2019
DOI: 10.1016/j.ifacol.2019.12.093
|View full text |Cite
|
Sign up to set email alerts
|

VR/MR Supporting the Future of Defensive Cyber Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 2 publications
0
10
0
1
Order By: Relevance
“…If this allows CTS information to be encoded more efficiently (e.g., Legge et al, 2012;Wagner et al, 2021), it may also allow for more working memory capacity to be allocated to sharing knowledge about the course and impact of current and future events. Reducing the load on working memory may in turn support establishing shared SA level 3 (Gutzwiller and Clegg, 2013) for decision-making in CTSs (Kullman et al, 2019a).…”
Section: Modified From Lankton (mentioning
confidence: 99%
See 1 more Smart Citation
“…If this allows CTS information to be encoded more efficiently (e.g., Legge et al, 2012;Wagner et al, 2021), it may also allow for more working memory capacity to be allocated to sharing knowledge about the course and impact of current and future events. Reducing the load on working memory may in turn support establishing shared SA level 3 (Gutzwiller and Clegg, 2013) for decision-making in CTSs (Kullman et al, 2019a).…”
Section: Modified From Lankton (mentioning
confidence: 99%
“…Typical representations of network topology are in two dimensions (2D), which loses temporal and spatial relationships between nodes in the network, in addition to not scaling well with increased (but often necessary) complexity. Virtual Reality (VR) and Mixed Reality (MR) tools that are able to visualize CSA-relevant information such as network topology as 3D objects in space and time, may aid in the development of shared mental models for efficient RCP communication between technical and non-technical personnel (Kullman et al, 2018(Kullman et al, , 2019a(Kullman et al, ,b, 2020. For instance, SA level 3 is the most vital stage for decision-making and appears to FIGURE Situational Awareness model with suggested requirements for achieving Cyber Situational Awareness.…”
Section: Introductionmentioning
confidence: 99%
“…Kullman ve arkadaşları, ABD savunma bakanlığı ve ordusuna bağlı ağları düşmanca siber aktivitelere karşı koruyan ve siber operasyon işlemleri için yeni teknolojiler geliştiren ABD Ordusu Center C5ISR Siber Güvenlik Hizmet Sağlayıcısı (CSSP) bünyesinde çalışan siber güvenlik uzmanlarının iş akışının hızını ve verimliliğini arttırmak adına siber güvenlik veri kümelerini kullanan sanal ve karma gerçeklik temelli bir 3B veri görüntüleme içeriği geliştirmiştir [20].…”
Section: Literatür çAlışmasıunclassified
“…Assumption 2: It is possible to create data-shapes by interviewing SMEs in order to identify hierarchies of entities and entity 5 groups in their data that, when grouped by their functions, could be arranged into a 3D topology.…”
Section: Assumptionsmentioning
confidence: 99%
“…As noted in [2], cybersecurity-specific visualizations can be broadly classified into a) network analysis, b) malware analysis, c) threat analysis and situational awareness. Timely and efficient execution of tasks in each of these categories may require different types of visualizations addressed by a growing number of cybersecurity-specific visualization tools (for examples and descriptions of such see [3], [5] and [6]) as well as universal software with visualization capabilities. These tools could be used to visualize data in myriad ways (for examples and descriptions of such see [7]) so that SMEs could explore their data visually and interactively (for interaction techniques see [8]).…”
Section: Introductionmentioning
confidence: 99%