Our team is very active in the research community and we frequently publish the results of our work. Here are a few select publications.
Advances in Topological Vulnerability Analysis
Noel, S., Elder, M., Jajodia, S., Kalapa, P., O'Hare, S., & Prole, K. (2009, March). Advances in topological vulnerability analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 124-129). IEEE.
Wireless Cyber Assets Discovery Visualization
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.
The Jagged Joystick: Game Technology Challenges for Net-Centric Training Simulations
Underwood, M., Tesone, D., D’Amico, A., & Doris, K. The Jagged Joystick: Game Technology for Net-Centric Training Simulations.
The Real Work of Computer Network Defense Analysts
D’Amico, A., & Whitley, K. (2008). The real work of computer network defense analysts. In VizSEC 2007 (pp. 19-37). Springer Berlin Heidelberg.
Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation
Tesone, D. R., & Goodall, J. R. (2007, October). Balancing interactive data management of massive data with situational awareness through smart aggregation. In Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on (pp. 67-74). IEEE.
Visual Discovery in Computer Network Defense
Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.
Visualizing Cascading Failures in Critical Cyber Infrastructure
Kopylec, J., D'Amico, A., & Goodall, J. (2007, March). Visualizing cascading failures in critical cyber infrastructures. In International Conference on Critical Infrastructure Protection (pp. 351-364). Springer US.
Focusing on Context in Network Traffic Analysis
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned
D'Amico, A., & Kocka, M. (2005, October). Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). (pp. 107-112). IEEE.
Beyond Requirements: Improving Software Tools for Intelligence Analysts
Geitz, S., Moon, B., D'Amico, A., Hoffman, R. R., & Page, R. (2005, September). Beyond Requirements: Improving Software Tools for Intelligence Analysts. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 49, No. 10, pp. 932-935). Sage CA: Los Angeles, CA: SAGE Publications.