2021
DOI: 10.1109/tvcg.2020.2977336
|View full text |Cite
|
Sign up to set email alerts
|

Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training

Abstract: Hands-on training is an effective way to practice theoretical cybersecurity concepts and increase participants' skills. In this paper, we discuss the application of visual analytics principles to the design, execution, and evaluation of training sessions. We propose a conceptual model employing visual analytics that supports the sensemaking activities of users involved in various phases of the training life cycle. The model emerged from our long-term experience in designing and organizing diverse hands-on cybe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…The role of the instructors who use these platforms shifts from being an active intermediary between learning content and students to a facilitator of learning who employs the platform and its features. Once a training starts, the instructors monitor students' progress using the insights automatically provided by the platform, such as those presented in [33]. The insights are generated using the methods of learning analytics [34] and educational data mining [35], which leverage data from educational contexts to understand and improve teaching and learning [36], [37].…”
Section: B Environments For Learning Cybersecurity Skillsmentioning
confidence: 99%
“…The role of the instructors who use these platforms shifts from being an active intermediary between learning content and students to a facilitator of learning who employs the platform and its features. Once a training starts, the instructors monitor students' progress using the insights automatically provided by the platform, such as those presented in [33]. The insights are generated using the methods of learning analytics [34] and educational data mining [35], which leverage data from educational contexts to understand and improve teaching and learning [36], [37].…”
Section: B Environments For Learning Cybersecurity Skillsmentioning
confidence: 99%
“…2 College of Electrical and control engineering, Shenyang Jianzhu University, Shenyang 110168, China. 3 College of Electrical and control engineering, Shenyang Jianzhu University, Shenyang 110168, China. 4 Software College, Shenyang Normal University, Shenyang 110168, China.…”
Section: Declarationsmentioning
confidence: 99%
“…Therefore, how to evacuate the trapped people safely and rapidly has become the focus of many scholars' research. Earlier, the modeling of large building fire environment mainly includes raster method [1], topological method [2], and visual map method [3]. The topological method can reduce the search space, but there are many limitations such as complex grid establishment and difficult to maintain; the visual map method can simplify the map by removing unnecessary connecting lines, but the search speed is slow and the environment is poorly adapted when there are many obstacles; and the raster method can rasterize irregular obstacles, and at the same time, it is easy to build and save, so it is more commonly used.…”
Section: Introductionmentioning
confidence: 99%
“…The learning environment has to collect and evaluate the data to be able to perform the task adaptivity. Furthermore, it is recommended to store the training data in a suitable format and visualize them using visual analytics [19]. Next, it can be useful for further development of adaptive learning techniques or for other research directions.…”
Section: E Data Gathering and Evaluationmentioning
confidence: 99%