Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.
Government, academic and industry leaders will lead the 8TH International Symposium on Visualization for Cyber Security. NORTHPORT, NY, February 1, 2011 – VizSec, the international conference on information visualization for cybersecurity, announced its Organizing Committee Chairs for the 8th Annual International Symposium on Visualization for Cyber Security (VizSec2011). The top-tier list brings together experts in information visualization and security to provide the only international forum on innovations in visualization technology to advance cyber security. This year’s event will be held July 20, 2011 at Carnegie Mellon University in Pittsburgh, PA, in conjunction with the Symposium on Usable Privacy and Security (SOUPS 2011). The VizSec2011 Symposium Chairs and Organizing Committee members are: General Chair Lt. Col. Gregory Conti, professor at the US Military Academy, director of West Point’s Cyber Security Center, and author of Googling Security [...]
Secure Decisions Joins Chesapeake Innovation Center in Anne Arundel Country to Advance Cybersecurity R&D for Federal Government
NORTHPORT, NY, December 10, 2010– Secure Decisions, a division of Applied Visions, Inc. and developer of visual analytic tools for cyber defense, has joined the Chesapeake Innovation Center (CIC) in Anne Arundel County, MD to accelerate the development and use of new cyber security visualization technology. The Center’s proximity to the U.S. Department of Homeland Security (DHS), Fort Meade, and defense and intelligence agencies, will allow Secure Decisions to better serve its government clients. This past year, Secure Decisions has had a 20 percent growth in cyber security contract funding from the U.S. Government. The work focuses on providing information visualization technology to support the complex defense and national security needs of military decisions makers and government security specialists. Beyond serving as a major R&D resource for cyber defense visualization technologies, Secure Decisions develops products [...]
8TH International Symposium on Visualization for Cyber Security to be held at Carnegie Mellon University in Pittsburgh, PA NORTHPORT, NY, February 2, 2011 – Organizers of VizSec2011, the international conference on information visualization for cybersecurity, today announced its “Call for Papers”. The 8th Annual International Symposium on Visualization for Cyber Security (VizSec) will be held July 20, 2011 at Carnegie Mellon University in Pittsburgh, PA. VizSec2011 will be held in conjunction with the Symposium on Usable Privacy and Security (SOUPS 2011). The annual symposium joins academic, government, and industry leaders from around the globe to share the latest developments and applications of visualization techniques to address current cyber security challenges. Researchers and practitioners are invited to submit technical papers and panel session proposals that offer a novel contribution to security visualization. Papers are encouraged on [...]
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.
Balancing Interactive Data Management of Massive Data with Situational Awareness through Smart Aggregation
Tesone, D. R., & Goodall, J. R. (2007, October). Balancing interactive data management of massive data with situational awareness through smart aggregation. In Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on (pp. 67-74). IEEE.
Anita D. D’Amico, John R. Goodall, Daniel R. Tesone and Jason K. Kopylec, “Visual Discovery in Computer Network Defense,” IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27.
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2006). Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2), 72-80.