{"id":"https://openalex.org/W2084847608","doi":"https://doi.org/10.1109/isi.2013.6578844","title":"Capturing human cognition in cyber-security simulations with NETS","display_name":"Capturing human cognition in cyber-security simulations with NETS","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2084847608","doi":"https://doi.org/10.1109/isi.2013.6578844","mag":"2084847608"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2013.6578844","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063149378","display_name":"Nicklaus A. Giacobe","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nicklaus A. Giacobe","raw_affiliation_strings":["Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109886607","display_name":"Michael D. McNeese","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael D. McNeese","raw_affiliation_strings":["Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059633756","display_name":"Vincent Mancuso","orcid":null},"institutions":[{"id":"https://openalex.org/I4389425366","display_name":"Oak Ridge Institute for Science and Education","ror":"https://ror.org/040vxhp34","country_code":null,"type":"education","lineage":["https://openalex.org/I1281378812","https://openalex.org/I1330989302","https://openalex.org/I4389425366"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vincent F. Mancuso","raw_affiliation_strings":["Oakridge Institute for Science and Education, Dayton, OH, USA","Oakridge Inst. for Sci. & Educ., Dayton, OH, USA"],"affiliations":[{"raw_affiliation_string":"Oakridge Institute for Science and Education, Dayton, OH, USA","institution_ids":["https://openalex.org/I4389425366"]},{"raw_affiliation_string":"Oakridge Inst. for Sci. & Educ., Dayton, OH, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061706344","display_name":"Dev Minotra","orcid":"https://orcid.org/0000-0001-5979-9919"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dev Minotra","raw_affiliation_strings":["University of Maryland, College Park, MD, USA","Univ. of Maryland, College Park, MD, , USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Univ. of Maryland, College Park, MD, , USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063149378"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.3799,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71568505,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":null,"first_page":"284","last_page":"288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10970","display_name":"Team Dynamics and Performance","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10470","display_name":"Usability and User Interface Design","score":0.9470000267028809,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/automatic-summarization","display_name":"Automatic summarization","score":0.7808221578598022},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7539184093475342},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.708334743976593},{"id":"https://openalex.org/keywords/salient","display_name":"Salient","score":0.6240749359130859},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6107901930809021},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5689229369163513},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5257890224456787},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.475668340921402},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.46700748801231384},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3527252674102783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29312384128570557},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2896936535835266},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.09391620755195618}],"concepts":[{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.7808221578598022},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7539184093475342},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.708334743976593},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.6240749359130859},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6107901930809021},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5689229369163513},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5257890224456787},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.475668340921402},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.46700748801231384},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3527252674102783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29312384128570557},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2896936535835266},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.09391620755195618},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2013.6578844","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W17263963","https://openalex.org/W2012811511","https://openalex.org/W2027200232","https://openalex.org/W2033564640","https://openalex.org/W2069790543","https://openalex.org/W2074122521","https://openalex.org/W2085587942","https://openalex.org/W2094938541","https://openalex.org/W2095735567","https://openalex.org/W2110017066","https://openalex.org/W2142226691","https://openalex.org/W2157289187","https://openalex.org/W2293722376","https://openalex.org/W2462620944","https://openalex.org/W2464642572","https://openalex.org/W6600683545","https://openalex.org/W6718650165","https://openalex.org/W6719296585"],"related_works":["https://openalex.org/W3174620462","https://openalex.org/W4206710999","https://openalex.org/W1256197635","https://openalex.org/W2956101281","https://openalex.org/W3141845067","https://openalex.org/W1980865205","https://openalex.org/W2156732889","https://openalex.org/W3025387836","https://openalex.org/W2178117069","https://openalex.org/W1577090759"],"abstract_inverted_index":{"As":[0],"new":[1],"technologies":[2],"are":[3,40,73,79],"employed":[4],"to":[5,43,57,82,122],"improve":[6,15,17,24],"cyber-security,":[7],"designers":[8],"often":[9,41],"make":[10],"claims":[11,32],"that":[12,90,116],"their":[13],"interfaces":[14],"usability,":[16],"situation":[18],"awareness,":[19],"reduce":[20],"cognitive":[21,38,88],"load,":[22],"or":[23],"team":[25],"cognition.":[26],"However,":[27],"the":[28,53,66,70,76,86,104],"assessment":[29],"of":[30,69,96,113],"these":[31,36],"is":[33],"complex":[34],"because":[35],"higher":[37],"functions":[39],"difficult":[42],"measure.":[44],"This":[45,107],"paper":[46,108],"outlines":[47],"a":[48,84,94,111,135],"three":[49,77,100],"human-subjects":[50],"experiments,":[51],"using":[52],"NETS":[54,71],"simulation":[55],"engine,":[56],"explore":[58],"human":[59,126],"cognition":[60,127],"in":[61,125,134],"simulated":[62],"cyber-security":[63,136],"environments.":[64],"First,":[65],"salient":[67],"features":[68],"simulator":[72],"described.":[74],"Second,":[75],"experiments":[78,101],"each":[80],"outlined":[81],"include":[83],"description":[85],"individual":[87],"measurements":[89],"were":[91],"assessed.":[92],"Next,":[93],"summarization":[95],"results":[97],"from":[98],"all":[99],"will":[102],"compare":[103],"important":[105],"findings.":[106],"concludes":[109],"with":[110,130],"discussion":[112],"key":[114],"factors":[115],"should":[117],"be":[118],"considered":[119],"when":[120,128],"attempting":[121],"quantify":[123],"differences":[124],"presented":[129],"novel":[131],"visualization":[132],"approaches":[133],"context.":[137]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
