Mission Assurance Proof-of-Concept: Mapping Dependencies among Cyber Assets, Missions, and Users
Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.
Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users
D'Amico, A., Buchanan, L., Goodall, J., & Walczak, P. (2010, April). Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users. In International Conference on Information Warfare and Security (p. 388). Academic Conferences International Limited.
Camus: Automatically Mapping Cyber Assets to Missions and Users
Goodall, J. R., D'Amico, A., & Kopylec, J. K. (2009, October). CAMUS: automatically mapping cyber assets to missions and users. In MILCOM 2009-2009 IEEE Military Communications Conference (pp. 1-7). IEEE.
Visualizing Cascading Failures in Critical Cyber Infrastructure
Kopylec, J., D'Amico, A., & Goodall, J. (2007, March). Visualizing cascading failures in critical cyber infrastructures. In International Conference on Critical Infrastructure Protection (pp. 351-364). Springer US.
Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches
D'Amico, A., & Larkin, M. (2001). Methods of visualizing temporal patterns in and mission impact of computer security breaches. In DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings (Vol. 1, pp. 343-351). IEEE.