Publications

Our team is very active in the research community and we frequently publish the results of our work. Here are a few select publications.

 

White papers

Application Security Testing 101: Finding Software Vulnerabilities Before Hackers Do

D’Amico, A., Radwan, H., and Prole, K.

 

Publications

Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers

Buchanan, L., D’Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.

Cyber Operator Perspectives on Security Visualization

D’Amico, A., Buchanan, L., Kirkpatrick, D., & Walczak, P. (2016). Cyber Operator Perspectives on Security Visualization. Advances in Human Factors in Cybersecurity, 69.

Journal of Cognitive Engineering and Decision Making Special Issue Focus: Cybersecurity Decision Making

D’Amico, A., & Roth, E. M. (2015). Introduction to Special Issue of the Journal of Cognitive Engineering and Decision Making Special Issue Focus Cybersecurity Decision Making. Journal of Cognitive Engineering and Decision Making, 9(2), 115-116.

Code Pulse: Real-Time Code Coverage for Penetration Testing Activities

Radwan, H., and Prole, K. “Code Pulse: Real-Time Code Coverage for Penetration Testing Activities”, 2015 IEEE International Symposium on Technologies for Homeland Security.

Building a Bridge across the Transition Chasm

D’Amico, A., O’Brien, B. and Larkin, M. “Building a Bridge across the Transition Chasm”, IEEE Security & Privacy, Technology Transfer edition, Volume 11, No.2, March/April 2013, pp. 24-33.

Mission Assurance Proof-of-Concept: Mapping Dependencies among Cyber Assets, Missions, and Users

Buchanan, L., Larkin, M., & D’Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE International Symposium on Technologies for Homeland Security (pp. 298-304). IEEE.

Visual Techniques for Analyzing Wireless Communication Patterns

Gancarz, K. and Prole, K. (2012 accepted) “Visual Techniques for Analyzing Wireless Communication Patterns”, 2012 IEEE International Conference on Technologies for Homeland Security, 13-15 November 2012, Waltham, MA.

Perspectives on the role of cognition in cyber security

McNeese, M., Cooke, N. J., D’Amico, A., Endsley, M. R., Gonzalez, C., Roth, E., & Salas, E. (2012, September). Perspectives on the role of cognition in cyber security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 56, No. 1, pp. 268-271). Sage CA: Los Angeles, CA: SAGE Publications.

Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure

D’Amico, A., Verderosa, C., Horn, C. and Imhof, T. (2011 accepted) “Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure,” 2011 IEEE International Conference on Technologies for Homeland Security, 15-17 November 2011, Waltham, MA.

Technology Transition of Network Defense Visual Analytics: Lessons Learned from Case Studies

O’Brien, B, D’Amico, A. and Larkin, M. (2011 accepted) “Technology Transition of Network Defense Visual Analytics: Lessons Learned from Case Studies,” 2011 IEEE International Conference on Technologies for Homeland Security, 15-17 November 2011, Waltham, MA.

Visual Analysis of Goal-Directed Network Defense Decisions

Christopher Horn and Anita D’Amico, “Visual Analysis of Goal-Directed Network Defense Decisions,” in Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec  ’11 (Pittsburgh, PA, USA: ACM, 2011).

Blending Bloom’s Taxonomy and Serious Game Design

Buchanan, L, Wolanczyk, F. and Zinghini, F. (2011) “Blending Bloom’s Taxonomy and Serious Game Design.” In Proceedings of the 2011 International Conference on Security and Management (Las Vegas, Nevada USA, July 18-21, 2011), H.R.Arabnia, M.R.Grimaila, G. Markowsky, S. Aissi, Eds. CSREA Press, V.II, 518-521.

Visual Analysis of Code Security

John R. Goodall, Hassan Radwan, and Lenny Halseth (2010), “Visual analysis of code security,” Proceedings of the Seventh International Symposium on Visualization for Cyber Security, pp. 46-51 (VizSec ’10).

Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users

D’Amico, A., Buchanan, L., Goodall, J. and Walczak, P. (2010) “Mission Impact of Cyber Events: Scenarios and Ontology to Express Relationships between Cyber Assets, Missions and Users,” International Conference on i-Warfare and Security (ICIW), The Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA, 8-9 April 2010.

VIAssist: Visual analytics for cyber defense

J. R Goodall and M. Sowul, “VIAssist: Visual analytics for cyber defense,” in Technologies for Homeland Security, 2009. HST’09. IEEE Conference on, 143–150.

