This paper describes the development of a visualization system used by students participating in a collegiate cyber defense competition and a first-pass exploratory analysis of the system. Feedback was gathered from first-time users of the system through open-ended field interviews. This initial contextual analysis examined user attitudes about appropriating a new technology in their overall competition strategy. While challenges in the data display and user interface were reported, the interviewees reported that the team and network views offered by the new visualization system enabled them to improve their performance during the competition activities
Security visualization utilises predefined data attributes and translates them into visual nodes to ...
In order to measure the accurate outcome of different visualization mechanism it is imperative to ad...
Cyber-security visualization aims to reduce security analysts� workload by presenting information ...
Cyber defense competitions (CDCs) simulate a real-world environment, where the competitors must prot...
The objective of this article is to encourage schools to participate in the Collegiate Cyber Defense...
This Innovative Practice Full Paper addresses modern cyber ranges which represent unified platforms ...
The Visualization for Cyber Security research community (VizSec) addresses longstanding challenges i...
Capture the Flag games represent a popular method of cybersecurity training. Providing meaningful in...
Collegiate Cyber Defense Competitions have recently grown in popularity as a means of providing real...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.A cyber defense co...
The area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of...
This work describes an Ecological Interface Design (EID) comparison of five displays (Alphanumeric, ...
Cyber-security visualization is an up-and-coming area which aims to reduce security analysts’ worklo...
To answer the question of whether creating a competitive environment drives students’ engagement whi...
This paper describes the effort involve in executing cyber defense exercise while focusing on the wh...
Security visualization utilises predefined data attributes and translates them into visual nodes to ...
In order to measure the accurate outcome of different visualization mechanism it is imperative to ad...
Cyber-security visualization aims to reduce security analysts� workload by presenting information ...
Cyber defense competitions (CDCs) simulate a real-world environment, where the competitors must prot...
The objective of this article is to encourage schools to participate in the Collegiate Cyber Defense...
This Innovative Practice Full Paper addresses modern cyber ranges which represent unified platforms ...
The Visualization for Cyber Security research community (VizSec) addresses longstanding challenges i...
Capture the Flag games represent a popular method of cybersecurity training. Providing meaningful in...
Collegiate Cyber Defense Competitions have recently grown in popularity as a means of providing real...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.A cyber defense co...
The area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of...
This work describes an Ecological Interface Design (EID) comparison of five displays (Alphanumeric, ...
Cyber-security visualization is an up-and-coming area which aims to reduce security analysts’ worklo...
To answer the question of whether creating a competitive environment drives students’ engagement whi...
This paper describes the effort involve in executing cyber defense exercise while focusing on the wh...
Security visualization utilises predefined data attributes and translates them into visual nodes to ...
In order to measure the accurate outcome of different visualization mechanism it is imperative to ad...
Cyber-security visualization aims to reduce security analysts� workload by presenting information ...