Follow
Daniel M. Best
Daniel M. Best
Sr. Cyber Security Researcher, PNNL
Verified email at pnnl.gov
Title
Cited by
Cited by
Year
Storing and managing information artifacts collected by information analysts using a computing device
WA Pike, RM Riensche, DM Best, IE Roberts, MV Whyatt, ML Hart, ...
US Patent 8,271,461, 2012
1572012
Real-time visualization of network behaviors for situational awareness
DM Best, S Bohn, D Love, A Wynne, WA Pike
Proceedings of the seventh international symposium on visualization for …, 2010
692010
Ocelot: user-centered design of a decision support visualization for network quarantine
DL Arendt, R Burtner, DM Best, ND Bos, JR Gersh, CD Piatko, CL Paul
2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-8, 2015
532015
The scalable reasoning system: lightweight visualization for distributed analytics
W Pike, J Bruce, B Baddeley, D Best, L Franklin, R May, D Rice, ...
Information Visualization 8 (1), 71-84, 2009
502009
7 key challenges for visualization in cyber network defense
DM Best, A Endert, D Kidwell
Proceedings of the Eleventh Workshop on Visualization for Cyber Security, 33-40, 2014
452014
Gamification for measuring cyber security situational awareness
G Fink, D Best, D Manz, V Popovsky, B Endicott-Popovsky
International Conference on Augmented Cognition, 656-665, 2013
312013
CyberPetri at CDX 2016: Real-time network situation awareness
D Arendt, D Best, R Burtner, CL Paul
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
232016
Web-based visual analytics for social media
D Best, J Bruce, S Dowson, O Love, L McGrath
Proceedings of the International AAAI Conference on Web and Social Media 6 …, 2012
192012
Towards efficient collaboration in cyber security
P Hui, J Bruce, G Fink, M Gregory, D Best, L McGrath, A Endert
2010 International Symposium on Collaborative Technologies and Systems, 489-498, 2010
152010
Atypical behavior identification in large-scale network traffic
DM Best, RP Hafen, BK Olsen, WA Pike
2011 IEEE Symposium on Large Data Analysis and Visualization, 15-22, 2011
122011
GWVis: A tool for comparative ground-water data visualization
DM Best, RR Lewis
Computers & geosciences 36 (11), 1436-1442, 2010
122010
Advancing cybersecurity education: pink elephant unicorn
A Pattanayak, DM Best, D Sanner, J Smith
Proceedings of the Fifth Cybersecurity Symposium, 1-7, 2018
102018
Improved cyber threat indicator sharing by scoring privacy risk
DM Best, J Bhatia, ES Peterson, TD Breaux
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
62017
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures
CS Oehmen, TE Carroll, PC Paulson, DM Best, CF Noonan, ...
Proceedings of the 2015 Workshop on Automated Decision Making for Active …, 2015
22015
Clique: Situational Awareness through Behavior
DM Best, BA Cox
IT Professional 17 (4), 66-68, 2015
22015
Visual Text Analytics for Impromptu Analysts
OJ Love, DM Best, JR Bruce, ST Dowson, CS Larmey
IEEE Workshop on Interactive Visual Text Analytics for Decision Making …, 2011
12011
Visual analytics for law enforcement: deploying a service-oriented analytic framework for web-based visualization
ST Dowson, J Bruce, DM Best, RM Riensche, L Franklin, WA Pike
Visual Analytics for Homeland Defense and Security 7346, 19-28, 2009
12009
From desktop to field: Deploying visual incident analysis for law enforcement
B Baddeley, K Younkin, R Riensche, D Best, WA Pike, R May
2008 IEEE Conference on Technologies for Homeland Security, 209-214, 2008
12008
VizSec 2015
L Harrison, N Prigent, S Engle, D Best
2015
SIGNATURES OF ILLICIT NUCLEAR PROCUREMENT NETWORKS: AN OVERVIEW OF PRELIMINARY APPROACHES AND RESULTS
JB Webster, LE Erikson, ZN Gastelum, VA Lewis, DM Best, EA Hogan, ...
Pacific Northwest National Lab.(PNNL), Richland, WA (United States), 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20