Visual Analytics for Network Flow Analysis

John R. Goodall and Daniel R. Tesone, “Visual Analytics for Network Flow Analysis,” in 2009 Cybersecurity Applications & Technology Conference for Homeland Security (presented at the Technology Conference for Homeland Security (CATCH), Washington, DC, USA, 2009), 199-204, http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4804444.

Advances in Topological Vulnerability Analysis

S. Noel et al., “Advances in Topological Vulnerability Analysis,” in Conference For Homeland Security, 2009. CATCH’09. Cybersecurity Applications & Technology, 2009, 124–129.

APA Article “Preventing Cyber Attacks”

This article reported the testimony of Secure Decisions Director Dr. Anita D’Amico before a Congressional subcommittee in June 2009. The article appeared in Monitor on Psychology, a publication of the American Psychological Association.

Camus: Automatically Mapping Cyber Assets to Missions and Users

J. R Goodall, A. D’Amico, and J. K Kopylec, “CAMUS: automatically mapping cyber assets to missions and users,” in Military Communications Conference, 2009. MILCOM 2009. IEEE, 2009, 1–7.

Visual Analytics for Network Flow Analysis

John R. Goodall and Daniel T. Tesone. “Visual Analytics for Network Flow Analysis.” Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH), IEEE Press, 2009, 199-204.

The Jagged Joystick: Game Technology Challenges for Net-Centric Training Simulations

Underwood, M., Tesone, D., D’Amico, A., and Doris, K. (2008) The Jagged Joystick: Game Technology for Net-Centric Training Simulations. Proceedings of the Simulation Interoperability Standards Organization (SISO) Spring 2008 Simulation Interoperability Workshop.

Wireless Cyber Assets Discovery Visualization

Kenneth Prole, John R. Goodall, Anita D. D’Amico, and Jason Kopylec. “Wireless Cyber Assets Discovery Visualization.” Proceedings of the Workshop on Visualization for Computer Security (VizSec), Springer LNCS, 2008, 136-143.

The Real Work of Computer Network Defense Analysts

Anita D’Amico and Kirsten Whitley. “The Real Work of Computer Network Defense Analysts: The Analysis Roles and Processes that Transform Network Data into Security Situation Awareness,” VizSec 2007: Proceedings of the Workshop on Visualization for Computer Security. Springer, Berlin, 2008, 19-37.

Visualizing Cascading Failures in Critical Cyber Infrastructure

Kopylec, Jason K., Anita D. D’Amico, and John R. Goodall. Visualizing Cascading Failures in Critical Cyber Infrastructure. In Eric Goetz and Sujeet Shenoi (eds.), Critical Infrastructure Protection, Springer, Boston, MA, 2007, 351-366

Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts

D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., and Roth, E. “Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts,” Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, 2005, 229-233.

Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation

Daniel R. Tesone and John R. Goodall, “Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation,” Proceedings of the IEEE Symposium on Visual Analytics Science and Technology (VAST), 2007, 67-74.

Visual Discovery in Computer Network Defense

Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.

Focusing on Context in Network Traffic Analysis

John R. Goodall, Wayne G. Lutters, Penny Rheingans and Anita Komlodi, “Focusing on Context in Network Traffic Analysis,” IEEE Computer Graphics and Applications 26(2), IEEE Press, 2006, 72-80.

Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned

Anita D’Amico, Michael Kocka, “Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned,” vizsec, p. 13, IEEE Workshops on Visualization for Computer Security (VizSec’05), 2005

Beyond Requirements: Improving Software Tools for Intelligence Analysts

Geitz, S., Moon, B., D’Amico, A., Hoffman, R. R., & Page, R. (2005, September). Beyond Requirements: Improving Software Tools for Intelligence Analysts. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 49, No. 10, pp. 932-935). Sage CA: Los Angeles, CA: SAGE Publications.

Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches

Anita D’Amico, Mark Larkin, “Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches,” discex, p. 0343, DARPA Information Survivability Conference and Exposition (DISCEX II’01) Volume I-Volume 1, 2001

What Does a Computer Security Breach Really Cost?

D’Amico, Anita. “What Does a Computer Security Breach Really Cost?”, Secure Decisions, prepared September 7, 2000

Achieving Information Resiliency

Paul Zavidniak, Anita D’Amico, and Dennis H. McCallam. “Achieving Information Resiliency,” Information Technology Security Report, vol. 4, no. 3, pp. 54-62, 1999.