Our team is very active in the research community and we frequently publish the results of our work. Here are a few select publications.
Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure
D'Amico, A., Verderosa, C., Horn, C., & Imhof, T. (2011, November). Integrating physical and cyber security resources to detect wireless threats to critical infrastructure. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 494-500). IEEE.
Technology Transition of Network Defense Visual Analytics: Lessons Learned from Case Studies
O'Brien, B. F., D'Amico, A., & Larkin, M. E. (2011, November). Technology transition of network defense visual analytics: Lessons learned from case studies. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 481-486). IEEE.
Visual Analysis of Goal-Directed Network Defense Decisions
Horn, C., & D'Amico, A. (2011, July). Visual analysis of goal-directed network defense decisions. In Proceedings of the 8th international symposium on visualization for cyber security (p. 5). ACM.
Blending Bloom’s Taxonomy and Serious Game Design
Buchanan, L., Wolanczyk, F., & Zinghini, F. (2011, July). Blending Bloom’s taxonomy and serious game design. In Proceedings of the 2011 International Conference on Security and Management (July 2011), SAM (Vol. 11).
Visual Analysis of Code Security
Goodall, J. R., Radwan, H., & Halseth, L. (2010, September). Visual analysis of code security. In Proceedings of the seventh international symposium on visualization for cyber security (pp. 46-51). ACM.
Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users
D'Amico, A., Buchanan, L., Goodall, J., & Walczak, P. (2010, April). Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users. In International Conference on Information Warfare and Security (p. 388). Academic Conferences International Limited.
Camus: Automatically Mapping Cyber Assets to Missions and Users
Goodall, J. R., D'Amico, A., & Kopylec, J. K. (2009, October). CAMUS: automatically mapping cyber assets to missions and users. In MILCOM 2009-2009 IEEE Military Communications Conference (pp. 1-7). IEEE.
APA Article “Preventing Cyber Attacks”
D’Amico, A., Mumford, G., "Monitor on Psychology," 2009, 20-21.
VIAssist: Visual Analytics for Cyber Defense
Goodall, J. R., & Sowul, M. (2009, May). VIAssist: Visual analytics for cyber defense. In Technologies for Homeland Security, 2009. HST'09. IEEE Conference on (pp. 143-150). IEEE.
Visual Analytics for Network Flow Analysis
Goodall, J. R., & Tesone, D. R. (2009, March). Visual analytics for network flow analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 199-204). IEEE.