computer security

Home / Tag: computer security

Mission Assurance Proof-of-Concept: Mapping Dependencies among Cyber Assets, Missions, and Users

Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.

Integrating Physical and Cyber Security Resources to Detect Wireless Threats to Critical Infrastructure

D'Amico, A., Verderosa, C., Horn, C., & Imhof, T. (2011, November). Integrating physical and cyber security resources to detect wireless threats to critical infrastructure. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 494-500). IEEE.

Technology Transition of Network Defense Visual Analytics: Lessons Learned from Case Studies

O'Brien, B. F., D'Amico, A., & Larkin, M. E. (2011, November). Technology transition of network defense visual analytics: Lessons learned from case studies. In Technologies for Homeland Security (HST), 2011 IEEE International Conference on (pp. 481-486). IEEE.

Secure Decisions’ Research and Products to be Showcased at 2011 IAE

VIAssist and MeerCAT-FS among products to be demonstrated at the Information Assurance Exposition to government and industry IA community. NORTHPORT, NY, March 3, 2011 – Secure Decisions, a division of Applied Visions, Inc. (AVI) and developer of visual cyber defense and decision support tools, will be demonstrating its latest research and products at the 2011 Information Assurance Exposition (IAE). Approximately 2000 information assurance professionals and leaders from the government, industry, and academia are expected to attend the annual event. The IAE will be held in conjunction with the DoD-sponsored 2011 Information Assurance Symposium (IAS) on March 8-10 at the Gaylord Opryland Convention Center in Nashville, TN. Secure Decisions will demonstrate its latest information visualization tools to enhance cyber security situational awareness, perform mission impact analysis, test information operations capabilities, and train cyber defenders. Specific products [...]