Papers, Presentations, and Posters

Here are some of the things I’ve written, presented, and worked on.


  • “Stop Pretending, Start Doing: Computing Matters” (TEDxTulsaCC). April 29th, 5pm Central. Live stream.
  • “Cyberinfrastructure Roundtable” (Oklahoma EPSCoR Annual Science Conference) with Jonah Duckles, Mark Stacy, and Henry Neeman
  • “State of the HPC Centers Panel” (Great Plains Network Annual Meeting 2013) with Dana Brunson, John Matrow, Jeff Pummill, David Swanson, Daniel Andresen
  • “Supercomputing” (PDF Slides) (Tulsa Community College Science Seminar Series)
  • “Tandy Supercomputing Center” (PDF Slides) (Oklahoma Supercomputing Symposium 2013)
  • “How Your Computer Can Ruin Your Life and Literally Kill You Dead” (PDF slides) (Video on YouTube) (Ignite Tulsa 3)
  • Introduction to the Kerberos Protocol (PDF slides) (presentation for Secure Systems Administration course)
  • Overview of Sarbanes-Oxley Act Consequences for Information Systems (PDF slides) (presentation for Risk Management in Information Systems course) (Note: FEF v. PCAOB has been resolved; SEC’s statement regarding the decision is here)
  • “Towards Formal Analysis of Cyber-Physical Systems” (PDF slides) (presentation at 2010 University of Tulsa Student Research Colloquium, Computer Security and Critical Infrastructure Protection Special Topic Symposium)
  • “Information Without Boundaries: Breaching the Great Firewall of China” (PDF slides) (presentation at 2009 AAAS-SWARM meeting & University of Tulsa Student Research Colloquium)
  • “Hack Like the Movie Stars: A Big-Screen Multitouch Network Monitor” (DEFCON Link) (presentation at DEFCON 17, with Cody Pollet)

Peer-Reviewed Publications:

  • “The OneOklahoma Cyberinfrastructure Initiative: A Model for Multi-institutional Collaboration” (White Paper, Role of the Regionals NSF Workshop in 2016) by Henry Neeman, David Akin, Gerald Creager, Debi Gentis, Horst Severini, Dana Brunson, Phillip D. Alderman, Christopher J. Fennell, Peter R. Hoyt, Evan Linde, Jesse Schafer, James Deaton, Franklin Fondjo Fotou, Joel Snow, Gerard G. Dumancas, George Louthan, John Mosher, Perdeep Mehta, Karl Frinkle, Mike Morris, Jeremy Evert, Neal Xiong, Evan Lemley, John Hale.
  • “On Fostering a Culture of Research Cyberinfrastructure Grant Proposals within a Community of Service Providers in an EPSCoR State” (XSEDE 2015, Accepted) by Henry Neeman, Kate Adams, Joshua Alexander, Dana Brunson, S. Patrick Calhoun, James Deaton, Franklin Fonjo Fotou, Karl Frinkle, Zane Gray, Evan Lemley, George Louthan, Greg Monaco, Mike Morris, Joel Snow, and Brett Zimmerman
  • “The OneOklahoma Friction Free Network: Towards a Multi-Institutional Science DMZ in an EPSCoR State” (XSEDE 2014) by Henry Neeman, David Akin, Joshua Alexander, Dana Brunson, S. Patrick Calhoun, James Deaton, Franklin Fondjo Fotou, Brandon George, Debi Gentis, Zane Gray, Eddie Huebsch, George Louthan, Matt Runion, Joel Snow, and Brett Zimmerman
  • “Hybrid Extensions for Stateful Attack Graphs” (Extended abstract reviewed; presented at CISRC 2014) by George Louthan, Michael Haney, Phoebe Hardwicke, Peter Hawrylak, and John Hale (PDF)
  • “Toward Hybrid Attack Dependency Graphs” (Extended abstract reviewed; presented at CSIIRW 2011) by George Louthan, Phoebe Hardwicke, Peter Hawrylak, and John Hale (PDF)
  • “Attack Graphs and Scenario Driven Wireless Computer Network Defense” (Book chapter in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, edited by Cyril Onwubiko and Thomas Owens) by Peter J. Hawrylak, George Louthan IV, Jeremy Daily, John Hale and Mauricio Papa (Book page)
  • “The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness” (CSET 2010 at the 19th USENIX Security Symposium) by George Louthan, Warren Roberts, Matthew Butler, and John Hale (PDF)
  • “Toward Sensitive Information Redaction in a Collaborative, Multilevel Security Environment” (WikiSym 2010) by Peter Gehres, Nathan Singleton, George Louthan, and John Hale (PDF)
  • “Toward Robust and Extensible Network Protocol Identification” (WORLDCOMP / ICOMP 2009) by George Louthan, Collin McMillan, Christopher Johnson, and John Hale (PDF)
  • “Content-based Alternatives to Conventional Network Monitoring Systems” (Extended abstract reviewed; presented at CSIIRW 2009) by George Louthan, Brady Deetz, Matthew Walker, and John Hale

Thesis – Master of Science in Computer Science:

  • Hybrid Attack Graphs for Modeling Cyber-Physical Systems by George Louthan (PDF)


  • “Tandy Supercomputing Center” (PDF) (Poster at GPN 2013)
  • “Risk Metric for Attack Dependency Graphs” (Poster at CSIIRW 2011) by Zach Harbort, George Louthan, and John Hale.
  • “Techniques for Attack Graph Visualization and Interaction” (Poster at CSIIRW 2011) by Christopher Hartney, George Louthan, and John Hale.
  • “SAND: An Architecture for Signature-based Automatic Network Protocol Detection” (PDF) (poster at 18th USENIX Security Symposium)
  • “Large-scale Multitouch Interactive Network Visualization” (PDF) (poster at 18th USENIX Security Symposium, with Cody Pollet)


  • Co-PI, EDA #ED16HDQ0200023 “Tulsa Research Partners Technology Commercialization Concentrator for Tulsa.” PI: David Greer. $351,400. 2016-2018
  • Senior Personnel, NSF #1341028 “CC-NIE Integration: OneOklahoma Friction Free Network.” PI: Henry Neeman. $499,961.00. 2013-2016
  • Project engineer, EDA #080104715 “Tulsa Community Supercomputer.” PI: David Greer. $800,000. 2013.