REDO-random excitation and deterministic observation-first commercial experiment MR Grimaila, S Lee, J Dworak, KM Butler, B Stewart, H Balachandran, ... Proceedings 17th IEEE VLSI Test Symposium (Cat. No. PR00146), 268-274, 1999 | 145 | 1999 |
Management of information security: Challenges and research directions J Choobineh, G Dhillon, MR Grimaila, J Rees Communications of the Association for Information Systems 20 (1), 57, 2007 | 114 | 2007 |
The use of attack and protection trees to analyze security for an online banking system K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 112 | 2007 |
Enhancing the security of aircraft surveillance in the next generation air traffic control system C Finke, J Butts, R Mills, M Grimaila International Journal of Critical Infrastructure Protection 6 (1), 3-11, 2013 | 77 | 2013 |
Towards insider threat detection using web server logs J Myers, MR Grimaila, RF Mills Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009 | 73 | 2009 |
Defect-oriented testing and defective-part-level prediction J Dworak, JD Wicker, S Lee, MR Grimaila, MR Mercer, KM Butler, ... IEEE Design & Test of Computers 18 (1), 31-41, 2001 | 73 | 2001 |
A survey of state-of-the-art in anonymity metrics DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008 | 65 | 2008 |
Post-quantum cryptography: what advancements in quantum computing mean for it professionals LO Mailloux, CD Lewis II, C Riggs, MR Grimaila IT professional 18 (5), 42-47, 2016 | 59 | 2016 |
A new ATPG algorithm to limit test set size and achieve multiple detections of all faults S Lee, B Cobb, J Dworak, MR Grimaila, MR Mercer Proceedings 2002 Design, Automation and Test in Europe Conference and …, 2002 | 59 | 2002 |
Malware target recognition via static heuristics T Dube, R Raines, G Peterson, K Bauer, M Grimaila, S Rogers Computers & Security 31 (1), 137-147, 2012 | 58 | 2012 |
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011 | 56 | 2011 |
A modeling framework for studying quantum key distribution system implementation nonidealities LO Mailloux, JD Morris, MR Grimaila, DD Hodson, DR Jacques, ... IEEE Access 3, 110-130, 2015 | 53 | 2015 |
Enhanced DO-RE-ME based defect level prediction using defect site aggregation-MPG-D J Dworak, MR Grimaila, S Lee, LC Wang, MR Mercer Proceedings International Test Conference 2000 (IEEE Cat. No. 00CH37159 …, 2000 | 50 | 2000 |
Towards an information asset-based defensive cyber damage assessment process MR Grimaila, LW Fortson 2007 IEEE Symposium on Computational Intelligence in Security and Defense …, 2007 | 47 | 2007 |
Performance evaluations of quantum key distribution system architectures LO Mailloux, MR Grimaila, DD Hodson, G Baumgartner, C McLaughlin IEEE Security & Privacy 13 (1), 30-40, 2015 | 45 | 2015 |
Improving the global information grid's performance through satellite communications layer enhancements VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila IEEE Communications Magazine 44 (11), 66-72, 2006 | 45 | 2006 |
Comparison of continuous versus pulsed ultraviolet light emitting diode use for the inactivation of Bacillus globigii spores T Tran, LA Racz, MR Grimaila, M Miller, WF Harper Jr Water science and technology 70 (9), 1473-1480, 2014 | 39 | 2014 |
Cyber security and global information assurance: threat analysis and response solutions: threat analysis and response solutions KJ Knapp IGI Global, 2009 | 39 | 2009 |
Wireless intrusion detection and device fingerprinting through preamble manipulation BW Ramsey, BE Mullins, MA Temple, MR Grimaila IEEE Transactions on Dependable and Secure Computing 12 (5), 585-596, 2014 | 38 | 2014 |
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process. MR Grimaila, L Fortson, J Sutton Security and Management, 386-391, 2009 | 38 | 2009 |