Seguir
Michael R. Grimaila
Título
Citado por
Citado por
Año
REDO-random excitation and deterministic observation-first commercial experiment
MR Grimaila, S Lee, J Dworak, KM Butler, B Stewart, H Balachandran, ...
Proceedings 17th IEEE VLSI Test Symposium (Cat. No. PR00146), 268-274, 1999
1451999
Management of information security: Challenges and research directions
J Choobineh, G Dhillon, MR Grimaila, J Rees
Communications of the Association for Information Systems 20 (1), 57, 2007
1202007
The use of attack and protection trees to analyze security for an online banking system
K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1152007
Enhancing the security of aircraft surveillance in the next generation air traffic control system
C Finke, J Butts, R Mills, M Grimaila
International Journal of Critical Infrastructure Protection 6 (1), 3-11, 2013
812013
Towards insider threat detection using web server logs
J Myers, MR Grimaila, RF Mills
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
752009
Defect-oriented testing and defective-part-level prediction
J Dworak, JD Wicker, S Lee, MR Grimaila, MR Mercer, KM Butler, ...
IEEE Design & Test of Computers 18 (1), 31-41, 2001
732001
A survey of state-of-the-art in anonymity metrics
DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins
Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008
652008
Post-quantum cryptography: what advancements in quantum computing mean for it professionals
LO Mailloux, CD Lewis II, C Riggs, MR Grimaila
IT professional 18 (5), 42-47, 2016
622016
Malware target recognition via static heuristics
T Dube, R Raines, G Peterson, K Bauer, M Grimaila, S Rogers
Computers & Security 31 (1), 137-147, 2012
602012
A new ATPG algorithm to limit test set size and achieve multiple detections of all faults
S Lee, B Cobb, J Dworak, MR Grimaila, MR Mercer
Proceedings 2002 Design, Automation and Test in Europe Conference and …, 2002
592002
A modeling framework for studying quantum key distribution system implementation nonidealities
LO Mailloux, JD Morris, MR Grimaila, DD Hodson, DR Jacques, ...
IEEE Access 3, 110-130, 2015
582015
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins
IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011
572011
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D
J Dworak, MR Grimaila, S Lee, LC Wang, MR Mercer
Proceedings International Test Conference 2000 (IEEE Cat. No. 00CH37159 …, 2000
502000
Towards an information asset-based defensive cyber damage assessment process
MR Grimaila, LW Fortson
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
472007
Performance evaluations of quantum key distribution system architectures
LO Mailloux, MR Grimaila, DD Hodson, G Baumgartner, C McLaughlin
IEEE Security & Privacy 13 (1), 30-40, 2015
462015
Improving the global information grid's performance through satellite communications layer enhancements
VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila
IEEE Communications Magazine 44 (11), 66-72, 2006
452006
Comparison of continuous versus pulsed ultraviolet light emitting diode use for the inactivation of Bacillus globigii spores
T Tran, LA Racz, MR Grimaila, M Miller, WF Harper Jr
Water science and technology 70 (9), 1473-1480, 2014
402014
Cyber security and global information assurance: threat analysis and response solutions: threat analysis and response solutions
KJ Knapp
IGI Global, 2009
402009
Evaluation of security solutions in the SCADA environment
RD Larkin, J Lopez Jr, JW Butts, MR Grimaila
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 45 (1 …, 2014
392014
Wireless intrusion detection and device fingerprinting through preamble manipulation
BW Ramsey, BE Mullins, MA Temple, MR Grimaila
IEEE Transactions on Dependable and Secure Computing 12 (5), 585-596, 2014
382014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20