<?xml version="1.0"?>
<dblpperson name="Mark Reith" pid="28/1069" n="10">
<person key="homepages/28/1069" mdate="2025-03-19">
<author pid="28/1069">Mark Reith</author>
<author pid="28/1069">Mark G. Reith</author>
</person>
<r><article key="journals/tai/MochockiRBPJM25" mdate="2025-06-15">
<author orcid="0000-0003-2688-4919" pid="267/4166">Sean A. Mochocki</author>
<author orcid="0009-0004-2550-9898" pid="28/1069">Mark G. Reith</author>
<author orcid="0000-0003-4982-9859" pid="72/9133">Brett J. Borghetti</author>
<author orcid="0000-0002-6241-3084" pid="59/722">Gilbert L. Peterson</author>
<author orcid="0000-0002-4071-0934" pid="391/8292">John D. Jasper</author>
<author orcid="0000-0002-6108-0345" pid="99/4386">Laurence D. Merkle</author>
<title>Personalized Learning Path Problem Variations: Computational Complexity and AI Approaches.</title>
<pages>574-588</pages>
<year>2025</year>
<month>March</month>
<volume>6</volume>
<journal>IEEE Trans. Artif. Intell.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1109/TAI.2024.3483190</ee>
<url>db/journals/tai/tai6.html#MochockiRBPJM25</url>
<stream>streams/journals/tai</stream>
</article>
</r>
<r><inproceedings key="conf/hci/GeraRMSH25" mdate="2025-07-04">
<author orcid="0000-0002-1956-2084" pid="45/5825">Ralucca Gera</author>
<author orcid="0009-0004-2550-9898" pid="28/1069">Mark Reith</author>
<author orcid="0000-0003-2688-4919" pid="267/4166">Sean A. Mochocki</author>
<author orcid="0009-0004-9883-0666" pid="407/0849">Paolo J. Singh</author>
<author pid="407/0621">Scott Harned</author>
<title>From Standardization to Personalization: Leveraging Learner Profiles to Tailor Education.</title>
<pages>35-55</pages>
<year>2025</year>
<booktitle>HCI (47)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-92967-0_3</ee>
<crossref>conf/hci/2025-47</crossref>
<url>db/conf/hci/hci2025-47.html#GeraRMSH25</url>
<stream>streams/conf/hci</stream>
</inproceedings>
</r>
<r><article key="journals/ijsg/FlackLPR20" mdate="2021-02-16">
<author orcid="0000-0002-8281-7369" pid="267/8131">Nathaniel Flack</author>
<author pid="81/4600">Alan C. Lin</author>
<author pid="59/722">Gilbert L. Peterson</author>
<author pid="28/1069">Mark Reith</author>
<title>Battlespace Next(TM).</title>
<pages>49-70</pages>
<year>2020</year>
<volume>7</volume>
<journal>Int. J. Serious Games</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.17083/ijsg.v7i2.349</ee>
<url>db/journals/ijsg/ijsg7.html#FlackLPR20</url>
</article>
</r>
<r><inproceedings key="conf/cyconus/GuionR17" mdate="2023-03-24">
<author pid="211/5144">Jeffrey Guion</author>
<author pid="28/1069">Mark Reith</author>
<title>Cyber terrain mission mapping: Tools and methodologies.</title>
<pages>105-111</pages>
<year>2017</year>
<booktitle>CyCon U.S.</booktitle>
<ee>https://doi.org/10.1109/CYCONUS.2017.8167504</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CYCONUS.2017.8167504</ee>
<crossref>conf/cyconus/2017</crossref>
<url>db/conf/cyconus/cyconus2017.html#GuionR17</url>
</inproceedings>
</r>
<r><article key="journals/jcs/NiuRW14" mdate="2023-08-28">
<author pid="25/4653-1">Jianwei Niu 0001</author>
<author pid="28/1069">Mark Reith</author>
<author pid="45/6818">William H. Winsborough</author>
<title>Formal verification of security properties in trust management policy.</title>
<pages>69-153</pages>
<year>2014</year>
<volume>22</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.3233/JCS-130490</ee>
<ee>https://www.wikidata.org/entity/Q114944915</ee>
<url>db/journals/jcs/jcs22.html#NiuRW14</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ReithNW09" mdate="2018-11-06">
<author pid="28/1069">Mark Reith</author>
<author pid="25/4653-1">Jianwei Niu 0001</author>
<author pid="45/6818">William H. Winsborough</author>
