., and Carter, B.6, “A Framework for Improving Consistency of the Protection of Critical Technologies,” Proceedings of the 2008 International Conference on Information Warfare and Security (ICIW 2008), Peter Kiewit Institute, University of Nebraska Omaha, Omaha, NE, 24-25 April 2008.
  42. Grimaila, M.R., “Improving the Cyber Incident Mission Impact Assessment Process,” Cyber Security and Information Intelligence Research Workshop (CSIIRW 2008), Oak Ridge National Laboratory, Oak Ridge, TN, May 12-14, 2008.
  43. Grimaila, M.R., Mills, R.F.5, and Fortson, L.W.6, “An Automated Information Asset Tracking Methodology to Enable Timely Cyber Incident Mission Impact Assessment,” Proceedings of the 2008 International Command and Control Research and Technology Symposium (ICCRTS 2008), Bellevue, WA, 17-19 June 2008.
  44. Kelly, D.2, Raines, R.5, Grimaila, M.R., Baldwin, R.5, and Mullins, B.5, “A Survey of the State-of-the-Art in Anonymity Metrics,” Proceedings of the 1st ACM Workshop on Network Data Anonymization (NDA), pp. 31-40, George Mason University, Alexandria, VA., October 2008.
  45. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary,” Proceedings of the IEEE IPCCC International Workshop on Information and Data Assurance (WIDA), Austin, TX, December 2008.
  46. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Towards a Tree-based Taxonomy of Anonymous Networks,” Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 1-2, Las Vegas, NV, January 2009.
  47. Moore, T.W.1, Grimaila, M.R., and Strouble, D.5, “Laws and Regulations of USAF Military Operations in Cyberspace,” Proceedings of the 2009 International Conference on Information Warfare and Security (ICIW 2008), University of Cape Town, Breakwater Campus, Cape Town, South Africa, 26-27 March 2009.
  48. Grimaila, M.R., Fortson, L.W.1, Sutton, J.L.6, and Mills, R.F.5, “Developing Methods for Timely and Relevant Mission Impact Estimation,” Proceedings of the 2009 SPIE Defense, Security and Sensing Conference (SPIE DSS 2009), Orlando, FL, April 13-17, 2009.
  49. Myers, J.1, Grimaila, M.R., and Mills, R.F.5, “Towards Insider Threat Detection using Web Server Logs,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2009), Oak Ridge National Laboratory, Oak Ridge, TN, April 13-15, 2009.
  50. Kelly, D.2, Raines, R.5, Baldwin, R.5, Mullins, B.5, and Grimaila, M.R., “Towards a Taxonomy of Wired and Wireless Anonymous Networks,” IEEE International Communications Conference 2009, Dresden Germany, June 2009.
  51. Grimaila, M.R., Schechtman, G.5, and Mills, R.F.5, “Improving Cyber Incident Notification in Military Operations,” Proceedings of the 2009 Institute of Industrial Engineers Annual Conference, Miami, FL, May 30, 2009 - June 3, 2009.
  52. Grimaila, M.R., Fortson, L.W.1, and Sutton, J.L.6, “Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process,” Proceedings of the 2009 International Conference on Security and Management (SAM09), Las Vegas, NV, July 13-16, 2009.
  53. McDonald, T.J.5, Kim, Y.C.5, and Grimaila, M.R., “Protecting Reprogrammable Hardware with Polymorphic Circuit Variation,” Proceedings of the 2nd Cyberspace Research Workshop, Shreveport, LA, June 15, 2009.
  54. McDonald, T.J.5, Trias, E.D.5, Kim, Y.C.5, and Grimaila, M.R., “Using Logic-Based Reduction For Adversarial Component Recovery,” Proceedings of the 25th ACM Symposium on Applied Computing, Lausanne, Switzerland, March 22-26, 2010.
  55. Anderson, E.6, Choobineh, J.6, Fazen, M.2, and Grimaila, M.R., “Mission Impact:Â Role of Protection of Information Systems,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  56. Hellesen, D.1 and Grimaila, M.R., “Information Asset Value Quantification Expanded,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  57. Myers, J.1, Grimaila, M.R., and Mills, R.F.5, “Insider Threat Detection using Distributed Event Correlation of Web Server Logs,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  58. Hale, B.1, Grimaila, M.R., Mills, R.F.5, Haas, M.6, and Maynard, P.6, “Communicating Potential Mission Impact using Shared Mission Representations,” Proceedings of the 2010 International Conference on Information Warfare and Security (ICIW 2010), WPAFB, OH, April 8-9, 2010.
