Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts A D'Amico, K Whitley, D Tesone, B O'Brien, E Roth Proceedings of the human factors and ergonomics society annual meeting 49 (3 …, 2005 | 209 | 2005 |
The real work of computer network defense analysts: The analysis roles and processes that transform network data into security situation awareness A D’Amico, K Whitley VizSEC 2007: Proceedings of the workshop on visualization for computer …, 2008 | 177 | 2008 |
Visualizing security incidents in a computer network ME Larkin, AD D'amico US Patent 6,906,709, 2005 | 101 | 2005 |
Camus: automatically mapping cyber assets to missions and users JR Goodall, A D'Amico, JK Kopylec MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009 | 66 | 2009 |
Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned A D'Amico, M Kocka IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 107-112, 2005 | 66 | 2005 |
Visual discovery in computer network defense AD D'Amico, JR Goodall, DR Tesone, JK Kopylec IEEE Computer Graphics and Applications 27 (5), 20-27, 2007 | 59 | 2007 |
MISSION IMPACT OF CYBER EVENTS: SCENARIOS AND ONTOLOGY TO EXPRESS THE RELATIONSHIPS BETWEEN CYBER ASSETS, MISSIONS, AND USERS (PREPRINT) A D’Amico, L Buchanan, J Goodall, P Walczak | 52 | 2009 |
Perspectives on the role of cognition in cyber security M McNeese, NJ Cooke, A D’Amico, MR Endsley, C Gonzalez, E Roth, ... Proceedings of the Human Factors and Ergonomics Society Annual Meeting 56 (1 …, 2012 | 39 | 2012 |
What does a computer security breach really cost AD D’Amico The Sans Institute, 2000 | 32 | 2000 |
Cyber operator perspectives on security visualization A D’Amico, L Buchanan, D Kirkpatrick, P Walczak Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 …, 2016 | 29 | 2016 |
Visualizing cascading failures in critical cyber infrastructures J Kopylec, A D'Amico, J Goodall International Conference on Critical Infrastructure Protection, 351-364, 2007 | 25 | 2007 |
Methods of visualizing temporal patterns in and mission impact of computer security breaches A D'Amico, M Larkin Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 20 | 2001 |
Building a bridge across the transition chasm A D'Amico, B O'Brien, M Larkin IEEE security & privacy 11 (2), 24-33, 2012 | 18 | 2012 |
Understanding the cyber defender: a cognitive task analysis of information assurance analysts A D’Amico, D Tesone, K Whitley, B O’Brien, E Roth Report No. CSA-CTA-ll. Secure Decisions. Funded by ARDA and DOD, 2005 | 15 | 2005 |
Visualization as an aid for assessing the mission impact of information security breaches' A D'Amico, S Salas Proceedings DARPA Information Survivability Conference and Exposition 2, 190-195, 2003 | 15 | 2003 |
Visual analysis of goal-directed network defense decisions C Horn, A D'Amico Proceedings of the 8th international symposium on visualization for cyber …, 2011 | 14 | 2011 |
Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users L Buchanan, M Larkin, A D'Amico 2012 IEEE Conference on Technologies for Homeland Security (HST), 298-304, 2012 | 13 | 2012 |
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers L Buchanan, A D'Amico, D Kirkpatrick 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016 | 11 | 2016 |
Integrating physical and cyber security resources to detect wireless threats to critical infrastructure A D'Amico, C Verderosa, C Horn, T Imhof 2011 IEEE International Conference on Technologies for Homeland Security …, 2011 | 11 | 2011 |
Wireless cyber assets discovery visualization K Prole, JR Goodall, AD D’Amico, JK Kopylec International Workshop on Visualization for Computer Security, 136-143, 2008 | 9 | 2008 |