Follow
Anita D. D'amico
Anita D. D'amico
CEO Code DX
Verified email at umich.edu
Title
Cited by
Cited by
Year
Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts
A D'Amico, K Whitley, D Tesone, B O'Brien, E Roth
Proceedings of the human factors and ergonomics society annual meeting 49 (3 …, 2005
2072005
The real work of computer network defense analysts: The analysis roles and processes that transform network data into security situation awareness
A D’Amico, K Whitley
VizSEC 2007: Proceedings of the workshop on visualization for computer …, 2008
1762008
Visualizing security incidents in a computer network
ME Larkin, AD D'amico
US Patent 6,906,709, 2005
1012005
Camus: automatically mapping cyber assets to missions and users
JR Goodall, A D'Amico, JK Kopylec
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
672009
Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned
A D'Amico, M Kocka
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 107-112, 2005
672005
Visual discovery in computer network defense
AD D'Amico, JR Goodall, DR Tesone, JK Kopylec
IEEE Computer Graphics and Applications 27 (5), 20-27, 2007
602007
MISSION IMPACT OF CYBER EVENTS: SCENARIOS AND ONTOLOGY TO EXPRESS THE RELATIONSHIPS BETWEEN CYBER ASSETS, MISSIONS, AND USERS (PREPRINT)
A D’Amico, L Buchanan, J Goodall, P Walczak
492009
Perspectives on the role of cognition in cyber security
M McNeese, NJ Cooke, A D’Amico, MR Endsley, C Gonzalez, E Roth, ...
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 56 (1 …, 2012
382012
What does a computer security breach really cost
AD D’Amico
The Sans Institute, 2000
322000
Cyber operator perspectives on security visualization
A D’Amico, L Buchanan, D Kirkpatrick, P Walczak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 …, 2016
292016
Visualizing cascading failures in critical cyber infrastructures
J Kopylec, A D'Amico, J Goodall
International Conference on Critical Infrastructure Protection, 351-364, 2007
252007
Methods of visualizing temporal patterns in and mission impact of computer security breaches
A D'Amico, M Larkin
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
202001
Building a bridge across the transition chasm
A D'Amico, B O'Brien, M Larkin
IEEE security & privacy 11 (2), 24-33, 2012
182012
Understanding the cyber defender: a cognitive task analysis of information assurance analysts
A D’Amico, D Tesone, K Whitley, B O’Brien, E Roth
Report No. CSA-CTA-ll. Secure Decisions. Funded by ARDA and DOD, 2005
162005
Visualization as an aid for assessing the mission impact of information security breaches'
A D'Amico, S Salas
Proceedings DARPA Information Survivability Conference and Exposition 2, 190-195, 2003
152003
Visual analysis of goal-directed network defense decisions
C Horn, A D'Amico
Proceedings of the 8th international symposium on visualization for cyber …, 2011
142011
Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users
L Buchanan, M Larkin, A D'Amico
2012 IEEE Conference on Technologies for Homeland Security (HST), 298-304, 2012
122012
Integrating physical and cyber security resources to detect wireless threats to critical infrastructure
A D'Amico, C Verderosa, C Horn, T Imhof
2011 IEEE International Conference on Technologies for Homeland Security …, 2011
112011
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers
L Buchanan, A D'Amico, D Kirkpatrick
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016
102016
Wireless cyber assets discovery visualization
K Prole, JR Goodall, AD D’Amico, JK Kopylec
International Workshop on Visualization for Computer Security, 136-143, 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20