32,280 research outputs found

    Cognitive Engineering Research Methodology: A Proposed Study of Visualization Analysis Techniques

    Get PDF
    The rapid development of new sensors and wide-band communications provides the capability to collect enormous amounts of data. An increasing challenge involves how to understand and interpret the data to yield knowledge about evolving situations or threats (e.g., of military situations, state of complex systems, etc.). New visualization tools and techniques are becoming available to support advanced visualization including three-dimensional, full immersion display environments and tools to support novel visualizations. Examples include network system display tools and evolving multi-sensory situation environments. Despite the emergence of such tools, there has been limited systematic test and evaluations to determine the efficacy of such tools for knowledge understanding and decision making. This paper provides an overview of this problem and argues for the need to conduct controlled experiments. A sample experiment is suggested

    Overview of contextual tracking approaches in information fusion

    Get PDF
    Proceedings of: Geospatial InfoFusion III. 2-3 May 2013 Baltimore, Maryland, United States.Many information fusion solutions work well in the intended scenarios; but the applications, supporting data, and capabilities change over varying contexts. One example is weather data for electro-optical target trackers of which standards have evolved over decades. The operating conditions of: technology changes, sensor/target variations, and the contextual environment can inhibit performance if not included in the initial systems design. In this paper, we seek to define and categorize different types of contextual information. We describe five contextual information categories that support target tracking: (1) domain knowledge from a user to aid the information fusion process through selection, cueing, and analysis, (2) environment-to-hardware processing for sensor management, (3) known distribution of entities for situation/threat assessment, (4) historical traffic behavior for situation awareness patterns of life (POL), and (5) road information for target tracking and identification. Appropriate characterization and representation of contextual information is needed for future high-level information fusion systems design to take advantage of the large data content available for a priori knowledge target tracking algorithm construction, implementation, and application.Publicad

    Fusing drug enforcement: a study of the El Paso Intelligence Center

    Get PDF
    This article examines the evolution of the El Paso Intelligence Center (EPIC), a key intelligence component of the Drug Enforcement Administration, to shed light on fusion efforts in drug enforcement. Since 1974, EPIC has strived to fuse the resources and capabilities of multiple government agencies to counter drug trafficking and related threats along the Southwest US border. While undergoing a steady growth, the Center has confronted a host of challenges that illuminate the uses and limits of multi-agency endeavors in drug enforcement. An evaluative study of the Center shows that it is well aligned with the federal government priorities in the realm of drug enforcement; however the extent to which the Center’s activities support the government’s efforts in this domain is not so clear. The Center needs to improve the way it reviews its own performance to better adapt and serve its customers

    Adding Contextual Information to Intrusion Detection Systems Using Fuzzy Cognitive Maps

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.In the last few years there has been considerable increase in the efficiency of Intrusion Detection Systems (IDSs). However, networks are still the victim of attacks. As the complexity of these attacks keeps increasing, new and more robust detection mechanisms need to be developed. The next generation of IDSs should be designed incorporating reasoning engines supported by contextual information about the network, cognitive information and situational awareness to improve their detection results. In this paper, we propose the use of a Fuzzy Cognitive Map (FCM) in conjunction with an IDS to incorporate contextual information into the detection process. We have evaluated the use of FCMs to adjust the Basic Probability Assignment (BPA) values defined prior to the data fusion process, which is crucial for the IDS that we have developed. The experimental results that we present verify that FCMs can improve the efficiency of our IDS by reducing the number of false alarms, while not affecting the number of correct detections

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем
    corecore