Follow
Anita D. D'amico
Anita D. D'amico
CEO Code DX
Verified email at umich.edu
Title
Cited by
Cited by
Year
Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts
A D'Amico, K Whitley, D Tesone, B O'Brien, E Roth
Proceedings of the human factors and ergonomics society annual meeting 49 (3 …, 2005
1942005
The real work of computer network defense analysts: The analysis roles and processes that transform network data into security situation awareness
A D’Amico, K Whitley
VizSEC 2007: Proceedings of the workshop on visualization for computer …, 2008
1662008
Visualizing security incidents in a computer network
ME Larkin, AD D'amico
US Patent 6,906,709, 2005
972005
Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned
A D'Amico, M Kocka
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 107-112, 2005
672005
Camus: automatically mapping cyber assets to missions and users
JR Goodall, A D'Amico, JK Kopylec
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
642009
Visual discovery in computer network defense
AD D'Amico, JR Goodall, DR Tesone, JK Kopylec
IEEE Computer Graphics and Applications 27 (5), 20-27, 2007
612007
Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions, and users
A D'Amico, L Buchanan, J Goodall, P Walczak
APPLIED VISIONS INC NORTHPORT NY, 2009
492009
Perspectives on the role of cognition in cyber security
M McNeese, NJ Cooke, A D’Amico, MR Endsley, C Gonzalez, E Roth, ...
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 56 (1 …, 2012
332012
What does a computer security breach really cost
AD D’Amico
Secure Decisions, Applied Visions Inc, 2000
322000
Cyber operator perspectives on security visualization
A D’Amico, L Buchanan, D Kirkpatrick, P Walczak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 …, 2016
252016
Visualizing cascading failures in critical cyber infrastructures
J Kopylec, A D'Amico, J Goodall
Critical Infrastructure Protection 1, 351-364, 2008
222008
Methods of visualizing temporal patterns in and mission impact of computer security breaches
A D'Amico, M Larkin
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
202001
Building a bridge across the transition chasm
A D'Amico, B O'Brien, M Larkin
IEEE security & privacy 11 (2), 24-33, 2012
172012
Understanding the cyber defender: a cognitive task analysis of information assurance analysts
A D’Amico, D Tesone, K Whitley, B O’Brien, E Roth
Report No. CSA-CTA-ll. Secure Decisions. Funded by ARDA and DOD, 2005
162005
Visual analysis of goal-directed network defense decisions
C Horn, A D'Amico
Proceedings of the 8th international symposium on visualization for cyber …, 2011
142011
Visualization as an aid for assessing the mission impact of information security breaches'
A D'Amico, S Salas
Proceedings DARPA Information Survivability Conference and Exposition 2, 190-195, 2003
142003
Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users
L Buchanan, M Larkin, A D'Amico
2012 IEEE Conference on Technologies for Homeland Security (HST), 298-304, 2012
122012
Integrating physical and cyber security resources to detect wireless threats to critical infrastructure
A D'Amico, C Verderosa, C Horn, T Imhof
2011 IEEE International Conference on Technologies for Homeland Security …, 2011
102011
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers
L Buchanan, A D'Amico, D Kirkpatrick
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2016
92016
Wireless cyber assets discovery visualization
K Prole, JR Goodall, AD D’Amico, JK Kopylec
Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20