Daniel M. Best
Daniel M. Best
Operations Architect, Herjavec Group
Verified email at herjavecgroup.com
Title
Cited by
Cited by
Year
Storing and managing information artifacts collected by information analysts using a computing device
WA Pike, RM Riensche, DM Best, IE Roberts, MV Whyatt, ML Hart, ...
US Patent 8,271,461, 2012
1242012
Real-time visualization of network behaviors for situational awareness
DM Best, S Bohn, D Love, A Wynne, WA Pike
Proceedings of the seventh international symposium on visualization for …, 2010
532010
The scalable reasoning system: lightweight visualization for distributed analytics
W Pike, J Bruce, B Baddeley, D Best, L Franklin, R May, D Rice, ...
Information Visualization 8 (1), 71-84, 2009
412009
7 key challenges for visualization in cyber network defense
DM Best, A Endert, D Kidwell
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 33-40, 2014
382014
Ocelot: user-centered design of a decision support visualization for network quarantine
DL Arendt, R Burtner, DM Best, ND Bos, JR Gersh, CD Piatko, CL Paul
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2015
372015
Gamification for measuring cyber security situational awareness
G Fink, D Best, D Manz, V Popovsky, B Endicott-Popovsky
International Conference on Augmented Cognition, 656-665, 2013
252013
Web-based visual analytics for social media
DM Best, JR Bruce, ST Dowson, OJ Love, LR McGrath
Pacific Northwest National Lab.(PNNL), Richland, WA (United States), 2012
172012
CyberPetri at CDX 2016: Real-time network situation awareness
D Arendt, D Best, R Burtner, CL Paul
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
142016
GWVis: A tool for comparative ground-water data visualization
DM Best, RR Lewis
Computers & geosciences 36 (11), 1436-1442, 2010
142010
Towards efficient collaboration in cyber security
P Hui, J Bruce, G Fink, M Gregory, D Best, L McGrath, A Endert
2010 International Symposium on Collaborative Technologies and Systems, 489-498, 2010
132010
Atypical behavior identification in large-scale network traffic
DM Best, RP Hafen, BK Olsen, WA Pike
2011 IEEE Symposium on Large Data Analysis and Visualization, 15-22, 2011
122011
Advancing cybersecurity education: pink elephant unicorn
A Pattanayak, DM Best, D Sanner, J Smith
Proceedings of the Fifth Cybersecurity Symposium, 1-7, 2018
42018
Improved cyber threat indicator sharing by scoring privacy risk
DM Best, J Bhatia, ES Peterson, TD Breaux
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
22017
Clique: Situational Awareness through Behavior
DM Best, BA Cox
IT Professional 17 (4), 66-68, 2015
22015
Visual analytics for law enforcement: deploying a service-oriented analytic framework for web-based visualization
ST Dowson, J Bruce, DM Best, RM Riensche, L Franklin, WA Pike
Visual Analytics for Homeland Defense and Security 7346, 734603, 2009
22009
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures
CS Oehmen, TE Carroll, PC Paulson, DM Best, CF Noonan, ...
Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015
12015
Visual Text Analytics for Impromptu Analysts
OJ Love, DM Best, JR Bruce, ST Dowson, CS Larmey
IEEE Workshop on Interactive Visual Text Analytics for Decision Making …, 2011
12011
From desktop to field: Deploying visual incident analysis for law enforcement
B Baddeley, K Younkin, R Riensche, D Best, WA Pike, R May
2008 IEEE Conference on Technologies for Homeland Security, 209-214, 2008
12008
VizSec 2015
L Harrison, N Prigent, S Engle, D Best
2015
SIGNATURES OF ILLICIT NUCLEAR PROCUREMENT NETWORKS: AN OVERVIEW OF PRELIMINARY APPROACHES AND RESULTS
JB Webster, LE Erikson, ZN Gastelum, VA Lewis, DM Best, EA Hogan, ...
Pacific Northwest National Lab.(PNNL), Richland, WA (United States), 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20