Visualization Techniques and Analytics

McKenna, S., Staheli, D., Fulcher, C., Meyer, M., BubbleNet: A Cyber Security Dashboard for Visualizing Patterns, Computer Graphics Forum 35(3), pp. 281-290, 2016.

Staheli, Mancuso, V., Harnasch, R., Fulcher, C., Chmielinski, M. Kearns, A., Kelly, S., Vuksani, E., Collaborative Data Analysis and Discovery for Cyber Security, 12th Symposium on Usable Privacy and Security (SOUPS 2016), 2016.

Staheli, D., Mancuso, V. F., Leahy, M. J., Kalke, M. M., Cloudbreak: Answering the Challenges of Cyber Command and Control, Lincoln Laboratory Journal, Volume 22, Number 1, 2016.
(Journal Article)

Whiting, M., Cook, K., Grinstein, G., Fallon, J., Liggett, K., Staheli, D. and Crouser, J., VAST Challenge 2015: Mayhem at Dinofun World, 2015 IEEE Conference on Visual Analytics Science and Technology (VAST), October 2015.
(Full Paper)

McKenna, S., Staheli, D., Meyer, M., Unlocking user-centered design methods for building cyber security visualizations, IEEE Symposium on Visualization for Cyber Security (VizSec), October 2015.
(Full Paper)

Staheli, D., Yu, T., Crouser, R. J., Damodaran, S., Nam, K., O'Gwynn, D., McKenna, S. and Harrison, L., Visualization evaluation for cyber security: trends and future directions, Proceedings of the Eleventh Workshop on Visualization for Cyber Security, ACM, November 2014, pp. 49–56.
Full Paper

Staheli, D., Brennen, A., Danico, D., Harnasch, R., Hunter, M., Larkin, R., Mineweaser, J., Nam, K., O'Gwynn, D., Phan, H., Schulz, A., Snyder, M. and Yu, T., A novel display for situational awareness at a network operations center, VAST Challenge Workshop, IEEE, 2013. 
Full Paper

Vuksani, E., Yu, T., Lippmann, R., Moore, T., Riordan, J., Device Dash: An Educational Computer Security Game, Symposium On Usability, Privacy, and Security, Newcastle, UK, July 2013.
(Abstract)

Vuksani, E., Moore, T., Yu, T., Lippmann, R., Device Dash: Designing, Implementing, and Evaluating an Educational Computer Security Game, Ruhlman Conference, Wellesley, MA, July 2013.
(Full Paper)

Hubbell, M., Kepner, J., Large Scale Network Situation Awareness Via 3D Gaming Technology, HPEC 2012 Conference, Waltham, MA, September 2012.
(Full Paper)

Chu, M., Ingols, K., Lippmann, R., Webster, S., Boyer, S., Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR, VizSec2010, Ottawa, Canada, 14 September 2010.
(Full Paper)

Yu, T., Lippmann, R., Riordan, J., Boyer, S., EMBER: A Global Perspective on Extreme Malicious Behavior, VizSec 2010, Ottawa, Canada, 14 September 2010.
(Full Paper)

Williams, L. C., Lippmann, R. P., Ingols, K. W., An Interactive Attack Graph Cascade and Reachability Display, VIZSEC 2007, Sacramento, CA. Oct. 29, 2007.
(Full Paper)

Yu, T. H., Rossey, L., Cunningham, R. K., Fuller, B. W., Integrated Environment Management for Information Operations Testbeds, VIZSEC 2007, Sacramento, CA. Oct. 29, 2007.
(Full Paper)

Cunningham, R. K., Lippmann, R. P., Webster, S. E., Detecting and Displaying Novel Computer Attacks with Macroscope, IEEE SMC Information Assurance and Security Workshop, West Point, New York, USA, June 5–7, 2000.
(Abstract)

top of page