Our team is very active in the research community and we frequently publish the results of our work. Here are a few select publications.

Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers

Buchanan, L., D'Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.

Code Pulse: Real-Time Code Coverage for Penetration Testing Activities

Radwan, H., & Prole, K. (2015, April). Code Pulse: Real-time code coverage for penetration testing activities. In Technologies for Homeland Security (HST), 2015 IEEE International Symposium on (pp. 1-6). IEEE.

Mission Assurance Proof-of-Concept: Mapping Dependencies among Cyber Assets, Missions, and Users

Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.

Visual Techniques for Analyzing Wireless Communication Patterns

Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.

Go to Top