Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers
Buchanan, L., D'Amico, A., & Kirkpatrick, D. (2016, October). Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. In Visualization for Cyber Security (VizSec), 2016 IEEE Symposium on (pp. 1-8). IEEE.
Cyber Operator Perspectives on Security Visualization
D’Amico, A., Buchanan, L., Kirkpatrick, D., & Walczak, P. (2016). Cyber Operator Perspectives on Security Visualization. Advances in Human Factors in Cybersecurity, 69.
Code Pulse: Real-Time Code Coverage for Penetration Testing Activities
Radwan, H., & Prole, K. (2015, April). Code Pulse: Real-time code coverage for penetration testing activities. In Technologies for Homeland Security (HST), 2015 IEEE International Symposium on (pp. 1-6). IEEE.
Visual Techniques for Analyzing Wireless Communication Patterns
Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.
Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure
D'Amico, A., Verderosa, C., Horn, C., & Imhof, T. (2011, November). Integrating physical and cyber security resources to detect wireless threats to critical infrastructure. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 494-500). IEEE.
Visual Analysis of Code Security
Goodall, J. R., Radwan, H., & Halseth, L. (2010, September). Visual analysis of code security. In Proceedings of the seventh international symposium on visualization for cyber security (pp. 46-51). ACM.
VIAssist: Visual Analytics for Cyber Defense
Goodall, J. R., & Sowul, M. (2009, May). VIAssist: Visual analytics for cyber defense. In Technologies for Homeland Security, 2009. HST'09. IEEE Conference on (pp. 143-150). IEEE.
Visual Analytics for Network Flow Analysis
Goodall, J. R., & Tesone, D. R. (2009, March). Visual analytics for network flow analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 199-204). IEEE.
Advances in Topological Vulnerability Analysis
Noel, S., Elder, M., Jajodia, S., Kalapa, P., O'Hare, S., & Prole, K. (2009, March). Advances in topological vulnerability analysis. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology (pp. 124-129). IEEE.
Wireless Cyber Assets Discovery Visualization
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.
Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation
Tesone, D. R., & Goodall, J. R. (2007, October). Balancing interactive data management of massive data with situational awareness through smart aggregation. In Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on (pp. 67-74). IEEE.
Visual Discovery in Computer Network Defense
Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.
Visualizing Cascading Failures in Critical Cyber Infrastructure
Kopylec, J., D'Amico, A., & Goodall, J. (2007, March). Visualizing cascading failures in critical cyber infrastructures. In International Conference on Critical Infrastructure Protection (pp. 351-364). Springer US.
Focusing on Context in Network Traffic Analysis
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned
D'Amico, A., & Kocka, M. (2005, October). Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). (pp. 107-112). IEEE.
Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches
D'Amico, A., & Larkin, M. (2001). Methods of visualizing temporal patterns in and mission impact of computer security breaches. In DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings (Vol. 1, pp. 343-351). IEEE.