In 2010, IT-security experts from northern European governments and organizations gathered to conduct the first of a series of NATO-led cyber-defense exercises in a pilot attempt of training cyber defense. To gain knowledge on how to assess team effectiveness in cyber-defense exercises, this case study investigates the role of behavioral assessment techniques as a complement to task-based performance measurement. The collected data resulted in a massive data set including system logs, observer reports, and surveys. Six different methods were compared for feasibility in assessing the teams’ performance, including automated availability check, exploratory sequential data analysis, and network intrusion detection system attack analysis. In add...
Background. Despite the increasing pervasiveness of digital entertainment and serious games in organ...
Following earlier research in demonstrating the significance of behavioral analysis in cyber defense...
Part 3: Teaching Methods and ToolsInternational audienceAs technology proliferates and becomes indis...
In 2010, IT-security experts from northern European governments and organizations gathered to conduc...
NATO Advanced Research Workshop (ARW) on A Framework for a Military Cyber Defence Strategy -- APR 11...
Raising awareness of the organization’s employees comes down to cyber exercise. They can target both...
Cyber security exercises allow individuals and organisations to train and test their skills in compl...
The annual cyber defense exercise Locked Shields is the world’s largest unclassified defensive exerc...
AbstractCyber security is a pervasive issue that impacts public and private organizations. While sev...
As the military has moved increasingly towards distributed networked environments for Command and Co...
A critical requirement for developing a cyber capable workforce is to understand how to challenge, a...
This paper proposes a novel approach for the evaluation of the performance achieved by trainees invo...
In recent years, cyber security exercises have established themselves as an integral part of cyber s...
A critical requirement for developing a cyber capable workforce is to understand how to challenge, a...
There is not much research on team collaboration in digital entertainment games, nor is there much e...
Background. Despite the increasing pervasiveness of digital entertainment and serious games in organ...
Following earlier research in demonstrating the significance of behavioral analysis in cyber defense...
Part 3: Teaching Methods and ToolsInternational audienceAs technology proliferates and becomes indis...
In 2010, IT-security experts from northern European governments and organizations gathered to conduc...
NATO Advanced Research Workshop (ARW) on A Framework for a Military Cyber Defence Strategy -- APR 11...
Raising awareness of the organization’s employees comes down to cyber exercise. They can target both...
Cyber security exercises allow individuals and organisations to train and test their skills in compl...
The annual cyber defense exercise Locked Shields is the world’s largest unclassified defensive exerc...
AbstractCyber security is a pervasive issue that impacts public and private organizations. While sev...
As the military has moved increasingly towards distributed networked environments for Command and Co...
A critical requirement for developing a cyber capable workforce is to understand how to challenge, a...
This paper proposes a novel approach for the evaluation of the performance achieved by trainees invo...
In recent years, cyber security exercises have established themselves as an integral part of cyber s...
A critical requirement for developing a cyber capable workforce is to understand how to challenge, a...
There is not much research on team collaboration in digital entertainment games, nor is there much e...
Background. Despite the increasing pervasiveness of digital entertainment and serious games in organ...
Following earlier research in demonstrating the significance of behavioral analysis in cyber defense...
Part 3: Teaching Methods and ToolsInternational audienceAs technology proliferates and becomes indis...