Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure …
In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …
S Kucek, M Leitner - Journal of Network and Computer Applications, 2020 - Elsevier
Capture the Flag (CTF) is a computer security competition that is generally used to give participants experience in securing (virtual) machines and responding to cyber attacks. CTF …
M Karjalainen, T Kokkonen - 2020 IEEE European Symposium …, 2020 - ieeexplore.ieee.org
The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect …
M Leitner, M Frank, W Hotwagner, G Langner… - Proceedings of the …, 2020 - dl.acm.org
With the evolution of threats and attacks and the speed of automation, new modern training and learning environments are needed to support the challenges of digital organizations …
Evaluations of intrusion detection systems (IDS) require log datasets collected in realistic system environments. Existing testbeds therefore offer user simulations and attack scenarios …
UPD Ani, JM Watson, B Green, B Craggs… - Journal of Cyber …, 2021 - Taylor & Francis
This paper presents a mapping framework for design factors and an implementation process for building credible Industrial Control Systems (ICS) security testbeds. The security and …
T Gustafsson, J Almroth - Nordic Conference on Secure IT Systems, 2020 - Springer
Cyber security research is quintessential to secure computerized systems against cyber threats. Likewise, cyber security training and exercises are instrumental in ensuring that the …
VE Urias, WMS Stout… - … conference on security …, 2018 - ieeexplore.ieee.org
Cyber networks are extremely non-deterministic, complex systems. To address this, we must develop foundational research protocols to enable reproducible cyber experiments that can …