Adapt and overcome: Perceptions of adaptive autonomous agents for human-AI teaming

AI Hauptman, BG Schelble, NJ McNeese… - Computers in Human …, 2023 - Elsevier
Rapid advances in AI technologies have caused teams to explore the use of AI agents as
full, active members of the team. The complex environments that teams occupy require …

[HTML][HTML] Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role …

C La Fleur, B Hoffman, CB Gibson, N Buchler - Computers & Security, 2021 - Elsevier
A critical component to any modern cybersecurity endeavor is effective use of its human
resources to secure networks, maintain services and mitigate adversarial events. Despite …

Model-based incident response playbooks

A Shaked, Y Cherdantseva, P Burnap - Proceedings of the 17th …, 2022 - dl.acm.org
Inevitably, all systems are vulnerable, and none are impervious to attack. Incident response
is an important element in maintaining the cyber security posture of organizations. Incident …

Human–machine integration based augmented reality assisted wire-bending training system for orthodontics

J Dong, Z Xia, Q Zhao, N Zhao - Virtual Reality, 2023 - Springer
With the increasing demand for orthodontic treatment, the skill of wire bending is more and
more important for orthodontists. Traditional wire bending training needs a high cost of time …

Identifying expertise gaps in cyber incident response: Cyber defender needs vs. Technological Development

M Nyre-Yu - 2021 - scholarspace.manoa.hawaii.edu
Incident response is an area within cyber defense that is responsible for detecting,
mitigating, and preventing threats within a given network. Like other areas of cyber security …

[PDF][PDF] Explainable AI in Cybersecurity Operations: Lessons Learned from xAI Tool Deployment.

M Nyre-Yu, E Morris, M Smith, B Moss, C Smutz - 2022 - osti.gov
Technological advances relating to artificial intelligence (AI) and explainable AI (xAI)
techniques are at a stage of development that requires better understanding of operational …

A task analysis of static binary reverse engineering for security

M Nyre-Yu, K Butler, C Bolstad - 2022 - scholarspace.manoa.hawaii.edu
Software is ubiquitous in society, but understanding it, especially without access to source
code, is both non-trivial and critical to security. A specialized group of cyber defenders …

[PDF][PDF] A user-centric approach to explainable AI in a security operation center environment.

HS Eriksson - 2022 - duo.uio.no
Living in the information age, countries, societies, and individuals become ever more
emerged in technology for each passing day. However, with every new software, hardware …

The Role of Autonomy Levels and Contextual Risk in Designing Safer AI Teammates

AI Hauptman, BG Schelble… - 2024 IEEE 4th …, 2024 - ieeexplore.ieee.org
As AI becomes more intelligent and autonomous, the concept of human-AI teaming has
become more realistic and attractive. Despite the promises of AI teammates, human-AI …

Towards XAI in the SOC–a user centric study of explainable alerts with SHAP and LIME

HS Eriksson, G Grov - … Conference on Big Data (Big Data), 2022 - ieeexplore.ieee.org
Many studies of the adoption of machine learning (ML) in Security Operation Centres
(SOCs) have pointed to a lack of transparency and explanation–and thus trust–as a barrier …