Dr. George R. Mikulski

Full Professor at University of Maryland
SPIE Leadership: Retrieving Data, please wait...
SPIE Involvement: Retrieving Data, please wait...
Area of Expertise: Operating Systems, Intrusion Detection, Computer Security, Data Mining
Websites: Company Website
Contact Details:
Sign In to send a private message or view contact details

Profile Summary

Associate Professor of Computer Science and Information Systems courses:
8**: Information Assurance Integration Capstone
8**: Enterprise Risk Management
7**: Auditing and Incident Response
7**: Culture of Security
7**: Assess and Optimization of Tech
7**: Cloud Management
6**: Database System Design and Implementation
6**: Advanced Cybercrime Analysis
6**: Computer Networks and Data Systems
6**: Intrusion Technologies and Defenses
6**: Computer Forensics
6**: Authentication Technologies and Standards
6**: Industrial Control Systems (ICS) Security
6**: Cybersecurity Studies Capstone
6**: Security Analytics
6**: Cyber Law & Compliance
6**: SCADA Risk Management and Auditing
6**: Advanced Digital Forensics
6**: Cyber Security Methods
6**: Cybersecurity Principles
6**: Mobile and Wireless Security
6**: Software Requirements
6**: Software Verification
6**: Cyber Sec Toolkit Utilization
6**: Validation Testimony Prep
6**: Threat Modeling & Intel
6**: Physical Security
6**: SCADA Security Awareness and Standards
6**: Developing Cyber Security
6**: Auditing and Incident Response
6**: Cyber Security Prevention and Protection
6**: Cybersecurity Policy
6**: Ethical Hacking
6**: CybSec Program Management
6**: Governance in Cybersecurity
5**: Information Systems Security
5**: Enterprise Software Development
5**: Object Oriented Application Development
5**: Advanced Information Technology
5**: Advanced Agile Project Management
5**: Designing Enterprise Resource Planning Systems
5**: Software Quality Assurance
5**: Research Methods in Information Systems
5**: Principles of Information Security and Privacy
5**: Information Security Law and Ethics
5**: Human Computer Interaction
5**: Cyber Security Capstone
5**: Software Engineering Capstone
5**: Software Modeling
5**: Forensic and Business Investigations Techniques
5**: Routing & Switching I
5**: Routing & Switching II
5**: Satellite Communications
5**: Cryptography and Security Mechanisms
5**: Cloud Computing

Upcoming Presentations

Most Recent | Show All
Retrieving Data, please wait...


Most Recent | Show All
Retrieving Data, please wait...

Conference Committee Involvement

Most Recent | Show All
Retrieving Data, please wait...

Course Instructor

Most Recent | Show All
Retrieving Data, please wait...
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research