An examination of digital forensic models M Reith, C Carr, G Gunsch International Journal of digital evidence 1 (3), 1-12, 2002 | 927 | 2002 |
Apply model checking to security analysis in trust management M Reith, J Niu, WH Winsborough 2007 IEEE 23rd International Conference on Data Engineering Workshop, 734-743, 2007 | 14 | 2007 |
Cyber terrain mission mapping: Tools and methodologies J Guion, M Reith 2017 International Conference on Cyber Conflict (CyCon US), 105-111, 2017 | 12 | 2017 |
Dynamic cyber mission mapping J Guion, M Reith IIE Annual Conference. Proceedings, 1925-1931, 2017 | 12 | 2017 |
Toward practical analysis for trust management policy M Reith, J Niu, WH Winsborough Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 12 | 2009 |
Rethinking USAF cyber education and training M Reith, E Trias, C Dacus, S Martin, L Tomcho Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 11 | 2018 |
Engineering trust management into software models M Reith, J Niu, WH Winsborough International Workshop on Modeling in Software Engineering (MISE'07: ICSE …, 2007 | 11 | 2007 |
Securing commercial satellites for military operations: A cybersecurity supply chain framework C Fleming, M Reith, W Henry International Conference on Cyber Warfare and Security 18 (1), 85-92, 2023 | 9 | 2023 |
Battlespace Next (TM): Developing a Serious Game to Explore Multi-Domain Operations N Flack, A Lin, G Peterson, M Reith International Journal of Serious Games 7 (2), 49-70, 2020 | 9 | 2020 |
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot Study N Flack, C Voltz, R Dill, A Lin, M Reith ICCWS 2020 15th International Conference on Cyber Warfare and Security, 155, 2020 | 9 | 2020 |
Self-directed learning tools in USAF multi-domain operations education N Flack, M Reith European Conference on Cyber Warfare and Security, 752-XIV, 2019 | 8 | 2019 |
Shifting satellite control paradigms: Operational cybersecurity in the age of megaconstellations C Poole, R Bettinger, MG Reith Handbook of Scholarly Publications from the Air Force Institute of …, 2022 | 7 | 2022 |
Applying game elements to cyber elearning: An experimental design L Tomcho, A Lin, D Long, M Coggins, M Reith International Conference on Cyber Warfare and Security, 422-XV, 2019 | 7 | 2019 |
Forging tomorrow's air, space, and cyber war fighters: recommendations for integration and development M Reith Air and Space Power Journal, 2016 | 7 | 2016 |
Brandishing Our Air, Space, and Cyber Swords: Recommendations for Deterrence and Beyond M Reith Air & Space Power Journal, 2017 | 6 | 2017 |
Improving joint all domain operations (JADO) education C Voltz, M Reith, D Long, R Dill International Conference on Cyber Warfare and Security, 401-408, 2021 | 5 | 2021 |
Mitigation of cyber warfare in space through reed solomon codes' M Kang, K Hopkinson, A Betances, M Reith Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 5 | 2018 |
Teaming with silicon valley to enable multi-domain command and control M Bruza, M Reith International Conference on Cyber Warfare and Security, 663-667, 2018 | 5 | 2018 |
Operationalizing Cyber: Recommendations for Future Research M Reith, S Pentecost, D Celebucki, R Kaufman21 ICMLG 2017 5th International Conference on Management Leadership and …, 2017 | 5 | 2017 |
Formal verification of security properties in trust management policy J Niu, M Reith, WH Winsborough Journal of computer security 22 (1), 69-153, 2014 | 5 | 2014 |