SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
N2C2M2 Validation using abELICIT:
Design and Analysis of ELICIT runs using
software agents
17th ICCRTS: “Operationalizing C2 Agility”
Marco Manso
(marco@marcomanso.com)
SAS-085 Member
Paper	
  ID:	
  	
  003	
  
This work results was sponsored by a subcontract from Azigo, Inc.
via the Center for Edge Power of the Naval Postgraduate School.
Agenda
•  Introduction and Background
•  Formulation of the Experiments
•  Analysis
•  Conclusions
•  Bibliography
Introduction
•  Validation of the N2C2M2
NCW	
  Theory	
  
C2	
  CRM	
  (SAS-­‐050)	
  
2006	
   2010	
   2012	
  2008	
  
Theore8cal	
  Founda8ons	
  for	
  the	
  Analysis	
  
of	
  ELICIT	
  Experiments	
   	
  	
  
(Manso	
  and	
  Nunes	
  2008)	
  
N2C2M2	
  Experimenta8on	
  and	
  
Valida8on:	
  Understanding	
  Its	
  C2	
  
Approaches	
  and	
  Implica8ons	
  	
  
(Manso	
  and	
  Manso	
  2010)	
  
N2C2M2	
  (SAS-­‐065)	
  
Know	
  the	
  Network,	
  Knit	
  the	
  Network:	
  
Applying	
  SNA	
  to	
  N2C2M2	
  Experiments	
  
(Manso	
  and	
  Manso	
  2010)	
  
2011	
  
Defining	
  and	
  Measuring	
  
Cogni8ve-­‐Entropy	
  and	
  
Cogni8ve	
  Self-­‐Synchroniza8on	
  	
  
(Manso	
  and	
  Moffat	
  2011)	
  
Valida0on	
  
with	
  abELICIT	
  
ELICIT	
   abELICIT	
  
Human	
  Runs	
  
Introduction
•  Theory of NCW
–  NCW Tenets
–  NCW Value Chain
•  C2 Conceptual Reference Model
–  ASD-NII/OFT
–  NATO SAS-050
•  C2 Approach Space and its three key-dimensions:
Allocation of Decision Rights (ADR), Patterns of Interaction (PI) and
Distribution of Information (DI).
•  NATO NEC C2 Maturity Model (SAS-065)
–  Five C2 Approaches
Introduction
NATO NEC C2 Maturity Model (SAS-065 2010)
Source:	
  SAS-­‐065	
  2010	
  
Introduction
NATO NEC C2 Maturity Model hypothesises that
– the more network-enabled a C2 approach is
the more likely it is to develop shared
awareness and shared understanding
(SAS-065 2010, 69).
Introduction
ELICIT
Experimental Laboratory for
Investigating Collaboration, Information-sharing, and Trust
•  CCRP sponsored the design and development of the
ELICIT platform to facilitate experimentation focused on
information, cognitive, and social domain phenomena
•  ELICIT is a web-accessible experimentation environment
supported by software tools and instructions /
procedures
•  abELICIT is an agent-based version of the ELICIT
platform
Original	
  slide	
  from	
  (Alberts	
  and	
  Manso	
  2012)	
  
Introduction
ELICIT
•  The goal of each set of participants is to build situational awareness and
identify the who, what, when, and where of a pending attack
–  Factoids are periodically distributed to participants; each participant receives
a small subset of the available factoids
–  No one is given sufficient information to solve without receiving information
from others
–  Participants can share factoids directly with each other, post factoids to
websites, and by “keyword directed” queries
–  Participants build awareness and shared awareness by gathering and
cognitively processing factoids
•  The receiving, sharing, posting, and seeking of factoids and the nature
of the interactions between and among participants can be constrained
•  Participants can be “organized” and motivated in any number of ways
•  Various stresses can applied (e.g. communications delays and losses)
•  Software-Agents are used instead of humans
Original	
  slide	
  from	
  (Alberts	
  and	
  Manso	
  2012)	
  
Introduction
Past Research
•  A first and preliminary experimentation stage using
two pre-existing models: Hierarchy and Edge (SAS-065 2010).
26 runs (human subjects).
Edge organizations were more effective, faster, shared more
information and were more efficient than Hierarchies.
•  A second experimentation stage that recreated
the N2C2M2 five C2 approaches (Manso and B. Manso 2010).
18 runs (human subjects).
Edge reached the best scores in the Information and Cognitive
Domains, but it was surpassed by Collaborative in the Interactions
Domain and Measures of Merit (MoMs). Conflicted performed worst
in all assessed variables.
Formulation of the Experiments
•  Hypotheses
[1] For a complex endeavor, more network-enabled C2 approaches are
more effective than less network-enabled C2 approaches.
[2] For a given level of effectiveness, more network-enabled C2
approaches are more efficient than less network-enabled C2 approaches.
More network-enabled C2 approaches exhibit increased/better levels of:
•  [4] Shared Information;
•  [5] Shared Awareness;
•  [6] Self-Synchronization (at cognitive level);
Than: less network-enabled C2 approaches
[7] A minimum level of maturity is required to be effective in ELICIT.
Formulation of the Experiments
•  Hypotheses (not covered)
[3] More network-enabled C2 approaches have more agility than less
network-enabled C2 approaches.
[8] Increasing the degree of difficulty in ELICIT requires organizations
to increase their network-enabled level to maintain effectiveness in
ELICIT.
These are covered in (Alberts and Manso 2012).
Formulation of the Experiments
•  Model
Collective
Individual
Shared
Information
Quality of
Information
Shared
Awareness
Quality of
Awareness
Performance
(MoM)
Task
Difficulty
Measures of Merit
Network
Characteristics
& Performance
Q of Information
Sources
(fixed)
Individual
& Team
Characteristics
Controllable
In ELICIT
Collective C2
Approach
(ADR-C, PI-C, DI-C)
Q Infrastructure
(fixed)Other
Influencing Variables
Enablers / Inhibitors
Info Sharing &
Collaboration
Patterns of
Interaction
Distribution of
Information
Self-
Synchronization
Allocation
of Decision
Rights
ID attempt
Formulation of the Experiments
•  C2 Approaches
Formulation of the Experiments
•  Defining the Agents Parameters
Image	
  source:	
  	
  Upton	
  et	
  al	
  2011	
  	
  
The	
  average	
  agent	
  
-­‐  'average’	
  performance	
  (i.e.,	
  number	
  of	
  
shares,	
  post,	
  pulls	
  and	
  iden8fica8ons	
  close	
  
to	
  human	
  behavior)	
  	
  
-­‐  sufficient	
  informa8on	
  processing	
  and	
  
cogni8ve	
  capabili8es	
  
-­‐  This	
  agent	
  does	
  not	
  hoard	
  informa8on.	
  
Low	
  performing	
  agent	
  
High	
  performing	
  agent	
  
Formulation of the Experiments
•  Runs are conduced
–  Per C2 Approach
–  By combining different agent archetypes among the orgnization
roles (i.e., top-level, mid-level and bottom-level)
•  Resulting in a total of 135 runs
C2 Approach Agent Type:
Top-Level
Agent Type:
Mid Level
Agent Type:
Bottom-Level
# Possible
Combinations*
Run
Number
Conflicted C2 1 Coord 4 TLs 12 TMs 27 1 .. 27
De-conflicted C2 1 Deconf 4 TLs 12 TMs 27 28 .. 54
Coordinated C2 1 CTC 4 TLs 12 TMs 27 55 .. 81
Collaborative C2 1 CF 4 TLs 12 TMs 27 82 .. 108
Edge C2 - - 17 TMs 27** 109 .. 135
TOTAL 135
*	
  	
  	
  Possible	
  agent	
  types	
  are:	
  	
  (i)	
  baseline,	
  (ii)	
  low-­‐performing	
  and	
  (iii)	
  high-­‐performing	
  	
  	
  	
