A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges

P Maniriho, AN Mahmood, MJM Chowdhury - Future Generation Computer …, 2022 - Elsevier
There has been an increasing trend of malware release, which raises the alarm for security
professionals worldwide. It is often challenging to stay on top of different types of malware …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

Hybrid IoT cyber range

KE Balto, MM Yamin, A Shalaginov, B Katt - Sensors, 2023 - mdpi.com
The use of IoT devices has increased rapidly in recent times. While the development of new
devices is moving quickly, and as prices are being forced down, the costs of developing …

Scalable learning environments for teaching cybersecurity hands-on

J Vykopal, P Čeleda, P Seda… - 2021 IEEE Frontiers …, 2021 - ieeexplore.ieee.org
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …

A digital twin-based cyber range for SOC analysts

M Vielberth, M Glas, M Dietz, S Karagiannis… - IFIP Annual Conference …, 2021 - Springer
Abstract Security Operations Centers (SOCs) provide a holistic view of a company's security
operations. While aiming to harness this potential, companies are lacking sufficiently skilled …

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

A Mozo, Á González-Prieto, A Pastor… - Scientific reports, 2022 - nature.com
Due to the growing rise of cyber attacks in the Internet, the demand of accurate intrusion
detection systems (IDS) to prevent these vulnerabilities is increasing. To this aim, Machine …

Train as you fight: evaluating authentic cybersecurity training in cyber ranges

M Glas, M Vielberth, G Pernul - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
Humans can play a decisive role in detecting and mitigating cyber attacks if they possess
sufficient cybersecurity skills and knowledge. Realizing this potential requires effective …

Capability assessment methodology and comparative analysis of cybersecurity training platforms

R Beuran, J Vykopal, D Belajová, P Čeleda, Y Tan… - Computers & …, 2023 - Elsevier
Cybersecurity training is a key endeavour for ensuring that the IT workforce possess the
knowledge and practical skills required to counter the ever-increasing cybersecurity threats …

Phoeni2x–a european cyber resilience framework with artificial-intelligence-assisted orchestration, automation & response capabilities for business continuity and …

K Fysarakis, A Lekidis, V Mavroeidis… - … on Cyber Security …, 2023 - ieeexplore.ieee.org
As digital technologies become more pervasive in society and the economy, cyber-security
incidents become more frequent, but also more impactful. Based on the NIS & NIS2 …

A digital twin for the 5G era: The SPIDER cyber range

F Rebecchi, A Pastor, A Mozo… - 2022 IEEE 23rd …, 2022 - ieeexplore.ieee.org
Service providers, 5G network operators and, more generally, vertical industries face today a
dangerous shortage of highly skilled cybersecurity experts. Along with the escalation and …