Our team is very active in the research community and we frequently publish the results of our work. Here are a few select publications.


Advances in Topological Vulnerability Analysis

Noel, S., Elder, M., Jajodia, S., Kalapa, P., O'Hare, S., & Prole, K. (2009, March). Advances in topological vulnerability analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 124-129). IEEE.


Wireless Cyber Assets Discovery Visualization

Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.


Visual Discovery in Computer Network Defense

Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.


Beyond Requirements: Improving Software Tools for Intelligence Analysts

Geitz, S., Moon, B., D'Amico, A., Hoffman, R. R., & Page, R. (2005, September). Beyond Requirements: Improving Software Tools for Intelligence Analysts. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 49, No. 10, pp. 932-935). Sage CA: Los Angeles, CA: SAGE Publications.

Go to Top