  
**	
  Use	
  same	
  combina8ons	
  of	
  agent	
  types	
  in	
  Edge	
  as	
  for	
  other	
  C2	
  approaches	
  	
  
Analysis
•  Information Domain
C2
Approach
Number
Relevant Information Reached
(Avg: #facts | %)
Shared Information
Reached
Mean σ Mean σ
1 7.41 | 22% 0 0 0
2 8.29 | 25% 0 0 0
3 11.12 | 37% 0 4 0
4 33 | 100% 0 68 0
5 33 | 100% 0 68 0
OBS:	
  Shared	
  Informa8on	
  
reached	
  maximum	
  value	
  is	
  68	
  
Analysis
•  Information Domain
C2
Approach
Number
Top-Level
(CTC)
Mid-Level
(Who TL)
Mid-Level
(What TL)
Mid-Level
(Where TL)
Mid-Level
(When TL)
1 4 16 16 16 16
2 20 20 20 20 20
3 68 20 20 20 20
4 68 68 68 68 68
5 - - - - -
C2
Approa
ch
Number
Interactions
Activity
(Shares, Posts,
Pulls)
Team
Inward-
Outward
Ratio
Network Reach
(%)
Mean σ Mean σ
1 41.28 22.36 1.00 18% 0.00
2 42.74 20.72 0.95 21% 0.00
3 45.95 24.05 0.95 21% 0.00
4 115.68 43.56 0.22 100% 0.00
5 116.39 44.00 - 100% 0.00
Analysis
•  Interactions / Social Domain
Analysis
•  Sociogram: Conflicted C2
Analysis
•  Sociogram: De-Conflicted C2
Analysis
•  Sociogram: Coordinated C2
Analysis
•  Sociogram: Collaborative C2
Analysis
•  Sociogram: Edge C2
Analysis
•  Cognitive Domain
0"
10"
20"
30"
40"
50"
60"
0" 1" 2" 3" 4" 5" 6"
range&[0,&68]&
C2&Approach&Level&
Par8ally&Correct&IDs&
#"Correct"IDs"(all"
runs)"
#"Correct"IDs"
(mean)"
0"
0.2"
0.4"
0.6"
0.8"
1"
0" 1" 2" 3" 4" 5" 6"
Range:'[0*1]'
C2'Approach'Number'
CSSync'
CSSync"(all"runs)"
CSSync"(mean)"
Analysis
•  Cognitive Domain
For	
  info	
  on	
  CSSync	
  See	
  (Manso	
  and	
  Moffat	
  2011)	
  
0"
0.2"
0.4"
0.6"
0.8"
1"
0" 1" 2" 3" 4" 5" 6"
range&[0,1]&
C2&Approach&Number&
Effec9veness&
Effec/veness"results"
(all"runs)"
Effec/veness"
(mean)"
Analysis
•  Effectiveness (approach specific)
Analysis
•  Efficiency-time (approach specific)
0"
0.05"
0.1"
0.15"
0.2"
0.25"
0.3"
0.35"
0.4"
0" 1" 2" 3" 4" 5" 6"
C2#Approach#Number#
Efficiency#(effort)#
Efficiency"(effort)"
(all"runs)"
Efficiency"(effort)"
Analysis
•  Efficiency-effort (approach specific)
Conclusions
•  Overall Results
0
0.2
0.4
0.6
0.8
1
Sh. Relevant
Information
Shared
Awareness
CSSync
Effectiveness
Efficiency (time)
Efficiency (effort)
Conflicted C2
De-conflicted C2
Coordinated C2
Collaborative C2
Edge C2
Conclusions
•  Overall Results
–  More network-enabled C2 approaches achieve more:
•  shared information,
•  shared awareness and
•  self-synchronization
–  than less network-enabled C2 approaches
–  On effectiveness and efficiency-time two clusters are
formed:
•  Cluster 1 (high scores): COORDINATED, COLLABORATIVE
and EDGE
•  Cluster 2 (low scores): CONFLICTED and DE-CONFLICTED
–  On efficiency-effort three clusters are formed:
•  Cluster 1 (high scores): COORDINATED
•  Cluster 2 (med scores): COLLABORATIVE and EDGE
•  Cluster 3 (low scores): CONFLICTED and DE-CONFLICTED
Conclusions
•  Overall Results
–  Agents behave better than humans
–  Agents don’t differentiate according to role
–  The key condition for success is having all information
available (not true for humans)
–  Collaborative and Edge yield similar results with
agents (as opposed to human runs)
•  Recommendations:
–  Extend ELICIT (more dynamics, more uncertainty,
decision-making and actions)
–  Further enlarge human-runs dataset
Acknowledgements
•  This work was sponsored by a subcontract from Azigo, Inc. via the
Center for Edge Power of the Naval Postgraduate School
•  The following people contributed decisively to its accomplishments,
namelly:
–  Mary Ruddy, from Azigo, Inc. the contract manager and ELICIT specialist that provided
inexhaustible support from overseas and advice towards use and customization of the
abELICIT platform.
–  Dr. Mark Nissen, Director of the Center for Edge Power at the Naval Postgraduate
School, for his institutional and financial support.
–  SAS-065 ELICIT working team, namely, Dr. Jim Moffat, Dr. Lorraine Dodd, Dr. Reiner
Huber, Dr. Tor Langsaeter, Mss. Danielle Martin Wynn and Mr. Klaus Titze. Additionally
from SAS-065, to Dr. Henrik Friman and Dr. Paul Phister, for their constructive
feedback and recommendations.
–  ELICIT EBR team, namely, Dr. Jimmie McEver and Mss. Danielle Martin Wynn.
–  Members of the Portuguese Military Academy involved in the ELICIT work, specifically,
Col. Fernando Freire, LtCol. José Martins and LtCol. Paulo Nunes.
–  Finally, to Dr. David Alberts (DoD CCRP) and Dr. Richard Hayes (EBR Inc.) for their
deep scrutiny, support and exigent contributions in the whole experimentation process
and ELICIT, and, more importantly, for their ubiquitous provision of inspiration and
‘food-for-thought’ in C2 science and experimentation via the CCRP.
N2C2M2 Validation using abELICIT:
Design and Analysis of ELICIT runs using
software agents
17th ICCRTS: “Operationalizing C2 Agility”
Marco Manso
(marco@marcomanso.com)
SAS-085 Member
Paper	
  ID:	
  	
