Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.
Wireless security visualization product is available for U.S. Government users on Naval Research Laboratory website. NORTHPORT, NY, April 12, 2011 – Secure Decisions, a division of Applied Visions, Inc., has released a government off-the-shelf (GOTS) version of MeerCAT to the U.S. Naval Research Laboratory (NRL) in Washington, DC. MeerCAT is a visual analytics tool that helps users locate and assess the security risks of IEEE 802.11 wireless networks. The GOTS version, known as MeerCAT-FS, was initially developed under a Defense Advanced Research Project Agency (DARPA) SBIR award. Through sponsorship from the Defense Information Systems Agency (DISA), MeerCAT-FS has been incorporated as part of NRL’s Flying Squirrel Wireless Assessment Tool Suite. The Flying Squirrel Tool Suite, which includes the Flying Squirrel wireless discovery application and other components in addition to MeerCAT-FS, was developed to enhance the [...]
Division of Applied Visions to deliver, maintain and support GOTS version of its wireless security assessment tool for government users of Flying Squirrel. NORTHPORT, NY, November 2, 2010 – Secure Decisions, a division of Applied Visions, Inc. and developer of visual analytic tools for cyber defense, has received an U.S. Naval Research Laboratory (NRL) Broad Agency Announcement (BAA) award. Under the contract, Secure Decisions will deliver MeerCAT-FS, a government off-the-shelf (GOTS) version of the company’s wireless security visualization tool. The contract work includes maintaining the software application and providing third-level product support to NRL through May 2011. MeerCAT-FS provides an integrated set of visual tools to analyze, correlate, and report on wireless discoveries with NRL’s Flying Squirrel. By providing visual representations of the collected data, Flying Squirrel users can more easily identify, locate, and assess [...]
Prole, K., Goodall, J. R., D’Amico, A. D., & Kopylec, J. K. (2008). Wireless cyber assets discovery visualization. In Visualization for Computer Security (pp. 136-143). Springer Berlin Heidelberg.