Track 11 – Cyberspace Management

Chairs: Paul Phister, Bharat Doshi


[042] Applicability of Visual Analytics to Defence and Security Operations

Lavigne, Valérie - DRDC Valcartier
Gouin, Denis - DRDC Valcartier
paper | presentation


[083] Organized Cognition: Theoretical Framework for Future C2 Research and Implementation

Paytan, Ronnen - Philosophical Instruments
paper | presentation


[087] Vulnerability of C2 Networks to Attack: Measuring the Topology of Eleven Dutch Army C2 Systems

Grant, T.J. - Netherlands Defence Academy
Buizer, B.C. - Netherlands Defence Academy
Bertelink, R.J. - Netherlands Defence Academy
paper | presentation


[099] Cyber Security to the Edge: Applying Edge Theory to Cyber Security Operations

Simpson, Chris - SOLUTE Consulting
paper | presentation


[109] Analysis of a Cyber Defense Exercise Using Exploratory Sequential Data Analysis

Andersson, Dennis - Swedish Defense Research Agency
Granåsen, Magdalena - Swedish Defense Research Agency
Sundmark, Thomas - Swedish Defense Research Agency
Hallberg, Jonas - Swedish Defense Research Agency
Holm, Hannes - KTH Royal Institute of Technology
paper | presentation


[188] Ensuring Agile Power to the Edge Approach in Cyberspace

Yamaguchi, Hiroshi - Chuo University
Mori, Yuko - The Nagaokakyo Chamber Ensemble Kyoto
Ramamoorthy, Chitoor - University of California Berkeley
paper | presentation


[189] Coordinated Cybersecurity Incident Handling Roles, Processes, and Coordination Networks for Crosscutting Incidents

Osorno, Marcos - Johns Hopkins University Applied Physics Laboratory
Millar, Thomas - United States Department of Homeland Security
Rager, Danielle - Johns Hopkins University Applied Physics Laboratory
paper | presentation