{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T02:40:12Z","timestamp":1759200012140,"version":"3.44.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001769","name":"Charles Sturt University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001769","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Cyber Security Defenders (CSDs) face the critical challenge of identifying anomalies in an increasingly complex and rapidly evolving data landscape during cyberattacks. This study introduces a novel approach to enhance CSDs' ability to detect unknown patterns and novel anomalies using 3D Immersive Virtual Reality (3DIVR) technology, addressing a significant gap in current cyber defense training methodologies. The research uniquely employs a moderated mediation model to examine the effect of 3DIVR on identifying hidden forms in Embedded Figure Tasks (EFTs) and its subsequent impact on novel anomaly detection. This approach is particularly innovative as it challenges the conventional reliance on previous experience, which can potentially hinder a CSD's ability to identify unfamiliar anomaly patterns. Through a quasi-experimental design with repeated measurements, we compared five research groups, four of which underwent cognitive intervention while detecting cyber anomalies. The study involved 120 students from a cyber security defender training program, utilizing a cluster sampling method. Our hypothesis posited that practicing hidden shapes tasks in an information-diluted environment would lead to greater improvements in anomaly detection precision and speed compared to practice in information-laden settings. Key findings reveal that the final course scores were significantly higher among male participants compared to female participants; and that participants who practiced EFTs in an IVR information-diluted environment (VRLVL) demonstrated significantly faster detection of novel anomalies compared to the control group. Additionally, we discovered a positive correlation between cognitive elasticity and anomaly detection speed in participants exposed to an IVR highly-loaded environment (VRHVL). These results offer valuable insights into optimizing cyber defense training protocols. The study's utility lies in its potential to revolutionize CSD training methodologies, enhancing defenders' adaptability to emerging threats in an ever-changing cybersecurity landscape. By leveraging 3DIVR technology, this research paves the way for more effective and adaptable cyber defense strategies, crucial in an era of rapidly evolving cyber threats.<\/jats:p>","DOI":"10.1007\/s42979-025-04337-y","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T02:10:16Z","timestamp":1759198216000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Efficacy of Identifying Visual Patterns and Novel Anomalies of Cyber-Defenders with 3D Immersive VR"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6384-5092","authenticated-orcid":false,"given":"David","family":"Passig","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4603-5586","authenticated-orcid":false,"given":"Guy","family":"Sion","sequence":"additional","affiliation":[]},{"given":"Reut","family":"Hochman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"4337_CR1","unstructured":"Sutherland IE. The Ultimate Display. Proceedings of IFIP 65. 1965; vol 2, pp. 506\u2013508."},{"issue":"6","key":"4337_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/38.799723","volume":"19","author":"FP Brooks","year":"1999","unstructured":"Brooks FP. What\u2019s real about virtual reality? IEEE Comput Graphics Appl. 1999;19(6):16\u201327. https:\/\/doi.org\/10.1109\/38.799723.","journal-title":"IEEE Comput Graphics Appl"},{"key":"4337_CR3","volume-title":"Virtual reality technology","author":"GC Burdea","year":"2003","unstructured":"Burdea GC, Coiffet P. Virtual reality technology. New York: Wiley; 2003."},{"issue":"1","key":"4337_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.tics.2004.11.006","volume":"9","author":"DJ Simons","year":"2005","unstructured":"Simons DJ, Rensink RA. Change blindness: past, present, and future. Trends Cogn Sci. 2005;9(1):16\u201320. https:\/\/doi.org\/10.1016\/j.tics.2004.11.006.","journal-title":"Trends Cogn Sci"},{"issue":"5","key":"4337_CR5","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1111\/j.1467-8624.2009.01342.x","volume":"80","author":"Y Kikuchi","year":"2009","unstructured":"Kikuchi Y, Senju A, Tojo Y, Osanai H, Hasegawa T. Faces do not capture special attention in children with autism spectrum disorder: a change blindness study. Child Dev. 2009;80(5):1421\u201333.","journal-title":"Child Dev"},{"issue":"2","key":"4337_CR6","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1177\/2372732218786749","volume":"5","author":"IE Hyman","year":"2018","unstructured":"Hyman IE, Wulff AN, Thomas AK. Crime blindness: how selective attention and inattentional blindness can disrupt eyewitness awareness and memory. Policy Insights Behav Brain Sci. 2018;5(2):202\u20138. https:\/\/doi.org\/10.1177\/2372732218786749.","journal-title":"Policy Insights Behav Brain Sci"},{"issue":"1\u20132","key":"4337_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro P, Diaz-Verdejo J, Maci\u00e1-Fern\u00e1ndez G, V\u00e1zquez E. Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur. 2009;28(1\u20132):18\u201328. https:\/\/doi.org\/10.1016\/j.cose.2008.08.003.","journal-title":"Comput Secur"},{"key":"4337_CR8","doi-asserted-by":"publisher","unstructured":"Riveiro M, Falkman G, Ziemke T. Improving maritime anomaly detection and situation awareness through interactive visualization. In 2008 11th International Conference on Information Fusion. IEEE.\u200f 2008; pp. 1\u20138. https:\/\/doi.org\/10.1002\/widm.1266","DOI":"10.1002\/widm.1266"},{"issue":"7","key":"4337_CR9","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.tics.2007.05.005","volume":"11","author":"M Bar","year":"2007","unstructured":"Bar M. The proactive brain: using analogies and associations to generate predictions. Trends Cogn Sci. 2007;11(7):280\u20139. https:\/\/doi.org\/10.1016\/j.tics.2007.05.005.","journal-title":"Trends Cogn Sci"},{"issue":"5","key":"4337_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1266","volume":"8","author":"M Riveiro","year":"2018","unstructured":"Riveiro M, Pallotta G, Vespe M. Maritime anomaly detection: a review. WIREs Data Min Knowl Discov. 2018;8(5):e1266. https:\/\/doi.org\/10.1002\/widm.1266.","journal-title":"WIREs Data Min Knowl Discov"},{"key":"4337_CR11","first-page":"277","volume":"3","author":"D Passig","year":"2005","unstructured":"Passig D, Eden S. Enhancing the induction skill of deaf and hard-of-hearing children with virtual reality technology. J Deaf Stud Deaf Educ. 2005;3:277\u201385.","journal-title":"J Deaf Stud Deaf Educ"},{"key":"4337_CR12","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.compedu.2015.05.008","volume":"88","author":"D Passig","year":"2015","unstructured":"Passig D. Revisiting the Flynn effect through 3D immersive virtual reality (IVR). Comput Educ. 2015;88:327\u201342.","journal-title":"Comput Educ"},{"issue":"3","key":"4337_CR13","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3102\/00346543068003322","volume":"68","author":"A Dillon","year":"1998","unstructured":"Dillon A, Gabbard R. Hypermedia as an educational technology: a review of the quantitative research literature on learner comprehension, control, and style. Rev Educ Res. 1998;68(3):322\u201349. https:\/\/doi.org\/10.3102\/00346543068003322.","journal-title":"Rev Educ Res"},{"key":"4337_CR14","volume-title":"The Torrance tests of creative thinking-norms-technical manual research edition-verbal tests, forms A and B-figural tests, forms A and B","author":"EP Torrance","year":"1966","unstructured":"Torrance EP. The Torrance tests of creative thinking-norms-technical manual research edition-verbal tests, forms A and B-figural tests, forms A and B. Princeton, NJ: Personnel Press; 1966."},{"key":"4337_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2466\/pr0.1970.26.1.3","volume":"26","author":"AP MacDonald Jr","year":"1970","unstructured":"MacDonald AP Jr. Revised scale for ambiguity tolerance: Reliability. Psychol Rep. 1970;26:3.","journal-title":"Psychol Rep"},{"issue":"1","key":"4337_CR16","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ausmj.2017.02.001","volume":"25","author":"AF Hayes","year":"2017","unstructured":"Hayes AF, Montoya AK, Rockwood NJ. The analysis of mechanisms and their contingencies: PROCESS versus structural equation modeling. Australas Mark J. 2017;25(1):76\u201381.","journal-title":"Australas Mark J"},{"issue":"3","key":"4337_CR17","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1002\/widm.1266","volume":"46","author":"MT Schultheis","year":"2001","unstructured":"Schultheis MT, Rizzo AA. The application of virtual reality technology in rehabilitation. Rehabil Psychol. 2001;46(3):296. https:\/\/doi.org\/10.1002\/widm.1266.","journal-title":"Rehabil Psychol"},{"key":"4337_CR18","doi-asserted-by":"publisher","unstructured":"Kabil A, Duval T, Cuppens N, Le Comte G, Halgand Y, Ponchel C. Why should we use 3d collaborative virtual environments for cyber security? In 2018 IEEE fourth VR international workshop on collaborative virtual environments. IEEE. 2018. pp. 1\u20132. https:\/\/doi.org\/10.1109\/3DCVE.2018.8637109","DOI":"10.1109\/3DCVE.2018.8637109"},{"key":"4337_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103368","volume":"132","author":"B Munsinger","year":"2023","unstructured":"Munsinger B, Beebe N, Richardson T. Virtual reality for improving cyber situational awareness in security operations centers. Comput Secur. 2023;132:103368.","journal-title":"Comput Secur"},{"issue":"2","key":"4337_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/jcp5020033","volume":"5","author":"H Ahmad","year":"2025","unstructured":"Ahmad H, Ullah F, Jafri R. A survey on immersive cyber situational awareness systems. J Cybersecur Privacy. 2025;5(2):33.","journal-title":"J Cybersecur Privacy"},{"issue":"3","key":"4337_CR21","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1089\/cpb.2005.8.241","volume":"8","author":"FD Rose","year":"2005","unstructured":"Rose FD, Brooks BM, Rizzo AA. Virtual reality in brain damage rehabilitation. Cyberpsychol Behav. 