Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.
Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users
D'Amico, A., Buchanan, L., Goodall, J., & Walczak, P. (2010, April). Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users. In International Conference on Information Warfare and Security (p. 388). Academic Conferences International Limited.
Goodall, J. R., D'Amico, A., & Kopylec, J. K. (2009, October). CAMUS: automatically mapping cyber assets to missions and users. In MILCOM 2009-2009 IEEE Military Communications Conference (pp. 1-7). IEEE.
Kopylec, J., D'Amico, A., & Goodall, J. (2007, March). Visualizing cascading failures in critical cyber infrastructures. In International Conference on Critical Infrastructure Protection (pp. 351-364). Springer US.
D'Amico, A., & Larkin, M. (2001). Methods of visualizing temporal patterns in and mission impact of computer security breaches. In DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings (Vol. 1, pp. 343-351). IEEE.