Talks and Publications

Here are some of the things I’ve written, presented, and worked on.

Talks (highlights):

  • “What is CCDC?” (Video) January 2019
  • “Parallel Computing and Cyber Defense” (Video) (U Central Oklahoma CS Club) October 2018
  • “Industrial High Performance Computing For Fun and Profit” (PDF Slides) (OK Supercomputing Symposium) September 2018
  • “Stop Doing, Start Pretending: Computing Matters” (Video) (TEDxTulsaCC) April 2017
  • PANEL: “Badge Life: DEF CON Unofficial Badges” (Video: content warning: some profanity) (DEF CON 25 Village Talks) July 2017
  • “Supercomputing” (PDF Slides) (Tulsa Community College Science Seminar Series) October 2013
  • “How Your Computer Can Ruin Your Life and Literally Kill You Dead” (PDF slides) (Video) (Ignite Tulsa 3) September 2010
  • “Hack Like the Movie Stars: A Big-Screen Multitouch Network Monitor” (DEFCON Link) (presentation at DEFCON 17, with Cody Pollet) August 2009

Peer-Reviewed Publications:

  • “The OneOklahoma Cyberinfrastructure Initiative: A Model for Multi-institutional Collaboration” (White Paper, Role of the Regionals NSF Workshop in 2016) by Henry Neeman, David Akin, Gerald Creager, Debi Gentis, Horst Severini, Dana Brunson, Phillip D. Alderman, Christopher J. Fennell, Peter R. Hoyt, Evan Linde, Jesse Schafer, James Deaton, Franklin Fondjo Fotou, Joel Snow, Gerard G. Dumancas, George Louthan, John Mosher, Perdeep Mehta, Karl Frinkle, Mike Morris, Jeremy Evert, Neal Xiong, Evan Lemley, John Hale.
  • “On Fostering a Culture of Research Cyberinfrastructure Grant Proposals within a Community of Service Providers in an EPSCoR State” (XSEDE 2015, Accepted) by Henry Neeman, Kate Adams, Joshua Alexander, Dana Brunson, S. Patrick Calhoun, James Deaton, Franklin Fonjo Fotou, Karl Frinkle, Zane Gray, Evan Lemley, George Louthan, Greg Monaco, Mike Morris, Joel Snow, and Brett Zimmerman
  • “The OneOklahoma Friction Free Network: Towards a Multi-Institutional Science DMZ in an EPSCoR State” (XSEDE 2014) by Henry Neeman, David Akin, Joshua Alexander, Dana Brunson, S. Patrick Calhoun, James Deaton, Franklin Fondjo Fotou, Brandon George, Debi Gentis, Zane Gray, Eddie Huebsch, George Louthan, Matt Runion, Joel Snow, and Brett Zimmerman
  • “Hybrid Extensions for Stateful Attack Graphs” (Extended abstract reviewed; presented at CISRC 2014) by George Louthan, Michael Haney, Phoebe Hardwicke, Peter Hawrylak, and John Hale (PDF)
  • “Toward Hybrid Attack Dependency Graphs” (Extended abstract reviewed; presented at CSIIRW 2011) by George Louthan, Phoebe Hardwicke, Peter Hawrylak, and John Hale (PDF)
  • “Attack Graphs and Scenario Driven Wireless Computer Network Defense” (Book chapter in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, edited by Cyril Onwubiko and Thomas Owens) by Peter J. Hawrylak, George Louthan IV, Jeremy Daily, John Hale and Mauricio Papa (Book page)
  • “The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness” (CSET 2010 at the 19th USENIX Security Symposium) by George Louthan, Warren Roberts, Matthew Butler, and John Hale (PDF)
  • “Toward Sensitive Information Redaction in a Collaborative, Multilevel Security Environment” (WikiSym 2010) by Peter Gehres, Nathan Singleton, George Louthan, and John Hale (PDF)
  • “Toward Robust and Extensible Network Protocol Identification” (WORLDCOMP / ICOMP 2009) by George Louthan, Collin McMillan, Christopher Johnson, and John Hale (PDF)
  • “Content-based Alternatives to Conventional Network Monitoring Systems” (Extended abstract reviewed; presented at CSIIRW 2009) by George Louthan, Brady Deetz, Matthew Walker, and John Hale

Thesis – Master of Science in Computer Science:

  • Hybrid Attack Graphs for Modeling Cyber-Physical Systems by George Louthan (PDF)

Posters:

  • “Tandy Supercomputing Center” (PDF) (Poster at GPN 2013)
  • “Risk Metric for Attack Dependency Graphs” (Poster at CSIIRW 2011) by Zach Harbort, George Louthan, and John Hale.
  • “Techniques for Attack Graph Visualization and Interaction” (Poster at CSIIRW 2011) by Christopher Hartney, George Louthan, and John Hale.
  • “SAND: An Architecture for Signature-based Automatic Network Protocol Detection” (PDF) (poster at 18th USENIX Security Symposium)
  • “Large-scale Multitouch Interactive Network Visualization” (PDF) (poster at 18th USENIX Security Symposium, with Cody Pollet)

Funding:

  • Co-PI, EDA #ED16HDQ0200023 “Tulsa Research Partners Technology Commercialization Concentrator for Tulsa.” PI: David Greer. $351,400. 2016-2018
  • Senior Personnel, NSF #1341028 “CC-NIE Integration: OneOklahoma Friction Free Network.” PI: Henry Neeman. $499,961.00. 2013-2016
  • Project engineer, EDA #080104715 “Tulsa Community Supercomputer.” PI: David Greer. $800,000. 2013.