Follow
Mark Reith
Mark Reith
Assist. Professor of Computer Science, Air Force Institute of Technology
Verified email at afit.edu - Homepage
Title
Cited by
Cited by
Year
An examination of digital forensic models
M Reith, C Carr, G Gunsch
International Journal of digital evidence 1 (3), 1-12, 2002
9272002
Apply model checking to security analysis in trust management
M Reith, J Niu, WH Winsborough
2007 IEEE 23rd International Conference on Data Engineering Workshop, 734-743, 2007
142007
Cyber terrain mission mapping: Tools and methodologies
J Guion, M Reith
2017 International Conference on Cyber Conflict (CyCon US), 105-111, 2017
122017
Dynamic cyber mission mapping
J Guion, M Reith
IIE Annual Conference. Proceedings, 1925-1931, 2017
122017
Toward practical analysis for trust management policy
M Reith, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
122009
Rethinking USAF cyber education and training
M Reith, E Trias, C Dacus, S Martin, L Tomcho
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
112018
Engineering trust management into software models
M Reith, J Niu, WH Winsborough
International Workshop on Modeling in Software Engineering (MISE'07: ICSE …, 2007
112007
Securing commercial satellites for military operations: A cybersecurity supply chain framework
C Fleming, M Reith, W Henry
International Conference on Cyber Warfare and Security 18 (1), 85-92, 2023
92023
Battlespace Next (TM): Developing a Serious Game to Explore Multi-Domain Operations
N Flack, A Lin, G Peterson, M Reith
International Journal of Serious Games 7 (2), 49-70, 2020
92020
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study
N Flack, C Voltz, R Dill, A Lin, M Reith
ICCWS 2020 15th International Conference on Cyber Warfare and Security, 155, 2020
92020
Self-directed learning tools in USAF multi-domain operations education
N Flack, M Reith
European Conference on Cyber Warfare and Security, 752-XIV, 2019
82019
Shifting satellite control paradigms: Operational cybersecurity in the age of megaconstellations
C Poole, R Bettinger, MG Reith
Handbook of Scholarly Publications from the Air Force Institute of …, 2022
72022
Applying game elements to cyber elearning: An experimental design
L Tomcho, A Lin, D Long, M Coggins, M Reith
International Conference on Cyber Warfare and Security, 422-XV, 2019
72019
Forging tomorrow's air, space, and cyber war fighters: recommendations for integration and development
M Reith
Air and Space Power Journal, 2016
72016
Brandishing Our Air, Space, and Cyber Swords: Recommendations for Deterrence and Beyond
M Reith
Air & Space Power Journal, 2017
62017
Improving joint all domain operations (JADO) education
C Voltz, M Reith, D Long, R Dill
International Conference on Cyber Warfare and Security, 401-408, 2021
52021
Mitigation of cyber warfare in space through reed solomon codes'
M Kang, K Hopkinson, A Betances, M Reith
Proceedings of the 13th International Conference on Cyber Warfare and …, 2018
52018
Teaming with silicon valley to enable multi-domain command and control
M Bruza, M Reith
International Conference on Cyber Warfare and Security, 663-667, 2018
52018
Operationalizing Cyber: Recommendations for Future Research
M Reith, S Pentecost, D Celebucki, R Kaufman21
ICMLG 2017 5th International Conference on Management Leadership and …, 2017
52017
Formal verification of security properties in trust management policy
J Niu, M Reith, WH Winsborough
Journal of computer security 22 (1), 69-153, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20