Ocelot: user-centered design of a decision support visualization for network quarantine
Arendt, Dustin L., Burtner, Russ, Best, Daniel M., Bos, Nathan D., Gersh, John R., Piatko, Christine D., Paul, Celeste Lyn
Published in 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) (25.10.2015)
Published in 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) (25.10.2015)
Get full text
Conference Proceeding
Atypical behavior identification in large-scale network traffic
Best, D. M., Hafen, R. P., Olsen, B. K., Pike, W. A.
Published in 2011 IEEE Symposium on Large Data Analysis and Visualization (01.10.2011)
Published in 2011 IEEE Symposium on Large Data Analysis and Visualization (01.10.2011)
Get full text
Conference Proceeding
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data
Kay, Bill, Aksoy, Sinan G, Baird, Molly, Best, Daniel M, Jenne, Helen, Joslyn, Cliff, Potvin, Christopher, Henselman-Petrusek, Gregory, Seppala, Garret, Young, Stephen J, Purvine, Emilie
Year of Publication 09.11.2023
Year of Publication 09.11.2023
Get full text
Journal Article
Malicious Cyber Activity Detection Using Zigzag Persistence
Myers, Audun, Bittner, Alyson, Aksoy, Sinan, Best, Daniel M, Henselman-Petrusek, Gregory, Jenne, Helen, Joslyn, Cliff, Kay, Bill, Seppala, Garret, Young, Stephen J, Purvine, Emilie
Year of Publication 14.09.2023
Year of Publication 14.09.2023
Get full text
Journal Article
The Scalable Reasoning System: Lightweight visualization for distributed analytics
Pike, William, Bruce, Joe, Baddeley, Bob, Best, Daniel, Franklin, Lyndsey, May, Richard, Rice, Douglas, Riensche, Rick, Younkin, Katarina
Published in Information visualization (01.03.2009)
Published in Information visualization (01.03.2009)
Get full text
Journal Article
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data
Kay, Bill, Aksoy, Sinan G, Baird, Molly, Best, Daniel M, Jenne, Helen, Joslyn, Cliff, Potvin, Christopher, Gregory Henselman-Petrusek, Seppala, Garret, Young, Stephen J, Purvine, Emilie
Published in arXiv.org (09.11.2023)
Get full text
Published in arXiv.org (09.11.2023)
Paper
Improved cyber threat indicator sharing by scoring privacy risk
Best, Daniel M., Bhatia, Jaspreet, Peterson, Elena S., Breaux, Travis D.
Published in 2017 IEEE International Symposium on Technologies for Homeland Security (HST) (01.04.2017)
Published in 2017 IEEE International Symposium on Technologies for Homeland Security (HST) (01.04.2017)
Get full text
Conference Proceeding
CyberPetri at CDX 2016: Real-time network situation awareness
Arendt, Dustin, Best, Dan, Burtner, Russ, Lyn Paul, Celeste
Published in 2016 IEEE Symposium on Visualization for Cyber Security (VizSec) (01.10.2016)
Published in 2016 IEEE Symposium on Visualization for Cyber Security (VizSec) (01.10.2016)
Get full text
Conference Proceeding
Towards efficient collaboration in cyber security
Hui, Peter, Bruce, Joe, Fink, Glenn, Gregory, Michelle, Best, Daniel, McGrath, Liam, Endert, Alex
Published in 2010 International Symposium on Collaborative Technologies and Systems (01.05.2010)
Published in 2010 International Symposium on Collaborative Technologies and Systems (01.05.2010)
Get full text
Conference Proceeding
From Desktop to Field: Deploying Visual Incident Analysis for Law Enforcement
Baddeley, B., Younkin, K., Riensche, R., Best, D., Pike, W.A., May, R.
Published in 2008 IEEE Conference on Technologies for Homeland Security (01.05.2008)
Published in 2008 IEEE Conference on Technologies for Homeland Security (01.05.2008)
Get full text
Conference Proceeding