  003	
  
This work results from a subcontract to Azigo, Inc.
via the Center for Edge Power of the Naval Postgraduate School.
Thank You for your attention !

Contenu connexe

Similaire à N2C2M2 Validation using abELICIT

Operationalizing and Measuring Agility
Operationalizing and Measuring AgilityOperationalizing and Measuring Agility
Operationalizing and Measuring AgilityMarco Manso
 
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Francesco Rago
 
National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...Mohamed Ben Naseir
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
 
Novel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdf
Novel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdfNovel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdf
Novel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdfMaarit Laanti
 
Towards Effective Device-Aware Federated Learning
Towards Effective Device-Aware Federated LearningTowards Effective Device-Aware Federated Learning
Towards Effective Device-Aware Federated LearningAntonio Ferrara
 
Agile London at Ticketmaster
Agile London at TicketmasterAgile London at Ticketmaster
Agile London at TicketmasterBilly Jenkins
 
Problem Solving Methods
Problem Solving MethodsProblem Solving Methods
Problem Solving MethodsMaikel Mardjan
 
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...Deltares
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networksCSIRO
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET Journal
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial EmulationScott Sutherland
 
A Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User GoalsA Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User GoalsPradeep K. Venkatesh
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems Gautam Siwach
 

Similaire à N2C2M2 Validation using abELICIT (20)

Operationalizing and Measuring Agility
Operationalizing and Measuring AgilityOperationalizing and Measuring Agility
Operationalizing and Measuring Agility
 
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
 
National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Novel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdf
Novel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdfNovel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdf
Novel_Value_Stream_Analysis_for_SAFe_-_ver_8.pdf
 
Towards Effective Device-Aware Federated Learning
Towards Effective Device-Aware Federated LearningTowards Effective Device-Aware Federated Learning
Towards Effective Device-Aware Federated Learning
 
Soa
SoaSoa
Soa
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Final ppt
Final pptFinal ppt
Final ppt
 
Agile London at Ticketmaster
Agile London at TicketmasterAgile London at Ticketmaster
Agile London at Ticketmaster
 
VISSOFTPresentation.pdf
VISSOFTPresentation.pdfVISSOFTPresentation.pdf
VISSOFTPresentation.pdf
 
Problem Solving Methods
Problem Solving MethodsProblem Solving Methods
Problem Solving Methods
 
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
 
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion DetectionIRJET- Machine Learning Processing for Intrusion Detection
IRJET- Machine Learning Processing for Intrusion Detection
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
 
A Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User GoalsA Personalized Software Assistant Framework To Achieve User Goals
A Personalized Software Assistant Framework To Achieve User Goals
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems Correlation Analysis Modeling Use Case - IBM Power Systems
Correlation Analysis Modeling Use Case - IBM Power Systems
 

