Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers

Buchanan, L., D'Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.

Code Pulse: Real-Time Code Coverage for Penetration Testing Activities

Radwan, H., & Prole, K. (2015, April). Code Pulse: Real-time code coverage for penetration testing activities. In Technologies for Homeland Security (HST), 2015 IEEE International Symposium on (pp. 1-6). IEEE.

Visual Techniques for Analyzing Wireless Communication Patterns

Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.

Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure

D'Amico, A., Verderosa, C., Horn, C., & Imhof, T. (2011, November). Integrating physical and cyber security resources to detect wireless threats to critical infrastructure. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 494-500). IEEE.

Go to Top