Search For:

Displaying 1-2 out of 2 total
Building a Bridge across the Transition Chasm
Found in: IEEE Security & Privacy
By Anita D'Amico,Brianne O'Brien,Mark Larkin
Issue Date:March 2013
pp. 24-33
Best practices for transitioning commercially funded research to operational environments don't always apply to government-funded cybersecurity endeavors due to constraints imposed by government regulations, certifications, and funding cycles. Most approac...
Methods of Visualizing Temporal Patterns in and Mission Impact of Computer Security Breaches
Found in: DARPA Information Survivability Conference and Exposition,
By Anita D'Amico, Mark Larkin
Issue Date:June 2001
pp. 0343
Abstract: The primary objectives of this project were to design and prototype 3-D visual representations of: 1) time trends in information security events; and 2) mission impact of information security events. Secure Decisions, a Division of Applied Vision...