<title>Toward practical analysis for trust management policy.</title>
<pages>310-321</pages>
<year>2009</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1533057.1533098</ee>
<crossref>conf/ccs/2009asia</crossref>
<url>db/conf/ccs/asiaccs2009.html#ReithNW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icse/ReithNW08" mdate="2018-11-06">
<author pid="28/1069">Mark Reith</author>
<author pid="25/4653-1">Jianwei Niu 0001</author>
<author pid="45/6818">William H. Winsborough</author>
<title>Role-based trust management security policy analysis and correction environment (RT-SPACE).</title>
<pages>929-930</pages>
<year>2008</year>
<booktitle>ICSE Companion</booktitle>
<ee>https://doi.org/10.1145/1370175.1370192</ee>
<crossref>conf/icse/2008c</crossref>
<url>db/conf/icse/icsec2008.html#ReithNW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/ReithNW07" mdate="2023-03-24">
<author pid="28/1069">Mark Reith</author>
<author pid="25/4653-1">Jianwei Niu 0001</author>
<author pid="45/6818">William H. Winsborough</author>
<title>Apply Model Checking to Security Analysis in Trust Management.</title>
<pages>734-743</pages>
<year>2007</year>
<crossref>conf/icde/2007w</crossref>
<booktitle>ICDE Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDEW.2007.4401061</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDEW.2007.4401061</ee>
<url>db/conf/icde/icdew2007.html#ReithNW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icse/ReithNW07" mdate="2023-03-23">
<author pid="28/1069">Mark Reith</author>
<author pid="25/4653-1">Jianwei Niu 0001</author>
<author pid="45/6818">William H. Winsborough</author>
<title>Engineering Trust Management into Software Models.</title>
<pages>9</pages>
<year>2007</year>
<booktitle>MiSE@ICSE</booktitle>
<ee>https://doi.org/10.1109/MISE.2007.5</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MISE.2007.5</ee>
<crossref>conf/icse/2007mise</crossref>
<url>db/conf/icse/mise2007.html#ReithNW07</url>
</inproceedings>
</r>
<r><article key="journals/ijde/ReithCG02" mdate="2020-09-18">
<author pid="28/1069">Mark Reith</author>
<author pid="42/3603">Clint Carr</author>
<author pid="06/6890">Gregg H. Gunsch</author>
<title>An Examination of Digital Forensic Models.</title>
<year>2002</year>
<volume>1</volume>
<journal>Int. J. Digit. EVid.</journal>
<number>3</number>
<ee type="oa">http://www.utica.edu/academic/institutes/ecii/publications/articles/A04A40DC-A6F6-F2C1-98F94F16AF57232D.pdf</ee>
<url>db/journals/ijde/ijde1.html#ReithCG02</url>
</article>
</r>
<coauthors n="15" nc="3">
<co c="0"><na f="b/Borghetti:Brett_J=" pid="72/9133">Brett J. Borghetti</na></co>
<co c="1"><na f="c/Carr:Clint" pid="42/3603">Clint Carr</na></co>
<co c="0"><na f="f/Flack:Nathaniel" pid="267/8131">Nathaniel Flack</na></co>
<co c="0"><na f="g/Gera:Ralucca" pid="45/5825">Ralucca Gera</na></co>
<co c="-1"><na f="g/Guion:Jeffrey" pid="211/5144">Jeffrey Guion</na></co>
<co c="1"><na f="g/Gunsch:Gregg_H=" pid="06/6890">Gregg H. Gunsch</na></co>
<co c="0"><na f="h/Harned:Scott" pid="407/0621">Scott Harned</na></co>
<co c="0"><na f="j/Jasper:John_D=" pid="391/8292">John D. Jasper</na></co>
<co c="0"><na f="l/Lin:Alan_C=" pid="81/4600">Alan C. Lin</na></co>
<co c="0" n="2"><na f="m/Merkle:Larry" pid="99/4386">Larry Merkle</na><na>Laurence D. Merkle</na></co>
<co c="0"><na f="m/Mochocki:Sean_A=" pid="267/4166">Sean A. Mochocki</na></co>
<co c="2"><na f="n/Niu_0001:Jianwei" pid="25/4653-1">Jianwei Niu 0001</na></co>
<co c="0"><na f="p/Peterson:Gilbert_L=" pid="59/722">Gilbert L. Peterson</na></co>
<co c="0"><na f="s/Singh:Paolo_J=" pid="407/0849">Paolo J. Singh</na></co>
<co c="2"><na f="w/Winsborough:William_H=" pid="45/6818">William H. Winsborough</na></co>
</coauthors>
</dblpperson>

