Cyber-security challenges in aviation industry: A review of current and future trends

E Ukwandu, MA Ben-Farah, H Hindy, M Bures… - Information, 2022 - mdpi.com
The integration of Information and Communication Technology (ICT) tools into mechanical
devices in routine use within the aviation industry has heightened cyber-security concerns …

A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

An empirical survey of functions and configurations of open-source capture the flag (ctf) environments

S Kucek, M Leitner - Journal of Network and Computer Applications, 2020 - Elsevier
Capture the Flag (CTF) is a computer security competition that is generally used to give
participants experience in securing (virtual) machines and responding to cyber attacks. CTF …

Comprehensive cyber arena; the next generation cyber range

M Karjalainen, T Kokkonen - 2020 IEEE European Symposium …, 2020 - ieeexplore.ieee.org
The cyber domain and all the interdependencies between networked systems form an
extremely complex ensemble. Incidents in the cyber domain may have an abundance effect …

AIT cyber range: flexible cyber security environment for exercises, training and research

M Leitner, M Frank, W Hotwagner, G Langner… - Proceedings of the …, 2020 - dl.acm.org
With the evolution of threats and attacks and the speed of automation, new modern training
and learning environments are needed to support the challenges of digital organizations …

Have it your way: Generating customized log datasets with a model-driven simulation testbed

M Landauer, F Skopik, M Wurzenberger… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Evaluations of intrusion detection systems (IDS) require log datasets collected in realistic
system environments. Existing testbeds therefore offer user simulations and attack scenarios …

Design considerations for building credible security testbeds: Perspectives from industrial control system use cases

UPD Ani, JM Watson, B Green, B Craggs… - Journal of Cyber …, 2021 - Taylor & Francis
This paper presents a mapping framework for design factors and an implementation process
for building credible Industrial Control Systems (ICS) security testbeds. The security and …

Cyber range automation overview with a case study of CRATE

T Gustafsson, J Almroth - Nordic Conference on Secure IT Systems, 2020 - Springer
Cyber security research is quintessential to secure computerized systems against cyber
threats. Likewise, cyber security training and exercises are instrumental in ensuring that the …

Cyber range infrastructure limitations and needs of tomorrow: A position paper

VE Urias, WMS Stout… - … conference on security …, 2018 - ieeexplore.ieee.org
Cyber networks are extremely non-deterministic, complex systems. To address this, we must
develop foundational research protocols to enable reproducible cyber experiments that can …