O'Brien, B. F., D'Amico, A., & Larkin, M. E. (2011, November). Technology transition of network defense visual analytics: Lessons learned from case studies. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 481-486). IEEE.
Buchanan, L., Wolanczyk, F., & Zinghini, F. (2011, July). Blending Bloom’s taxonomy and serious game design. In Proceedings of the 2011 International Conference on Security and Management (July 2011), SAM (Vol. 11).
Goodall, J. R., Radwan, H., & Halseth, L. (2010, September). Visual analysis of code security. In Proceedings of the seventh international symposium on visualization for cyber security (pp. 46-51). ACM.
D'Amico, A., Buchanan, L., Goodall, J., & Walczak, P. (2010, April). Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users. In International Conference on Information Warfare and Security (p. 388). Academic Conferences International Limited.
Goodall, J. R., D'Amico, A., & Kopylec, J. K. (2009, October). CAMUS: automatically mapping cyber assets to missions and users. In MILCOM 2009-2009 IEEE Military Communications Conference (pp. 1-7). IEEE.
Goodall, J. R., & Tesone, D. R. (2009, March). Visual analytics for network flow analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 199-204). IEEE.