2005;8(3):241\u201362. https:\/\/doi.org\/10.1089\/cpb.2005.8.241.","journal-title":"Cyberpsychol Behav"},{"issue":"4","key":"4337_CR22","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02504715","volume":"52","author":"C Angeli","year":"2004","unstructured":"Angeli C, Valanides N. Examining the effects of text-only and text-and-visual instructional materials on the achievement of field-dependent and field-independent learners during problem-solving with modeling software. Educ Tech Res Dev. 2004;52(4):23\u201333. https:\/\/doi.org\/10.1007\/BF02504715.","journal-title":"Educ Tech Res Dev"},{"key":"4337_CR23","doi-asserted-by":"publisher","DOI":"10.4108\/trans.sesa.01-06.2013.e4","author":"DH Andrews","year":"2013","unstructured":"Andrews DH, Freeman J, Andre TS, Feeney J, Carlin A, Fidopiastis CM, et al. Training organizational supervisors to detect and prevent cyber insider threats: two approaches. ICST Trans Secur Saf. 2013. https:\/\/doi.org\/10.4108\/trans.sesa.01-06.2013.e4.","journal-title":"ICST Trans Secur Saf"},{"issue":"19","key":"4337_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.ifacol.2019.12.093","volume":"52","author":"K Kullman","year":"2019","unstructured":"Kullman K, Ryan M, Trossbach L. VR\/MR supporting the future of defensive cyber operations. IFAC-PapersOnLine. 2019;52(19):181\u20136. https:\/\/doi.org\/10.1016\/j.ifacol.2019.12.093.","journal-title":"IFAC-PapersOnLine"},{"issue":"6","key":"4337_CR25","doi-asserted-by":"publisher","first-page":"1479","DOI":"10.2307\/1130467","volume":"56","author":"MC Linn","year":"1985","unstructured":"Linn MC, Petersen AC. Emergence and characterization of sex differences in spatial ability: a meta-analysis. Child Dev. 1985;56(6):1479\u201398.","journal-title":"Child Dev"},{"key":"4337_CR26","volume-title":"The psychology of gender: Advances through meta-analysis","author":"MC Linn","year":"1986","unstructured":"Linn MC, Petersen AC. A meta-analysis of gender differences in spatial ability: Implications for mathematics and science achievement. In: Hyde JS, Linn MC, editors. The psychology of gender: Advances through meta-analysis. Baltimore: The Johns Hopkins University Press; 1986."},{"issue":"2","key":"4337_CR27","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1037\/0033-2909.117.2.250","volume":"117","author":"D Voyer","year":"1995","unstructured":"Voyer D, Voyer S, Bryden MP. Magnitude of sex differences in spatial abilities: a meta-analysis and consideration of critical variables. Psychol Bull. 1995;117(2):250\u201370.","journal-title":"Psychol Bull"},{"issue":"2","key":"4337_CR28","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1002\/wcs.1380","volume":"7","author":"SC Levine","year":"2016","unstructured":"Levine SC, Foley A, Lourenco S, Ehrlich S, Ratliff K. Sex differences in spatial cognition: advancing the conversation. Wires Cogn Sci. 2016;7(2):127\u201355. https:\/\/doi.org\/10.1002\/wcs.1380.","journal-title":"Wires Cogn Sci"},{"issue":"1","key":"4337_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10648-019-09487-z","volume":"32","author":"L Wang","year":"2020","unstructured":"Wang L. Mediation relationships among gender, spatial ability, math anxiety, and math achievement. Educ Psychol Rev. 2020;32(1):1\u201315. https:\/\/doi.org\/10.1007\/s10648-019-09487-z.","journal-title":"Educ Psychol Rev"},{"issue":"1","key":"4337_CR30","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s10648-023-09728-2","volume":"35","author":"KA Bartlett","year":"2023","unstructured":"Bartlett KA, Camba JD. Gender differences in spatial ability: a critical review. Educ Psychol Rev. 2023;35(1):8.","journal-title":"Educ Psychol Rev"},{"issue":"6","key":"4337_CR31","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1037\/0003-066X.60.6.581","volume":"60","author":"JS Hyde","year":"2005","unstructured":"Hyde JS. The gender similarities hypothesis. Am Psychol. 2005;60(6):581.","journal-title":"Am Psychol"},{"key":"4337_CR32","doi-asserted-by":"publisher","unstructured":"Reed T, Nauer K, Silva A. Instrumenting competition-based exercises to evaluate cyber defender situation awareness. In International Conference on Augmented Cognition. Springer, Berlin, Heidelberg.\u200f 2013. pp. 80\u201389. https:\/\/doi.org\/10.1007\/978-3-642-39454-6_9","DOI":"10.1007\/978-3-642-39454-6_9"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04337-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04337-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04337-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T02:10:20Z","timestamp":1759198220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04337-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":32,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4337"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04337-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"10 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no financial interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study has been approved by the Faculty of Ed at Bar Ilan U. ethics committee for research involving humans.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"862"}}