Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Austin Silva is active.

Publication


Featured researches published by Austin Silva.


international conference on augmented cognition | 2013

Enhanced Training for Cyber Situational Awareness

Susan Marie Stevens-Adams; Armida Carbajal; Austin Silva; Kevin S. Nauer; Benjamin John Anderson; Theodore Reed; J. Chris Forsythe

A study was conducted in which participants received either tool-based or narrative-based training and then completed challenges associated with network security threats. Three teams were formed: (1) Tool-Based, for which each participant received tool-based training; (2) Narrative-Based, for which each participant received narrative-based training and (3) Combined, for which three participants received tool-based training and two received narrative-based training. Results showed that the Narrative-Based team recognized the spatial-temporal relationship between events and constructed a timeline that was a reasonable approximation of ground truth. In contrast, the Combined team produced a linear sequence of events that did not encompass the relationships between different adversaries. Finally, the Tool-Based team demonstrated little appreciation of either the spatial or temporal relationships between events. These findings suggest that participants receiving Narrative-Based training were able to use the software tools in a way that allowed them to gain a greater level of situation awareness.


international conference on augmented cognition | 2013

Human Dimension in Cyber Operations Research and Development Priorities

J. Chris Forsythe; Austin Silva; Susan Marie Stevens-Adams; Jeffrey M. Bradshaw

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions.


international conference on augmented cognition | 2013

Instrumenting Competition-Based Exercises to Evaluate Cyber Defender Situation Awareness

Theodore Reed; Kevin S. Nauer; Austin Silva

Cyber defense exercises create simulated attack and defense scenarios used to train and evaluate incident responders. The most pervasive form of competition-based exercise is comprised of jeopardy-style challenges, which compliment a fictional cyber-security event. Multiple competitions were instrumented to collect usage statistics on a per-challenge basis. The competitions use researcher-developed challenges containing over twenty attack techniques, which generate forensic evidence and observable second-order effects. The following observations were made: (1) a group of defenders performs better than an individual; (2) situation awareness of the fictional event may be measured; (3) challenge complexity does not imply difficulty. This research introduces a novel application of system instrumentation on competition-based exercises and describes an exercise development methodology for effective challenge and competition creation. Effective challenges correctly represent difficulty and reward competitors with objective points and optional forensic clues. Effective competitions compliment training goals and appropriately improve the knowledge and skill of a competitor.


international conference on augmented cognition | 2015

Determining the optimal time on x-ray analysis for Transportation Security Officers.

Ann Speed; Austin Silva; Derek Trumbo; David J. Stracuzzi; Christina E. Warrender; Michael Christopher Stefan Trumbo; Kristin M. Divis

The Transportation Security Administration has a large workforce of Transportation Security Officers, most of whom perform interrogation of x-ray images at the passenger checkpoint. To date, TSOs on the x-ray have been limited to a 30-min session at a time, however, it is unclear where this limit originated. The current paper outlines methods for empirically determining if that 30-min duty cycle is optimal and if there are differences between individual TSOs. This work can inform scheduling TSOs at the checkpoint and can also inform whether TSOs should continue to be cross-trained (i.e., performing all 6 checkpoint duties) or whether specialization makes more sense.


international conference on augmented cognition | 2015

Exploratory Analysis of Visual Search Data

David J. Stracuzzi; Ann Speed; Austin Silva; Michael Joseph Haass; Derek Trumbo

Visual search data describe people’s performance on the common perceptual problem of identifying target objects in a complex scene. Technological advances in areas such as eye tracking now provide researchers with a wealth of data not previously available. The goal of this work is to support researchers in analyzing this complex and multimodal data and in developing new insights into visual search techniques. We discuss several methods drawn from the statistics and machine learning literature for integrating visual search data derived from multiple sources and performing exploratory data analysis. We ground our discussion in a specific task performed by officers at the Transportation Security Administration and consider the applicability, likely issues, and possible adaptations of several candidate analysis methods.


international conference on augmented cognition | 2015

Measuring Expert and Novice Performance Within Computer Security Incident Response Teams

Austin Silva; Glory Ruth Emmanuel; Jonathan T. McClain; Laura E. Matzen; J. Chris Forsythe

There is a great need for creating cohesive, expert cybersecurity incident response teams and training them effectively. This paper discusses new methodologies for measuring and understanding expert and novice differences within a cybersecurity environment to bolster training, selection, and teaming. This methodology for baselining and characterizing individuals and teams relies on relating eye tracking gaze patterns to psychological assessments, human-machine transaction monitoring, and electroencephalography data that are collected during participation in the game-based training platform Tracer FIRE. We discuss preliminary findings from two pilot studies using novice and professional teams.


international conference on hci in business | 2016

HCI Testing in Laboratory or Field Settings

Chuan-Hoo Tan; Austin Silva; Rich Lee; Kanliang Wang; Fiona Fui-Hoon Nah

This paper presents perspectives from both academia and practice on how an HCI testing is to be conducted and the deliberations that go into the testing. HCI testing can be conducted in closed-door laboratory or in a field setting. While there is an increased interest in field testing of an HCI artifact, there is always an enduring concern over how to administer a field testing given that the testers will have less control over the course of testing. In this paper, we cover HCI testing deliberation as well as the operational issues of field testing, and conclude the paper with an exemplary case of a large-scale field testing conducted in Taiwan.


Archive | 2015

Measuring Human Performance within Computer Security Incident Response Teams

Jonathan T. McClain; Austin Silva; Glory Emmanuel Aviña; James C. Forsythe

Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.


International Journal of System Dynamics Applications archive | 2017

Cooperation and Free Riding in Cyber Security Information-Sharing Programs

Asmeret Bier Naugle; Austin Silva; Munaf Syed Aamir

Even with substantial investment in cyber defense, the risk of harm from cyber attacks is significant for many organizations. Multi-organization information-sharing programs have the potential to improve cyber security at relatively low cost by allowing organizations that face similar threats to share information on vulnerabilities, attacks, and defense strategies. The dynamics of an information-sharing program are likely to depend heavily on interactions between human decision makers. This article describes a system dynamics model of an information-sharing program. The model incorporates decision-making strategies of managers and cyber defenders in each participating organization. The model was used to assess how free-riding behavior is likely to affect the success of a multi-organization information-sharing program. Results shows that free riding may make information sharing more volatile and less beneficial early on, but other factors, including cost savings and the perceived utility of shared information, are likely to create success later in the time horizon.


international conference on human-computer interaction | 2015

Factors Contributing to Performance for Cyber Security Forensic Analysis

Shelby Hopkins; Andrew T. Wilson; Austin Silva; J. Chris Forsythe

Previously, the current authors Hopkins et al. 2015 described research in which subjects provided a tool that facilitated their construction of a narrative account of events performed better in conducting cyber security forensic analysis. The narrative tool offered several distinct features. In the current paper, an analysis is reported that considered which features of the tool contributed to superior performance. This analysis revealed two features that accounted for a statistically significant portion of the variance in performance. The first feature provided a mechanism for subjects to identify suspected perpetrators of the crimes and their motives. The second feature involved the ability to create an annotated visuospatial diagram of clues regarding the crimes and their relationships to one another. Based on these results, guidance may be provided for the development of software tools meant to aid cyber security professionals in conducting forensic analysis.

Collaboration


Dive into the Austin Silva's collaboration.

Top Co-Authors

Avatar

Kevin S. Nauer

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Michael Joseph Haass

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jonathan T. McClain

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Laura E. Matzen

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James C. Forsythe

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robert G. Abbott

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Glory Ruth Emmanuel

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

J. Chris Forsythe

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge