Search For:

Displaying 1-6 out of 6 total
Building a Bridge across the Transition Chasm
Found in: IEEE Security & Privacy
By Anita D'Amico,Brianne O'Brien,Mark Larkin
Issue Date:March 2013
pp. 24-33
Best practices for transitioning commercially funded research to operational environments don't always apply to government-funded cybersecurity endeavors due to constraints imposed by government regulations, certifications, and funding cycles. Most approac...
 
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned
Found in: Visualization for Computer Security, IEEE Workshops on
By Anita D'Amico, Michael Kocka
Issue Date:October 2005
pp. 13
Information visualization has proven to be a valuable tool for working more effectively with complex data and maintaining situational awareness in demanding operational domains. Unfortunately, many applications of visualization technology fall short of exp...
 
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches
Found in: DARPA Information Survivability Conference and Exposition,
By Anita D'Amico, Stephen Salas
Issue Date:April 2003
pp. 18
One of the objectives of the DARPA Phase 2 SBIR project entitled
 
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches
Found in: DARPA Information Survivability Conference and Exposition,
By Anita D'Amico, Stephen Salas
Issue Date:April 2003
pp. 190
One of the objectives of the DARPA Phase 2 SBIR project entitled
 
Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches
Found in: DARPA Information Survivability Conference and Exposition,
By Anita D'Amico, Mark Larkin
Issue Date:June 2001
pp. 0343
Abstract: The primary objectives of this project were to design and prototype 3-D visual representations of: 1) time trends in information security events; and 2) mission impact of information security events. Secure Decisions, a Division of Applied Vision...
 
Visual analysis of goal-directed network defense decisions
Found in: Proceedings of the 8th International Symposium on Visualization for Cyber Security (VizSec '11)
By Anita D'Amico, Chris Horn
Issue Date:July 2011
pp. 1-6
Security visualization has been focused largely on graphic representation of data and relationships between network activity, security sensor output, and attacker activity. Visual analysis tools have not been designed to facilitate the analysis of data rel...
     
 1