default search action
Daniel M. Best
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2015
- [j3]Daniel M. Best, B. Ann Cox:
Clique: Situational Awareness through Behavior. IT Prof. 17(4): 66-68 (2015) - 2010
- [j2]Daniel M. Best, Robert R. Lewis:
GWVis: A tool for comparative ground-water data visualization. Comput. Geosci. 36(11): 1436-1442 (2010) - 2009
- [j1]William A. Pike, Joe Bruce, Bob Baddeley, Daniel M. Best, Lyndsey Franklin, Richard May, Douglas M. Rice, Rick Riensche, Katarina Younkin:
The Scalable Reasoning System: Lightweight visualization for distributed analytics. Inf. Vis. 8(1): 71-84 (2009)
Conference and Workshop Papers
- 2023
- [c10]Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff A. Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine:
Malicious Cyber Activity Detection using Zigzag Persistence. DSC 2023: 1-8 - 2016
- [c9]Dustin Arendt, Daniel M. Best, Russ Burtner, Celeste Lyn Paul:
CyberPetri at CDX 2016: Real-time network situation awareness. VizSEC 2016: 1-4 - 2015
- [c8]Christopher S. Oehmen, Thomas E. Carroll, Patrick C. Paulson, Daniel M. Best, Christine F. Noonan, Seth R. Thompson, Jeffrey L. Jensen, Glenn A. Fink, Elena S. Peterson:
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures. SafeConfig@CCS 2015: 55-58 - [c7]Dustin Lockhart Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko, Celeste Lyn Paul:
Ocelot: user-centered design of a decision support visualization for network quarantine. VizSEC 2015: 1-8 - 2014
- [c6]Daniel M. Best, Alex Endert, Daniel Kidwell:
7 key challenges for visualization in cyber network defense. VizSEC 2014: 33-40 - 2013
- [c5]Glenn A. Fink, Daniel M. Best, David O. Manz, Viatcheslav Popovsky, Barbara Endicott-Popovsky:
Gamification for Measuring Cyber Security Situational Awareness. HCI (24) 2013: 656-665 - 2011
- [c4]Daniel M. Best, Ryan P. Hafen, Bryan K. Olsen, William A. Pike:
Atypical behavior identification in large-scale network traffic. LDAV 2011: 15-22 - 2010
- [c3]Peter Hui, Joe Bruce, Glenn A. Fink, Michelle L. Gregory, Daniel M. Best, Liam McGrath, Alex Endert:
Towards efficient collaboration in cyber security. CTS 2010: 489-498 - [c2]Daniel M. Best, Shawn Bohn, Douglas Love, Adam Wynne, William A. Pike:
Real-time visualization of network behaviors for situational awareness. VizSEC 2010: 79-90 - 2008
- [c1]William A. Pike, Joe Bruce, Bob Baddeley, Daniel M. Best, Lyndsey Franklin, Richard May, Douglas M. Rice, Rick Riensche, Katarina Younkin:
The Scalable Reasoning System: Lightweight visualization for distributed analytics. IEEE VAST 2008: 131-138
Editorship
- 2018
- [e3]Diane Staheli, Celeste Lyn Paul, Jörn Kohlhammer, Daniel M. Best, Stoney Trent, Nicolas Prigent, Robert Gove, Graig Sauer:
15th IEEE Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018. IEEE 2018, ISBN 978-1-5386-8194-7 [contents] - 2016
- [e2]Daniel M. Best, Diane Staheli, Nicolas Prigent, Sophie Engle, Lane Harrison:
13th IEEE Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1605-1 [contents] - 2015
- [e1]Lane Harrison, Nicolas Prigent, Sophie Engle, Daniel M. Best:
12th IEEE Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7599-3 [contents]
Informal and Other Publications
- 2023
- [i3]Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff A. Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine:
Malicious Cyber Activity Detection Using Zigzag Persistence. CoRR abs/2309.08010 (2023) - [i2]Helen Jenne, Sinan G. Aksoy, Daniel M. Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff A. Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine:
Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs. CoRR abs/2311.16154 (2023) - [i1]Bill Kay, Sinan G. Aksoy, Molly Baird, Daniel M. Best, Helen Jenne, Cliff A. Joslyn, Christopher Potvin, Gregory Henselman-Petrusek, Garret Seppala, Stephen J. Young, Emilie Purvine:
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data. CoRR abs/2312.00023 (2023)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint