Wireless Cyber Assets Discovery Visualization
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.
D’Amico, A., & Whitley, K. (2008). The real work of computer network defense analysts. In VizSEC 2007 (pp. 19-37). Springer Berlin Heidelberg.
Tesone, D. R., & Goodall, J. R. (2007, October). Balancing interactive data management of massive data with situational awareness through smart aggregation. In Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on (pp. 67-74). IEEE.
Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.
D'Amico, A., & Kocka, M. (2005, October). Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). (pp. 107-112). IEEE.
D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., and Roth, E. “Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts,” Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, 2005, 229-233.
D’Amico, A. D. (2000). What does a computer security breach really cost. Secure Decisions, Applied Visions Inc.
Zavidniak, P., D'Amico, A., & McCallam, D. H. (1999). Achieving information resiliency. Information Security Technical Report, 4(3), 54-62.