Storing and managing information artifacts collected by information analysts using a computing device WA Pike, RM Riensche, DM Best, IE Roberts, MV Whyatt, ML Hart, ... US Patent 8,271,461, 2012 | 168 | 2012 |
Real-time visualization of network behaviors for situational awareness DM Best, S Bohn, D Love, A Wynne, WA Pike Proceedings of the seventh international symposium on visualization for …, 2010 | 75 | 2010 |
Ocelot: user-centered design of a decision support visualization for network quarantine DL Arendt, R Burtner, DM Best, ND Bos, JR Gersh, CD Piatko, CL Paul 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2015 | 74 | 2015 |
7 key challenges for visualization in cyber network defense DM Best, A Endert, D Kidwell Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 33-40, 2014 | 51 | 2014 |
The scalable reasoning system: lightweight visualization for distributed analytics W Pike, J Bruce, B Baddeley, D Best, L Franklin, R May, D Rice, ... Information Visualization 8 (1), 71-84, 2009 | 49 | 2009 |
Gamification for measuring cyber security situational awareness G Fink, D Best, D Manz, V Popovsky, B Endicott-Popovsky Foundations of Augmented Cognition: 7th International Conference, AC 2013 …, 2013 | 44 | 2013 |
CyberPetri at CDX 2016: Real-time network situation awareness D Arendt, D Best, R Burtner, CL Paul 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016 | 33 | 2016 |
Towards efficient collaboration in cyber security P Hui, J Bruce, G Fink, M Gregory, D Best, L McGrath, A Endert 2010 International Symposium on Collaborative Technologies and Systems, 489-498, 2010 | 23 | 2010 |
Web-based visual analytics for social media D Best, J Bruce, S Dowson, O Love, L McGrath Proceedings of the International AAAI Conference on Web and Social Media 6 …, 2012 | 21 | 2012 |
Advancing cybersecurity education: pink elephant unicorn A Pattanayak, DM Best, D Sanner, J Smith Proceedings of the Fifth Cybersecurity Symposium, 1-7, 2018 | 14 | 2018 |
Atypical behavior identification in large-scale network traffic DM Best, RP Hafen, BK Olsen, WA Pike 2011 IEEE Symposium on Large Data Analysis and Visualization, 15-22, 2011 | 13 | 2011 |
GWVis: A tool for comparative ground-water data visualization DM Best, RR Lewis Computers & geosciences 36 (11), 1436-1442, 2010 | 13 | 2010 |
Improved cyber threat indicator sharing by scoring privacy risk DM Best, J Bhatia, ES Peterson, TD Breaux 2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017 | 12 | 2017 |
Clique: Situational Awareness through Behavior DM Best, BA Cox IT Professional 17 (4), 66-68, 2015 | 3 | 2015 |
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data B Kay, SG Aksoy, M Baird, DM Best, H Jenne, C Joslyn, C Potvin, ... arXiv preprint arXiv:2312.00023, 2023 | 2 | 2023 |
Stepping Out of Flatland: Discovering behavior patterns as topological structures in Cyber hypergraphs H Jenne, SG Aksoy, D Best, A Bittner, G Henselman-Petrusek, C Joslyn, ... arXiv preprint arXiv:2311.16154, 2023 | 2 | 2023 |
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures CS Oehmen, TE Carroll, PC Paulson, DM Best, CF Noonan, ... Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015 | 2 | 2015 |
From desktop to field: Deploying visual incident analysis for law enforcement B Baddeley, K Younkin, R Riensche, D Best, WA Pike, R May 2008 IEEE Conference on Technologies for Homeland Security, 209-214, 2008 | 2 | 2008 |
Malicious Cyber Activity Detection using Zigzag Persistence A Myers, A Bittner, S Aksoy, D Best, G Henselman-Petrusek, H Jenne, ... 2023 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2023 | 1 | 2023 |
Visual Text Analytics for Impromptu Analysts OJ Love, DM Best, JR Bruce, ST Dowson, CS Larmey IEEE Workshop on Interactive Visual Text Analytics for Decision Making …, 2011 | 1 | 2011 |