{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:50:24Z","timestamp":1772859024077,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030005597","type":"print"},{"value":"9783030005603","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00560-3_24","type":"book-chapter","created":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T23:43:32Z","timestamp":1536623012000},"page":"176-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Kabil","sequence":"first","affiliation":[]},{"given":"Thierry","family":"Duval","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"G\u00e9rard","family":"Le Comte","sequence":"additional","affiliation":[]},{"given":"Yoran","family":"Halgand","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Ponchel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,12]]},"reference":[{"issue":"2","key":"24_CR1","first-page":"660","volume":"6","author":"F Alotaibi","year":"2016","unstructured":"Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M.: A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res. (IJISR) 6(2), 660\u2013666 (2016)","journal-title":"Int. J. Inf. Secur. Res. (IJISR)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Chandler, T., et al.: Immersive analytics. In: Big Data Visual Analytics (BDVA), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/BDVA.2015.7314296"},{"key":"24_CR3","unstructured":"Cliquet, G., Perreira, M., Picarougne, F., Pri\u00e9, Y., Vigier, T.: Towards hmd-based immersive analytics. In: Immersive analytics Workshop, IEEE VIS 2017, Phoenix, United States, October 2017. https:\/\/hal.archives-ouvertes.fr\/hal-01631306"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-41932-9_7","volume-title":"Advances in Human Factors in Cybersecurity","author":"A D\u2019Amico","year":"2016","unstructured":"D\u2019Amico, A., Buchanan, L., Kirkpatrick, D., Walczak, P.: Cyber operator perspectives on security visualization. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity, pp. 69\u201381. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41932-9_7"},{"key":"24_CR5","doi-asserted-by":"publisher","unstructured":"Hackathorn, R., Margolis, T.: Immersive analytics: Building virtual data worlds for collaborative decision support. In: 2016 Workshop on Immersive Analytics (IA), pp. 44\u201347, March 2016. https:\/\/doi.org\/10.1109\/IMMERSIVE.2016.7932382","DOI":"10.1109\/IMMERSIVE.2016.7932382"},{"key":"24_CR6","doi-asserted-by":"publisher","unstructured":"Inoue, D., Eto, M., Suzuki, K., Suzuki, M., Nakao, K.: Daedalus-viz: Novel real-time 3D visualization for darknet monitoring-based alert system. In: Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec 12, pp. 72\u201379. ACM, New York (2012). https:\/\/doi.org\/10.1145\/2379690.2379700","DOI":"10.1145\/2379690.2379700"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Kabil, A., Thierry, D., Nora, C., Gerard, L., Yoran, H., Christophe, P.: Why should we use 3D collaborative virtual environments (3dcve) for cyber security? In: 2018 IEEE Third VR International Workshop on Collaborative Virtual Environments (3DCVE), March 2018","DOI":"10.1109\/3DCVE.2018.8637109"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Le Ch\u00e9n\u00e9chal, M., Chalm\u00e9, S., Duval, T., Royan, J., Gouranton, V., Arnaldi, B.: Toward an enhanced mutual awareness in asymmetric CVE. In: Proceedings of International Conference on Collaboration Technologies and Systems (CTS 2015) (2015)","DOI":"10.1109\/CTS.2015.7210428"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"McKenna, S., Staheli, D., Meyer, M.: Unlocking user-centered design methods for building cyber security visualizations. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"24_CR10","doi-asserted-by":"publisher","unstructured":"Richards, D., Taylor, M.: A comparison of learning gains when using a 2D simulation tool versus a 3D virtual world. Comput. Educ. 86(C), 157\u2013171 (2015). https:\/\/doi.org\/10.1016\/j.compedu.2015.03.009","DOI":"10.1016\/j.compedu.2015.03.009"},{"key":"24_CR11","unstructured":"Sundaramurthy, S.C., McHugh, J., Ou, X., Wesch, M., Bardas, A.G., Rajagopalan, S.R.: Turning contradictions into innovations or: How we learned to stop whining and improve security operations. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 237\u2013251. USENIX Association, Denver (2016). https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/sundaramurthy"},{"key":"24_CR12","unstructured":"Takahashi, T., Kadobayashi, Y., Nakao, K.: Toward global cybersecurity collaboration: cybersecurity operation activity model. In: Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services (K-2011), pp. 1\u20138, December 2011"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00560-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T21:39:05Z","timestamp":1571866745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00560-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030005597","9783030005603"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00560-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}