Michael R. Grimaila
Cited by
Cited by
REDO-random excitation and deterministic observation-first commercial experiment
MR Grimaila, S Lee, J Dworak, KM Butler, B Stewart, H Balachandran, ...
Proceedings 17th IEEE VLSI Test Symposium (Cat. No. PR00146), 268-274, 1999
The use of attack and protection trees to analyze security for an online banking system
K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Management of information security: Challenges and research directions
J Choobineh, G Dhillon, MR Grimaila, J Rees
Communications of the Association for Information Systems 20 (1), 57, 2007
Towards insider threat detection using web server logs
J Myers, MR Grimaila, RF Mills
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
Defect-oriented testing and defective-part-level prediction
J Dworak, JD Wicker, S Lee, MR Grimaila, MR Mercer, KM Butler, ...
IEEE Design & Test of Computers 18 (1), 31-41, 2001
Enhancing the security of aircraft surveillance in the next generation air traffic control system
C Finke, J Butts, R Mills, M Grimaila
International Journal of Critical Infrastructure Protection 6 (1), 3-11, 2013
A survey of state-of-the-art in anonymity metrics
DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins
Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008
A new ATPG algorithm to limit test set size and achieve multiple detections of all faults
S Lee, B Cobb, J Dworak, MR Grimaila, MR Mercer
Proceedings 2002 Design, Automation and Test in Europe Conference and …, 2002
Malware target recognition via static heuristics
T Dube, R Raines, G Peterson, K Bauer, M Grimaila, S Rogers
Computers & Security 31 (1), 137-147, 2012
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins
IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011
Post-quantum cryptography: what advancements in quantum computing mean for it professionals
LO Mailloux, CD Lewis II, C Riggs, MR Grimaila
IT Professional 18 (5), 42-47, 2016
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D
J Dworak, MR Grimaila, S Lee, LC Wang, MR Mercer
Proceedings International Test Conference 2000 (IEEE Cat. No. 00CH37159 …, 2000
Towards an information asset-based defensive cyber damage assessment process
MR Grimaila, LW Fortson
2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007
A modeling framework for studying quantum key distribution system implementation nonidealities
LO Mailloux, JD Morris, MR Grimaila, DD Hodson, DR Jacques, ...
IEEE Access 3, 110-130, 2015
Improving the global information grid's performance through satellite communications layer enhancements
VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila
IEEE Communications Magazine 44 (11), 66-72, 2006
Performance evaluations of quantum key distribution system architectures
LO Mailloux, MR Grimaila, DD Hodson, G Baumgartner, C McLaughlin
IEEE Security & Privacy 13 (1), 30-40, 2015
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions: Threat Analysis and Response Solutions
KJ Knapp
IGI Global, 2009
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process.
MR Grimaila, L Fortson, J Sutton
Security and Management, 386-391, 2009
Comparison of continuous versus pulsed ultraviolet light emitting diode use for the inactivation of Bacillus globigii spores
T Tran, LA Racz, MR Grimaila, M Miller, WF Harper Jr
Water science and technology 70 (9), 1473-1480, 2014
Evaluation of security solutions in the SCADA environment
RD Larkin, J Lopez Jr, JW Butts, MR Grimaila
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 45 (1 …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20