• Publications
  • Influence
Songs of cyberspace: an update on sonifications of network traffic to support situational awareness
TLDR
We extend sonification techniques to common network security data to create a sound model capable of enough nuance that there is the possibility of unexpected patterns becoming apparent to a seasoned listener. Expand
  • 35
  • 5
  • PDF
Application of the JDL data fusion process model for cyber security
  • N. Giacobe
  • Computer Science, Engineering
  • Defense + Commercial Sensing
  • 23 April 2010
TLDR
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. Expand
  • 40
  • 4
  • PDF
Reflecting on the DARPA Red Balloon Challenge
TLDR
Finding 10 balloons across the U.S. illustrates how the Internet has changed the way we solve highly distributed problems. Expand
  • 119
  • 3
  • PDF
The distributed nature of cyber situation awareness
TLDR
We present here preliminary findings from our ongoing study of situation awareness in cybersecurity (cyber-SA). Expand
  • 23
  • 2
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model
TLDR
In both military operations and the commercial world, cyber situation awareness (SA) is a key element of mission assurance. Expand
  • 10
  • 2
  • PDF
Information data fusion and computer network defense
TLDR
This chapter provides an introduction to traditional data fusion models and adapts them to the domain of cyber security. Expand
  • 12
  • 1
A Picture is Worth a Thousand Alerts
TLDR
Situation awareness (SA) in cyber-security is difficult to measure, yet new tools from research and industry promise improved cyber SA. Expand
  • 13
  • 1
Cyber situation awareness as distributed socio-cognitive work
TLDR
A key challenge for human cybersecurity operators is to develop an understanding of what is happening within, and to, their network. Expand
  • 14
Geovisual analytics for cyber security: Adopting the GeoViz Toolkit
  • N. Giacobe, S. Xu
  • Computer Science
  • IEEE Conference on Visual Analytics Science and…
  • 15 December 2011
TLDR
For the VAST 2011 Network Security Mini-Challenge, we adopted geovisual analytic methods and applied them in the field of network security. Expand
  • 18
...
1
2
3
...