Our team is very active in the research community and we frequently publish the results of our work. Here are a few select publications.
Measuring Application Security
Horn, C., & Anita, D. A. (2018, July). Measuring Application Security. In International Conference on Applied Human Factors and Ergonomics (pp. 44-55). Springer, Cham.
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers
Buchanan, L., D'Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.
Cyber Operator Perspectives on Security Visualization
D’Amico, A., Buchanan, L., Kirkpatrick, D., & Walczak, P. (2016). Cyber Operator Perspectives on Security Visualization. Advances in Human Factors in Cybersecurity, 69.
Journal of Cognitive Engineering and Decision Making Special Issue Focus: Cybersecurity Decision Making
D’Amico, A., & Roth, E. M. (2015). Introduction to Special Issue of the Journal of Cognitive Engineering and Decision Making Special Issue Focus Cybersecurity Decision Making. Journal of Cognitive Engineering and Decision Making, 9(2), 115-116.
Code Pulse: Real-Time Code Coverage for Penetration Testing Activities
Radwan, H., & Prole, K. (2015, April). Code Pulse: Real-time code coverage for penetration testing activities. In Technologies for Homeland Security (HST), 2015 IEEE International Symposium on (pp. 1-6). IEEE.
Building a Bridge across the Transition Chasm
D'Amico, A., O'Brien, B., & Larkin, M. (2013). Building a bridge across the transition chasm. IEEE Security & Privacy, 11(2), 24-33.
Mission Assurance Proof-of-Concept: Mapping Dependencies among Cyber Assets, Missions, and Users
Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.
Visual Techniques for Analyzing Wireless Communication Patterns
Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.
Perspectives on the role of cognition in cyber security
McNeese, M., Cooke, N. J., D’Amico, A., Endsley, M. R., Gonzalez, C., Roth, E., & Salas, E. (2012, September). Perspectives on the role of cognition in cyber security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 56, No. 1, pp. 268-271). Sage CA: Los Angeles, CA: SAGE Publications.
Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed
Rosenstein, M., & Corvese, F. (2012, August). A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed. In CSET.