Buchanan, L., D'Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.
D’Amico, A., & Roth, E. M. (2015). Introduction to Special Issue of the Journal of Cognitive Engineering and Decision Making Special Issue Focus Cybersecurity Decision Making. Journal of Cognitive Engineering and Decision Making, 9(2), 115-116.
Radwan, H., & Prole, K. (2015, April). Code Pulse: Real-time code coverage for penetration testing activities. In Technologies for Homeland Security (HST), 2015 IEEE International Symposium on (pp. 1-6). IEEE.
Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.
McNeese, M., Cooke, N. J., D’Amico, A., Endsley, M. R., Gonzalez, C., Roth, E., & Salas, E. (2012, September). Perspectives on the role of cognition in cyber security. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 56, No. 1, pp. 268-271). Sage CA: Los Angeles, CA: SAGE Publications.