Plus de Marco Manso

Real-time on-site forensic trace qualification
Real-time on-site forensic trace qualificationReal-time on-site forensic trace qualification
Real-time on-site forensic trace qualificationMarco Manso
 
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...Marco Manso
 
NEXES Applications for Citizens
NEXES Applications for CitizensNEXES Applications for Citizens
NEXES Applications for CitizensMarco Manso
 
NEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario OverviewNEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario OverviewMarco Manso
 
NEXES Campaigns of Demonstration
NEXES Campaigns of DemonstrationNEXES Campaigns of Demonstration
NEXES Campaigns of DemonstrationMarco Manso
 
EMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnSEMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnSMarco Manso
 
Emergency Apps for First Responders
Emergency Apps for First RespondersEmergency Apps for First Responders
Emergency Apps for First RespondersMarco Manso
 
Public Alert in NEXES
Public Alert in NEXESPublic Alert in NEXES
Public Alert in NEXESMarco Manso
 
The Value of IMS for NGES
The Value of IMS for NGESThe Value of IMS for NGES
The Value of IMS for NGESMarco Manso
 
Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.Marco Manso
 
Accessibility Aspects in NGES
Accessibility Aspects in NGESAccessibility Aspects in NGES
Accessibility Aspects in NGESMarco Manso
 
NEXES: On the Path Towards NGES
NEXES: On the Path Towards NGESNEXES: On the Path Towards NGES
NEXES: On the Path Towards NGESMarco Manso
 
Cognitive Self-Synchronisation
Cognitive Self-SynchronisationCognitive Self-Synchronisation
Cognitive Self-SynchronisationMarco Manso
 
The Role of Social Media in Crisis
The Role of Social Media in CrisisThe Role of Social Media in Crisis
The Role of Social Media in CrisisMarco Manso
 
Rene Seguranca Ai Agents
Rene Seguranca Ai AgentsRene Seguranca Ai Agents
Rene Seguranca Ai AgentsMarco Manso
 

Plus de Marco Manso (17)

Real-time on-site forensic trace qualification
Real-time on-site forensic trace qualificationReal-time on-site forensic trace qualification
Real-time on-site forensic trace qualification
 
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...
 
NEXES Applications for Citizens
NEXES Applications for CitizensNEXES Applications for Citizens
NEXES Applications for Citizens
 
NEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario OverviewNEXES Pilot in Romania Scenario Overview
NEXES Pilot in Romania Scenario Overview
 
AAHD Exercises
AAHD ExercisesAAHD Exercises
AAHD Exercises
 
NEXES Campaigns of Demonstration
NEXES Campaigns of DemonstrationNEXES Campaigns of Demonstration
NEXES Campaigns of Demonstration
 
EMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnSEMYNOS nExt generation eMergencY commuNicatiOnS
EMYNOS nExt generation eMergencY commuNicatiOnS
 
Emergency Apps for First Responders
Emergency Apps for First RespondersEmergency Apps for First Responders
Emergency Apps for First Responders
 
Public Alert in NEXES
Public Alert in NEXESPublic Alert in NEXES
Public Alert in NEXES
 
The Value of IMS for NGES
The Value of IMS for NGESThe Value of IMS for NGES
The Value of IMS for NGES
 
Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.Improved Capabilities at the Hands of PSAP Operators.
Improved Capabilities at the Hands of PSAP Operators.
 
Accessibility Aspects in NGES
Accessibility Aspects in NGESAccessibility Aspects in NGES
Accessibility Aspects in NGES
 
NEXES: On the Path Towards NGES
NEXES: On the Path Towards NGESNEXES: On the Path Towards NGES
NEXES: On the Path Towards NGES
 
SensorSky
SensorSkySensorSky
SensorSky
 
Cognitive Self-Synchronisation
Cognitive Self-SynchronisationCognitive Self-Synchronisation
Cognitive Self-Synchronisation
 
The Role of Social Media in Crisis
The Role of Social Media in CrisisThe Role of Social Media in Crisis
The Role of Social Media in Crisis
 
Rene Seguranca Ai Agents
Rene Seguranca Ai AgentsRene Seguranca Ai Agents
Rene Seguranca Ai Agents
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

