Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts A D'Amico, K Whitley, D Tesone, B O'Brien, E Roth Proceedings of the human factors and ergonomics society annual meeting 49 (3 ¡¦, 2005 | 215 | 2005 |
The real work of computer network defense analysts: The analysis roles and processes that transform network data into security situation awareness A D¡¯Amico, K Whitley VizSEC 2007: Proceedings of the workshop on visualization for computer ¡¦, 2008 | 187 | 2008 |
Visualizing security incidents in a computer network ME Larkin, AD D'amico US Patent 6,906,709, 2005 | 108 | 2005 |
Camus: automatically mapping cyber assets to missions and users JR Goodall, A D'Amico, JK Kopylec MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009 | 67 | 2009 |
Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned A D'Amico, M Kocka IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 107-112, 2005 | 66 | 2005 |
Visual discovery in computer network defense AD D'Amico, JR Goodall, DR Tesone, JK Kopylec IEEE Computer Graphics and Applications 27 (5), 20-27, 2007 | 59 | 2007 |
MISSION IMPACT OF CYBER EVENTS: SCENARIOS AND ONTOLOGY TO EXPRESS THE RELATIONSHIPS BETWEEN CYBER ASSETS, MISSIONS, AND USERS (PREPRINT) A D¡¯Amico, L Buchanan, J Goodall, P Walczak | 53 | 2009 |
Perspectives on the role of cognition in cyber security M McNeese, NJ Cooke, A D¡¯Amico, MR Endsley, C Gonzalez, E Roth, ... Proceedings of the Human Factors and Ergonomics Society Annual Meeting 56 (1 ¡¦, 2012 | 41 | 2012 |
What does a computer security breach really cost AD D¡¯Amico The Sans Institute, 2000 | 33 | 2000 |
Cyber operator perspectives on security visualization A D¡¯Amico, L Buchanan, D Kirkpatrick, P Walczak Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 ¡¦, 2016 | 30 | 2016 |
Visualizing cascading failures in critical cyber infrastructures J Kopylec, A D'Amico, J Goodall International Conference on Critical Infrastructure Protection, 351-364, 2007 | 25 | 2007 |
Methods of visualizing temporal patterns in and mission impact of computer security breaches A D'Amico, M Larkin Proceedings DARPA Information Survivability Conference and Exposition II ¡¦, 2001 | 20 | 2001 |
Building a bridge across the transition chasm A D'Amico, B O'Brien, M Larkin IEEE security & privacy 11 (2), 24-33, 2012 | 19 | 2012 |
Understanding the cyber defender: a cognitive task analysis of information assurance analysts A D¡¯Amico, D Tesone, K Whitley, B O¡¯Brien, E Roth Report No. CSA-CTA-ll. Secure Decisions. Funded by ARDA and DOD, 2005 | 15 | 2005 |
Visualization as an aid for assessing the mission impact of information security breaches' A D'Amico, S Salas Proceedings DARPA Information Survivability Conference and Exposition 2, 190-195, 2003 | 15 | 2003 |
Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users L Buchanan, M Larkin, A D'Amico 2012 IEEE Conference on Technologies for Homeland Security (HST), 298-304, 2012 | 14 | 2012 |
Visual analysis of goal-directed network defense decisions C Horn, A D'Amico Proceedings of the 8th international symposium on visualization for cyber ¡¦, 2011 | 14 | 2011 |
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers L Buchanan, A D'Amico, D Kirkpatrick 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016 | 11 | 2016 |
Integrating physical and cyber security resources to detect wireless threats to critical infrastructure A D'Amico, C Verderosa, C Horn, T Imhof 2011 IEEE International Conference on Technologies for Homeland Security ¡¦, 2011 | 11 | 2011 |
Wireless cyber assets discovery visualization K Prole, JR Goodall, AD D¡¯Amico, JK Kopylec International Workshop on Visualization for Computer Security, 136-143, 2008 | 9 | 2008 |