ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions
HCI in Business, Government and Organizations. Information Systems and Analytics - Lecture Notes in Computer Science
◽
10.1007/978-3-030-22338-0_28
◽
2019
◽
pp. 338-353
Author(s):
Shuyuan Mary Ho
◽
Diogo Oliveira
◽
Raghav Rathi
Keyword(s):
Boundary Objects
◽
Cyber Defense
◽
Expansive Learning
Download Full-text
Related Documents
Cited By
References
Vigilance in cyber defense: A strategy and individual differences-based approach
PsycEXTRA Dataset
◽
10.1037/e550302014-001
◽
2014
◽
Author(s):
Ben D. Sawyer
◽
Victor Finomore
◽
Joel Warm
◽
Peter A. Hancock
Keyword(s):
Individual Differences
◽
Cyber Defense
Download Full-text
Intelligent Cyber Defense in 5G Augmented Aviation Cybersecurity Framework
AIAA Scitech 2021 Forum
◽
10.2514/6.2021-0661
◽
2021
◽
Author(s):
Sam Adhikari
Keyword(s):
Cyber Defense
Download Full-text
Study on Expansive Learning for Lifelong Learning : A City Case of Policy-Making
Journal of Public Society
◽
10.21286/jps.2019.02.9.1.125
◽
2019
◽
Vol 9
(1)
◽
pp. 125-149
Author(s):
Young Hee Lim
Keyword(s):
Lifelong Learning
◽
Policy Making
◽
Expansive Learning
Download Full-text
Artifacts in Interaction: The Production and Politics of Boundary Objects
SSRN Electronic Journal
◽
10.2139/ssrn.1309582
◽
2008
◽
Cited By ~ 4
Author(s):
Robyn Thomas
◽
Cynthia Hardy
◽
Leisa D. Sargent
Keyword(s):
Boundary Objects
Download Full-text
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise
Computer Communications
◽
10.1016/j.comcom.2020.10.008
◽
2021
◽
Vol 165
◽
pp. 141-148
Author(s):
Moonsu Jang
◽
Donghyun Kim
◽
Daehee Seo
◽
Yongmin Ju
◽
Seungho Ryu
◽
...
Keyword(s):
Edge Computing
◽
Cyber Defense
◽
Recommendation Algorithm
Download Full-text
Incorporating the human element in anticipatory and dynamic cyber defense
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF)
◽
10.1109/icccf.2016.7740421
◽
2016
◽
Cited By ~ 3
Author(s):
Aunshul Rege
Keyword(s):
Cyber Defense
◽
Human Element
Download Full-text
On the materiality of boundary objects in knowledge management
Proceedings of the Conference on Mensch und Computer
◽
10.1145/3404983.3410010
◽
2020
◽
Author(s):
Hannah Lucia Spiehl
◽
Frauke Mörike
◽
Markus Feufel
Keyword(s):
Knowledge Management
◽
Boundary Objects
Download Full-text
Supporting expansive learning in preservice bilingual teachers’ zone of proximal development of the activity system: an analysis of a four-field model trajectory
Professional Development in Education
◽
10.1080/19415257.2021.1879232
◽
2021
◽
pp. 1-18
◽
Cited By ~ 1
Author(s):
Sharon Chang
Keyword(s):
Field Model
◽
Zone Of Proximal Development
◽
Bilingual Teachers
◽
Proximal Development
◽
Activity System
◽
Expansive Learning
◽
Model Trajectory
Download Full-text
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable
IEEE Transactions on Network Science and Engineering
◽
10.1109/tnse.2017.2734904
◽
2018
◽
Vol 5
(2)
◽
pp. 156-170
◽
Cited By ~ 25
Author(s):
Ren Zheng
◽
Wenlian Lu
◽
Shouhuai Xu
Keyword(s):
Cyber Defense
◽
Globally Stable
Download Full-text
Data-driven Approaches for Cyber Defense of Battery Energy
Energy and AI
◽
10.1016/j.egyai.2021.100095
◽
2021
◽
pp. 100095
Author(s):
Storage Systems
◽
Nina Kharlamova
◽
Seyedmostafa Hashemi
◽
Chresten Træholt
Keyword(s):
Data Driven
◽
Cyber Defense
◽
Battery Energy
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close