N2C2M2 Validation using abELICIT

  • 1. N2C2M2 Validation using abELICIT: Design and Analysis of ELICIT runs using software agents 17th ICCRTS: “Operationalizing C2 Agility” Marco Manso (marco@marcomanso.com) SAS-085 Member Paper  ID:    003   This work results was sponsored by a subcontract from Azigo, Inc. via the Center for Edge Power of the Naval Postgraduate School.
  • 2. Agenda •  Introduction and Background •  Formulation of the Experiments •  Analysis •  Conclusions •  Bibliography
  • 3. Introduction •  Validation of the N2C2M2 NCW  Theory   C2  CRM  (SAS-­‐050)   2006   2010   2012  2008   Theore8cal  Founda8ons  for  the  Analysis   of  ELICIT  Experiments       (Manso  and  Nunes  2008)   N2C2M2  Experimenta8on  and   Valida8on:  Understanding  Its  C2   Approaches  and  Implica8ons     (Manso  and  Manso  2010)   N2C2M2  (SAS-­‐065)   Know  the  Network,  Knit  the  Network:   Applying  SNA  to  N2C2M2  Experiments   (Manso  and  Manso  2010)   2011   Defining  and  Measuring   Cogni8ve-­‐Entropy  and   Cogni8ve  Self-­‐Synchroniza8on     (Manso  and  Moffat  2011)   Valida0on   with  abELICIT   ELICIT   abELICIT   Human  Runs  
  • 4. Introduction •  Theory of NCW –  NCW Tenets –  NCW Value Chain •  C2 Conceptual Reference Model –  ASD-NII/OFT –  NATO SAS-050 •  C2 Approach Space and its three key-dimensions: Allocation of Decision Rights (ADR), Patterns of Interaction (PI) and Distribution of Information (DI). •  NATO NEC C2 Maturity Model (SAS-065) –  Five C2 Approaches
  • 5. Introduction NATO NEC C2 Maturity Model (SAS-065 2010) Source:  SAS-­‐065  2010  
  • 6. Introduction NATO NEC C2 Maturity Model hypothesises that – the more network-enabled a C2 approach is the more likely it is to develop shared awareness and shared understanding (SAS-065 2010, 69).
  • 7. Introduction ELICIT Experimental Laboratory for Investigating Collaboration, Information-sharing, and Trust •  CCRP sponsored the design and development of the ELICIT platform to facilitate experimentation focused on information, cognitive, and social domain phenomena •  ELICIT is a web-accessible experimentation environment supported by software tools and instructions / procedures •  abELICIT is an agent-based version of the ELICIT platform Original  slide  from  (Alberts  and  Manso  2012)  
  • 8. Introduction ELICIT •  The goal of each set of participants is to build situational awareness and identify the who, what, when, and where of a pending attack –  Factoids are periodically distributed to participants; each participant receives a small subset of the available factoids –  No one is given sufficient information to solve without receiving information from others –  Participants can share factoids directly with each other, post factoids to websites, and by “keyword directed” queries –  Participants build awareness and shared awareness by gathering and cognitively processing factoids •  The receiving, sharing, posting, and seeking of factoids and the nature of the interactions between and among participants can be constrained •  Participants can be “organized” and motivated in any number of ways •  Various stresses can applied (e.g. communications delays and losses) •  Software-Agents are used instead of humans Original  slide  from  (Alberts  and  Manso  2012)  
  • 9. Introduction Past Research •  A first and preliminary experimentation stage using two pre-existing models: Hierarchy and Edge (SAS-065 2010). 26 runs (human subjects). Edge organizations were more effective, faster, shared more information and were more efficient than Hierarchies. •  A second experimentation stage that recreated the N2C2M2 five C2 approaches (Manso and B. Manso 2010). 18 runs (human subjects). Edge reached the best scores in the Information and Cognitive Domains, but it was surpassed by Collaborative in the Interactions Domain and Measures of Merit (MoMs). Conflicted performed worst in all assessed variables.