  59. Erskine, J.R.2, Peterson, G.L.5, Mullins, B.E.5, and Grimaila, M.R., “Developing Cyberspace Data Understanding: Using CRISP-DM for Host-based IDS Feature Mining,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  60. Parham, J.D.2, McDonald, J.T.5, Grimaila, M.R., and Kim, Y.C.5, “A Java Based Component Identification Tool for Measuring the Strength of Circuit Protections,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  61. Myers, J.1, Grimaila, M.R., and Mills, R.F.5, “Adding Value to Log Event Correlation Using Distributed Techniques,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010), Oak Ridge National Laboratory, Oak Ridge, TN, April 21-23, 2010.
  62. Naga, V.2, Colombi, J.5, Grimaila, M.R., and Hopkinson, K.5, "Mission-Related Execution and Planning Through Quality of Service Methods," Proceedings of the 15th International Command and Control Research and Technology Symposium, Santa Monica, CA, June 22-24, 2010 (Best Paper Award).
  63. Johannes, T.W.5 and Grimaila, M.R., “Achieving Early Situational Awareness in Extreme Events,” Proceedings of 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 529-535.
  64. Naga, V.2, Colombi, J.5, Grimaila, M.R., and Hopkinson, K.5, “Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods,” Proceedings of the 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 529-535.
  65. Sorrels, D.M.1 and Grimaila, M.R., “Towards Predictive Mission Risk Analysis to Operationalize Mission Assured Networking,” Proceedings of the 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 542-547.
  66. Grimaila, M.R., Mills, R.F.5, Haas, M.5, and Kelly, D.6, “Mission Assurance: Issues and Challenges,” Proceedings of the 2010 International Conference on Security and Management (SAM10), Las Vegas, NV, July 12-15, 2010, pp. 651-657.
  67. Choobineh, J.6, Anderson, E.6, and Grimaila, M.R., "Security Management Life Cycle (SMLC): A Comparative Study," Proceedings of the 16th Americas Conference on Information Systems (AMCIS 2010), Lima, Peru, August 12-15, 2010, Paper 406.
  68. Dube, T.2, Raines, R.5, Peterson, G.5, Bauer, K.5, Grimaila, M.R., and Rogers, S.5, “Malware Type Recognition and Cyber Situational Awareness,” Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, MN, August 20-22, 2010, pp. 938 – 943 (Best Paper Award).
  69. Abercrombie, R.6, Sheldon, F.6, and Grimaila, M.R., “A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance,” Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, MN, August 20-22, 2010, pp. 1153-1158.
  70. Kulkarni, A.6, Williams, E.6, and Grimaila, M.R., “Mitigating Security Risks for End User Computing Application (EUCA) Data,” Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, MN, August 20-22, 2010, pp. 1171 - 1176 .
  71. Myers, J.1, Grimaila, M.R., and Mills, R.F.6, “Log-Based Distributed Security Event Detection Using Simple Event Correlator,” the 44th Annual Hawaii International Conference (HICSS 2011), Oahu, HI, January 2011, pp. 1-7.
  72. Carvalho, M.6, Perez, C.6, Dasgupta, D.5, and Grimaila, M.R., “Mission Resilience in Cloud Computing: A Biologically Inspired Approach,” Proceedings of the 2011 International Conference on Information Warfare and Security (ICIW 2011), Washington, D.C., March 17-18, 2011.
  73. Miller, J.2, Mills, R.F.5, Grimaila, M.R., and Haas M.W.6, “A Scalable Architecture for Improving the Timeliness and Relevance of Cyber Incident Notifications,” Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  74. Woskov, S.1, Grimaila, M.R., Mills, R.F.5, and Haas M.W.6, “Design Consideration for a Case-Based Reasoning Engine for Scenario-Based Cyber Incident Notification,” Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  75. Abercrombie, R.K.6, Ferragut, E.6, Sheldon, F.T.6, and Grimaila, M.R., “Addressing the Need for Independence in the CSE Model,” Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2011), Paris, France, April 11-15, 2011.
  76. Peterson, C.1, Grimaila, M.R., Mills, R.F.5, Haas M.W.6, Thomas, G.6, and Kelly, D.6, “Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process,” Proceedings of the 2011 International Conference on Security and Management (SAM11), Las Vegas, NV, July 18-21, 2011.
  77. Naga, V.2, Colombi, J.5, Grimaila, M.R., and Hopkinson, K.5, “A Method to Determine Superior QoS Configurations for Mission Objectives: Aligning the Network with the Mission” Proceedings of the 2011 International Conference on Security and Management (SAM11), Las Vegas, NV, July 18-21, 2011.
  78. Calver, T.I.1, Grimaila, M.R., and Humphries, J.5, “An Empirical Analysis of the Cascade Error Reconciliation Protocol for Quantum Key Distribution,” Proceedings of the Cyber Security and Information Intelligence Research Workshop (CSIIRW 2011), Oak Ridge National Laboratory, Oak Ridge, TN, October 12-14, 2011.
  79. Evans, M.1, Grimaila, M.R., and Mills, R.F.5, “A Survey of Cyberspace Mission Assurance within United States Air Force Communications Squadrons ,” Proceedings of the 2012 International Conference on Security and Management (SAM12), Las Vegas, NV, July 16-19, 2012.
  80. Harper, C.1, Grimaila, M.R., and Baumgartner, G.6, “Security Standards and Best Practices for Quantum Key Distribution,” Proceedings of the 2013 International Conference on Security and Management (SAM13), Las Vegas, NV, July 22-25, 2013.
  81. Mailloux, L.1, Langhals, B.T.5, and Grimaila, M.R., “A Systems Engineering Approach for Assured Cyber Systems,” Proceedings of the 2013 International Conference on Security and Management (SAM13), Las Vegas, NV, July 22-25, 2013.
  82. Smith, A.J.2, Mills, R.F.5, Bryant, A.R.5, Peterson, G.L.5, and Grimaila, M.R., “REDIR: Automated static detection of obfuscated anti-debugging techniques,” 2014 International Conference on Collaboration Technologies and Systems (CTS), 19-23 May 2014, pp. 173-180.
  83. Martin, M.T.1, Nurre, S.5, and Grimaila, M.R., “Modeling File-Share Server Utilization Using Stochastic Techniques,” Proceedings of the 2014 International Conference on Information and Knowledge Management (IKE14), Las Vegas, NV, July 21-24, 2014.
  84. Mailloux, L.1, Grimaila, M.R., Hodson, D.5, Dazzio-Cornn, E.5, and McLaughlin, C.6, “Modeling Continuous Time Optical Pulses in a Quantum Key Distribution Discrete Event Simulation,” Proceedings of the 2014 International Conference on Security and Management (SAM14), Las Vegas, NV, July 21-24, 2014.
  85. Holes, J.A.1, Mailloux, L.O.1, Grimaila, M.R., and Hodson, D.D.5, “An Efficient Testing Process for a Quantum Key Distribution System Modeling Framework,” Proceedings of the 2015 International Conference on Scientific Computing (CSC15), Las Vegas, NV, July 27-30, 2015.
  86. Mailloux, L.O.1, Grimaila, M.R., Hodson, D.D.5, Engle, R.D.1, McLaughlin, C.V.6, & Baumgartner, G.6, “A Model and Simulation Framework for Studying Implementation Non-Idealities in Quantum Key Distribution Systems,” 5th International Conference on Quantum Computing. Tokyo, Japan, September 28-October 2, 2015.
  87. Riggs, C.1, Lewis, C.D.5, Mailloux, L.O.5, Grimaila, M.R., “Understanding quantum algorithms,” In Proceedings of the 2016 International Conference on Foundations of Computer Science, Las Vegas, NV, July 25-28, 2016.
  88. Mailloux, L.O.5, Grimaila, M.R., Hodson, D.D.5, Engle, R.D.1, McLaughlin, C.V.6, and Baumgartner, G.B.6, “Studying decoy state quantum key distribution system configurations,” In Proceedings of the 2016 International Conference Modeling, Simulation, and Visualization Methods, Las Vegas, NV, July 25-28, 2016.
  89. Mailloux, L.O.5, Sargent B.1, Hodson, D.D.5, and Grimaila, M.R., “System-level considerations for modeling space-based quantum key distribution architectures,” IEEE SysCon. Montreal, Quebec, Canada. April 24-27, 2017.
  90. Span, M.T. 5, Mailloux, L.O. 5, Grimaila, M.R., and Young, W.B. 6, “A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems,” In proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 11-12 June 2018, DOI:  10.1109/CyberSecPODS.2018.8560682.
  91. Engle, D.L.1, Langhals, B.T.5, and Grimaila, M.R., "The Case for NoSQL on a Single Desktop," In Proceedings of the 17th International Conference on Information & Knowledge Engineering (IKE'18), Las Vegas, NV, July 29, 2018 - August 2, 2018.
  92. Campbell, D. 2, Hall, J. 2, Odebode, I. 6, Hodson, D.D.5, Grimaila, M.R., "Trojan Banker Simulation Using Python", The 18th International Conference on Scientific Computing (CSC'20), Las Vegas, NV, Jul 27-30, 2020.
  93. Modlin, A.2, Gregory, A.2, Odebode, I. 6, Hodson, D.D.5, Grimaila, M.R., "CovidLock a New Form of Ransomware", The 18th International Conference on Scientific Computing (CSC'20), Las Vegas, NV, Jul 27-30, 2020.
  94. Garland, B.2, Hodson, D.D.5, Nykl, S.5, Dill, R.5, Grimaila, M.R., "A Framework for Modeling a Real-Time Radar System", The 20th International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, Dec 16-18, 2020.
  95. Scott, N.W.2, Hodson, D.D.5, Dill, R.5, and Grimaila, M.R.,“Using Serde to Serialize and Deserialize DIS PDUs,” The 2020 International Conference on Computational Science and Computational Intelligence (CSCI’20), Dec 2020.
  96. Yu, L.2, Langhals, B.T., Grimaila, M.R., Hodson, D., "Identifying and Using Phases of Flight for Unmanned Aircraft Systems through Machine Learning." Proceedings of the 19th International Conference on Information and Knowledge Engineering, Las Vegas, NV, July 26-29, 2021.
  97. Grove, C.2, Langhals, B.T., Grimaila, M.R., Hodson, D., "Meta-Analysis of Performance Characteristics of Modern Database Schemas." Proceedings of the 19th International Conference on Information and Knowledge Engineering, Las Vegas, NV, July 26-29, 2021.
  98. Miller, J.R., Engle, R.D.L., Langhals, B.T., Grimaila, M.R., Hodson, D.D., “Modeling Unmanned Aircraft System Maintenance Using Agile Model-Based Systems Engineering,” In: Advances in Software Engineering, Education, and e-Learning. Transactions on Computational Science and Computational Intelligence. Springer, Cham.; https://doi.org/10.1007/978-3-030-70873-3_52; 09 September 2021; pp 741–745.
  99. Bowen, B., Eraybar, J., Odebode, I., Hodson, D.D., Grimaila, M.R., “The New Office Threat: A Simulation of Watering Hole Cyberattacks,” In: Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham; https://doi.org/10.1007/978-3-030-69984-0_4; 19 October 2021; pp 35–42.
  100. Vo, H., Kozlowski, R., Odebode, I., Hodson, D.D., Grimaila, M.R., “Simulation of SYN Flood Attack and Counter-Attack Methods Using Average Connection Times,” In: Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham.; https://doi.org/10.1007/978-3-030-69984-0_5; 19 October 2021; pp 43–48.
  101. Campbell, D., Hall, J., Odebode, I., Hodson, D.D., Grimaila, M.R., “Trojan Banker Simulation Utilizing Python,” In: Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham.; https://doi.org/10.1007/978-3-030-69984-0_2; 19 October 2021; pp 17–24.
  102. Modlin, A., Gregory, A., Odebode, I., Hodson, D.D., Grimaila, M.R., “CovidLock Attack Simulation,” In: Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham.; https://doi.org/10.1007/978-3-030-69984-0_3; 19 October 2021; pp 25–34.
  103. Tippit, J., Hodson, D.D., Grimaila, M.R., “Julia and Singularity for High Performance Computing,” In: Advances in Parallel & Distributed Processing, and Applications. Transactions on Computational Science and Computational Intelligence. Springer, Cham.; https://doi.org/10.1007/978-3-030-69984-0_1; 19 October 2021; pp. 3-15.
  104. Dimaapi, M.D., Engle, R.D.L., Langhals, B.T., Grimaila, M.R., Hodson, D.D., “A Dynamic Data and Information Processing Model for Unmanned Aircraft Systems,” In: Advances in Data Science and Information Engineering. Transactions on Computational Science and Computational Intelligence. Springer, Cham.; https://doi.org/10.1007/978-3-030-71704-9_63; 30 October 2021; pp 859–863.
  105. N.W. Scott, D.D. Hodson, R. Dill and M.R. Grimaila, "Prediction and Convergence Calculations using Rust-based NAlgebra GLM," The 2021 International Conference on Computational Science and Computational Intelligence (CSCI'21), Dec 2021.

Other Professional Publications (3):

  1. Grimaila, M.R., "The Role of Bastille Linux in Information Security," System Administration, Networking, and Security (SANS) Institute, Bethesda, MD; Feb. 2002.
  2. Badiru, A., Smith, D. Grimaila, M.R., Slagley, J. Kee, P., and Thal, A. (2007), “IE Techniques Aid Air Force Disaster Response,” Institute of Industrial Engineers, Online Digest, www.iienet.org; http://www.iienet2.org/Details.aspx?id=10178; September 18, 2007.
  3. Grimaila, M.R. and Fortson, L.W., “Improving the Accuracy and Timeliness of Cyber Incident Damage and Mission Impact Assessment, “Information Assurance Technology Analysis Center (IATAC) IA Newsletter, Spring 2008

Author Legend: 1 = Student advised.  2 = Student advised by others.  3 = Other non-faculty AFIT researchers 4 = Research faculty, scientists, or engineers. 5 = Other collaborators within the School.  6 = External collaborators 7 = Student formally advised other, but candidate played primary role because faculty advisor was leaving institute.

Return to the top of the page

Air Force Institute of Technology
2950 Hobson Way
Wright-Patterson Air Force Base, OH 45433-7765
Commercial: 937-255-6565 | DSN: 785-6565