Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers
Buchanan, L., D'Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.
Cyber Operator Perspectives on Security Visualization
D’Amico, A., Buchanan, L., Kirkpatrick, D., & Walczak, P. (2016). Cyber Operator Perspectives on Security Visualization. Advances in Human Factors in Cybersecurity, 69.
Journal of Cognitive Engineering and Decision Making Special Issue Focus: Cybersecurity Decision Making
D’Amico, A., & Roth, E. M. (2015). Introduction to Special Issue of the Journal of Cognitive Engineering and Decision Making Special Issue Focus Cybersecurity Decision Making. Journal of Cognitive Engineering and Decision Making, 9(2), 115-116.
Visual Techniques for Analyzing Wireless Communication Patterns
Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.
Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure
D'Amico, A., Verderosa, C., Horn, C., & Imhof, T. (2011, November). Integrating physical and cyber security resources to detect wireless threats to critical infrastructure. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 494-500). IEEE.
Visual Analysis of Goal-Directed Network Defense Decisions
Horn, C., & D'Amico, A. (2011, July). Visual analysis of goal-directed network defense decisions. In Proceedings of the 8th international symposium on visualization for cyber security (p. 5). ACM.
APA Article “Preventing Cyber Attacks”
D’Amico, A., Mumford, G., "Monitor on Psychology," 2009, 20-21.
VIAssist: Visual Analytics for Cyber Defense
Goodall, J. R., & Sowul, M. (2009, May). VIAssist: Visual analytics for cyber defense. In Technologies for Homeland Security, 2009. HST'09. IEEE Conference on (pp. 143-150). IEEE.
Visual Analytics for Network Flow Analysis
Goodall, J. R., & Tesone, D. R. (2009, March). Visual analytics for network flow analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 199-204). IEEE.
Advances in Topological Vulnerability Analysis
Noel, S., Elder, M., Jajodia, S., Kalapa, P., O'Hare, S., & Prole, K. (2009, March). Advances in topological vulnerability analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 124-129). IEEE.
Wireless Cyber Assets Discovery Visualization
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.
The Real Work of Computer Network Defense Analysts
D’Amico, A., & Whitley, K. (2008). The real work of computer network defense analysts. In VizSEC 2007 (pp. 19-37). Springer Berlin Heidelberg.
Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation
Tesone, D. R., & Goodall, J. R. (2007, October). Balancing interactive data management of massive data with situational awareness through smart aggregation. In Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on (pp. 67-74). IEEE.
Visual Discovery in Computer Network Defense
Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.
Focusing on Context in Network Traffic Analysis
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned
D'Amico, A., & Kocka, M. (2005, October). Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). (pp. 107-112). IEEE.
Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts
D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., and Roth, E. “Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts,” Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, 2005, 229-233.
What Does a Computer Security Breach Really Cost?
D’Amico, A. D. (2000). What does a computer security breach really cost. Secure Decisions, Applied Visions Inc.
Achieving Information Resiliency
Zavidniak, P., D'Amico, A., & McCallam, D. H. (1999). Achieving information resiliency. Information Security Technical Report, 4(3), 54-62.