  • 10. Formulation of the Experiments •  Hypotheses [1] For a complex endeavor, more network-enabled C2 approaches are more effective than less network-enabled C2 approaches. [2] For a given level of effectiveness, more network-enabled C2 approaches are more efficient than less network-enabled C2 approaches. More network-enabled C2 approaches exhibit increased/better levels of: •  [4] Shared Information; •  [5] Shared Awareness; •  [6] Self-Synchronization (at cognitive level); Than: less network-enabled C2 approaches [7] A minimum level of maturity is required to be effective in ELICIT.
  • 11. Formulation of the Experiments •  Hypotheses (not covered) [3] More network-enabled C2 approaches have more agility than less network-enabled C2 approaches. [8] Increasing the degree of difficulty in ELICIT requires organizations to increase their network-enabled level to maintain effectiveness in ELICIT. These are covered in (Alberts and Manso 2012).
  • 12. Formulation of the Experiments •  Model Collective Individual Shared Information Quality of Information Shared Awareness Quality of Awareness Performance (MoM) Task Difficulty Measures of Merit Network Characteristics & Performance Q of Information Sources (fixed) Individual & Team Characteristics Controllable In ELICIT Collective C2 Approach (ADR-C, PI-C, DI-C) Q Infrastructure (fixed)Other Influencing Variables Enablers / Inhibitors Info Sharing & Collaboration Patterns of Interaction Distribution of Information Self- Synchronization Allocation of Decision Rights ID attempt
  • 13. Formulation of the Experiments •  C2 Approaches
  • 14. Formulation of the Experiments •  Defining the Agents Parameters Image  source:    Upton  et  al  2011     The  average  agent   -­‐  'average’  performance  (i.e.,  number  of   shares,  post,  pulls  and  iden8fica8ons  close   to  human  behavior)     -­‐  sufficient  informa8on  processing  and   cogni8ve  capabili8es   -­‐  This  agent  does  not  hoard  informa8on.   Low  performing  agent   High  performing  agent  
  • 15. Formulation of the Experiments •  Runs are conduced –  Per C2 Approach –  By combining different agent archetypes among the orgnization roles (i.e., top-level, mid-level and bottom-level) •  Resulting in a total of 135 runs C2 Approach Agent Type: Top-Level Agent Type: Mid Level Agent Type: Bottom-Level # Possible Combinations* Run Number Conflicted C2 1 Coord 4 TLs 12 TMs 27 1 .. 27 De-conflicted C2 1 Deconf 4 TLs 12 TMs 27 28 .. 54 Coordinated C2 1 CTC 4 TLs 12 TMs 27 55 .. 81 Collaborative C2 1 CF 4 TLs 12 TMs 27 82 .. 108 Edge C2 - - 17 TMs 27** 109 .. 135 TOTAL 135 *      Possible  agent  types  are:    (i)  baseline,  (ii)  low-­‐performing  and  (iii)  high-­‐performing         **  Use  same  combina8ons  of  agent  types  in  Edge  as  for  other  C2  approaches    
  • 16. Analysis •  Information Domain C2 Approach Number Relevant Information Reached (Avg: #facts | %) Shared Information Reached Mean σ Mean σ 1 7.41 | 22% 0 0 0 2 8.29 | 25% 0 0 0 3 11.12 | 37% 0 4 0 4 33 | 100% 0 68 0 5 33 | 100% 0 68 0 OBS:  Shared  Informa8on   reached  maximum  value  is  68  
  • 17. Analysis •  Information Domain C2 Approach Number Top-Level (CTC) Mid-Level (Who TL) Mid-Level (What TL) Mid-Level (Where TL) Mid-Level (When TL) 1 4 16 16 16 16 2 20 20 20 20 20 3 68 20 20 20 20 4 68 68 68 68 68 5 - - - - -
  • 18. C2 Approa ch Number Interactions Activity (Shares, Posts, Pulls) Team Inward- Outward Ratio Network Reach (%) Mean σ Mean σ 1 41.28 22.36 1.00 18% 0.00 2 42.74 20.72 0.95 21% 0.00 3 45.95 24.05 0.95 21% 0.00 4 115.68 43.56 0.22 100% 0.00 5 116.39 44.00 - 100% 0.00 Analysis •  Interactions / Social Domain
