2008 IEEE International Conference on Intelligence and Security Informatics 2008
DOI: 10.1109/isi.2008.4565048
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion activity projection for cyber situational awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…A review of the extant literature on situation awareness in CDA reveals that though cyber defence scholars have relied on the cognitive perspective as a basis for their research almost exclusively, the research is, in practice employing the technological perspective of SA (Mathew, Shah, & Upadhyaya, 2005;Okolica, McDonald, Peterson, Mills, & Haas, 2009;Yang, S. J., Byers, Holsopple, Argauer, & Fava, 2008;Yen et al, 2010). The notable exception is Tadda and Salerno's (2010) Situation Awareness Reference Model.…”
Section: Cyber Defence Analysis and Cyber-samentioning
confidence: 99%
“…A review of the extant literature on situation awareness in CDA reveals that though cyber defence scholars have relied on the cognitive perspective as a basis for their research almost exclusively, the research is, in practice employing the technological perspective of SA (Mathew, Shah, & Upadhyaya, 2005;Okolica, McDonald, Peterson, Mills, & Haas, 2009;Yang, S. J., Byers, Holsopple, Argauer, & Fava, 2008;Yen et al, 2010). The notable exception is Tadda and Salerno's (2010) Situation Awareness Reference Model.…”
Section: Cyber Defence Analysis and Cyber-samentioning
confidence: 99%
“…What cyber-SA is exactly, however, remains unclear. Some scholars have argued that cyber-SA is a unique form of situation awareness because of the unique characteristics of the operating environment: a rapid rate of environmental change, an overwhelming volume of information, and the lack of physical world constraints 34,35 . Others have described cyber-SA in terms of what the human operator should be aware of.…”
Section: Cyber Situation Awareness (Cyber-sa)mentioning
confidence: 99%
“…Belief combination schemes can be employed to assist in fusing SME opinions. In addition, intent may be estimated in its worst-case sense [19]. Specifically, if little or no prior knowledge is known about the specific adversary, e.g., insurgents in unknown territory or random hackers from the Internet, one might assume the intended targets to be the most critical asset or information with respect to one or more missions.…”
Section: Intent/goalsmentioning
confidence: 99%