Track 11 – Cyberspace Management
Chairs: Paul Phister, Bharat Doshi
[042] Applicability of Visual Analytics to Defence and Security Operations
Lavigne, Valérie - DRDC Valcartier
Gouin, Denis - DRDC Valcartier
paper |
presentation
[083] Organized Cognition: Theoretical Framework for Future C2 Research and Implementation
Paytan, Ronnen - Philosophical Instruments
paper |
presentation
[087] Vulnerability of C2 Networks to Attack: Measuring the Topology of Eleven Dutch Army C2 Systems
Grant, T.J. - Netherlands Defence Academy
Buizer, B.C. - Netherlands Defence Academy
Bertelink, R.J. - Netherlands Defence Academy
paper |
presentation
[099] Cyber Security to the Edge: Applying Edge Theory to Cyber Security Operations
Simpson, Chris - SOLUTE Consulting
paper |
presentation
[109] Analysis of a Cyber Defense Exercise Using Exploratory Sequential Data Analysis
Andersson, Dennis - Swedish Defense Research Agency
Granåsen, Magdalena - Swedish Defense Research Agency
Sundmark, Thomas - Swedish Defense Research Agency
Hallberg, Jonas - Swedish Defense Research Agency
Holm, Hannes - KTH Royal Institute of Technology
paper |
presentation
[188] Ensuring Agile Power to the Edge Approach in Cyberspace
Yamaguchi, Hiroshi - Chuo University
Mori, Yuko - The Nagaokakyo Chamber Ensemble Kyoto
Ramamoorthy, Chitoor - University of California Berkeley
paper |
presentation
[189] Coordinated Cybersecurity Incident Handling Roles, Processes, and Coordination Networks for Crosscutting Incidents
Osorno, Marcos - Johns Hopkins University Applied Physics Laboratory
Millar, Thomas - United States Department of Homeland Security
Rager, Danielle - Johns Hopkins University Applied Physics Laboratory
paper |
presentation