  • 24. Analysis •  Cognitive Domain 0" 10" 20" 30" 40" 50" 60" 0" 1" 2" 3" 4" 5" 6" range&[0,&68]& C2&Approach&Level& Par8ally&Correct&IDs& #"Correct"IDs"(all" runs)" #"Correct"IDs" (mean)"
  • 25. 0" 0.2" 0.4" 0.6" 0.8" 1" 0" 1" 2" 3" 4" 5" 6" Range:'[0*1]' C2'Approach'Number' CSSync' CSSync"(all"runs)" CSSync"(mean)" Analysis •  Cognitive Domain For  info  on  CSSync  See  (Manso  and  Moffat  2011)  
  • 26. 0" 0.2" 0.4" 0.6" 0.8" 1" 0" 1" 2" 3" 4" 5" 6" range&[0,1]& C2&Approach&Number& Effec9veness& Effec/veness"results" (all"runs)" Effec/veness" (mean)" Analysis •  Effectiveness (approach specific)
  • 28. 0" 0.05" 0.1" 0.15" 0.2" 0.25" 0.3" 0.35" 0.4" 0" 1" 2" 3" 4" 5" 6" C2#Approach#Number# Efficiency#(effort)# Efficiency"(effort)" (all"runs)" Efficiency"(effort)" Analysis •  Efficiency-effort (approach specific)
  • 29. Conclusions •  Overall Results 0 0.2 0.4 0.6 0.8 1 Sh. Relevant Information Shared Awareness CSSync Effectiveness Efficiency (time) Efficiency (effort) Conflicted C2 De-conflicted C2 Coordinated C2 Collaborative C2 Edge C2
  • 30. Conclusions •  Overall Results –  More network-enabled C2 approaches achieve more: •  shared information, •  shared awareness and •  self-synchronization –  than less network-enabled C2 approaches –  On effectiveness and efficiency-time two clusters are formed: •  Cluster 1 (high scores): COORDINATED, COLLABORATIVE and EDGE •  Cluster 2 (low scores): CONFLICTED and DE-CONFLICTED –  On efficiency-effort three clusters are formed: •  Cluster 1 (high scores): COORDINATED •  Cluster 2 (med scores): COLLABORATIVE and EDGE •  Cluster 3 (low scores): CONFLICTED and DE-CONFLICTED
  • 31. Conclusions •  Overall Results –  Agents behave better than humans –  Agents don’t differentiate according to role –  The key condition for success is having all information available (not true for humans) –  Collaborative and Edge yield similar results with agents (as opposed to human runs) •  Recommendations: –  Extend ELICIT (more dynamics, more uncertainty, decision-making and actions) –  Further enlarge human-runs dataset
  • 32. Acknowledgements •  This work was sponsored by a subcontract from Azigo, Inc. via the Center for Edge Power of the Naval Postgraduate School •  The following people contributed decisively to its accomplishments, namelly: –  Mary Ruddy, from Azigo, Inc. the contract manager and ELICIT specialist that provided inexhaustible support from overseas and advice towards use and customization of the abELICIT platform. –  Dr. Mark Nissen, Director of the Center for Edge Power at the Naval Postgraduate School, for his institutional and financial support. –  SAS-065 ELICIT working team, namely, Dr. Jim Moffat, Dr. Lorraine Dodd, Dr. Reiner Huber, Dr. Tor Langsaeter, Mss. Danielle Martin Wynn and Mr. Klaus Titze. Additionally from SAS-065, to Dr. Henrik Friman and Dr. Paul Phister, for their constructive feedback and recommendations. –  ELICIT EBR team, namely, Dr. Jimmie McEver and Mss. Danielle Martin Wynn. –  Members of the Portuguese Military Academy involved in the ELICIT work, specifically, Col. Fernando Freire, LtCol. José Martins and LtCol. Paulo Nunes. –  Finally, to Dr. David Alberts (DoD CCRP) and Dr. Richard Hayes (EBR Inc.) for their deep scrutiny, support and exigent contributions in the whole experimentation process and ELICIT, and, more importantly, for their ubiquitous provision of inspiration and ‘food-for-thought’ in C2 science and experimentation via the CCRP.
  • 33. N2C2M2 Validation using abELICIT: Design and Analysis of ELICIT runs using software agents 17th ICCRTS: “Operationalizing C2 Agility” Marco Manso (marco@marcomanso.com) SAS-085 Member Paper  ID:    003   This work results from a subcontract to Azigo, Inc. via the Center for Edge Power of the Naval Postgraduate School. Thank You for your attention !