Focusing on Context in Network Traffic Analysis
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.
D'Amico, A., & Kocka, M. (2005, October). Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). (pp. 107-112). IEEE.
SecureScope received an Honorable Mention distinction at the eleventh annual IEEE Symposium on Information Visualization. InfoVis is the primary meeting in the field of information visualization, held in conjunction with the IEEE Visualization 2005 (Vis05) conference. 2005-10-23 InfoVis is the primary meeting in the field of information visualization, and is held in conjunction with the IEEE Visualization 2005 (Vis05) conference. Co-located with Infovis 2005 was the Workshop on Visualization for Computer Security. Secure Decisions' SecureScope product was entered a competition against a wide array of visualization products, and was one of only a few to be awarded an Honorable Mention.
Geitz, S., Moon, B., D'Amico, A., Hoffman, R. R., & Page, R. (2005, September). Beyond Requirements: Improving Software Tools for Intelligence Analysts. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 49, No. 10, pp. 932-935). Sage CA: Los Angeles, CA: SAGE Publications.
D'Amico, A., & Larkin, M. (2001). Methods of visualizing temporal patterns in and mission impact of computer security breaches. In DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings (Vol. 1, pp. 343-351). IEEE.
D’Amico, A. D. (2000). What does a computer security breach really cost. Secure Decisions, Applied Visions Inc.
Zavidniak, P., D'Amico, A., & McCallam, D. H. (1999). Achieving information resiliency. Information Security Technical Report, 4(3), 54-62.