A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …

Attack projection

SJ Yang, H Du, J Holsopple, M Sudit - Cyber Defense and Situational …, 2014 - Springer
Having dedicated the previous chapter to the second level of SA, we now proceed to the
third level. The highest level of SA—projection—involves envisioning how the current …

CYRAN: A hybrid cyber range for testing security on ICS/SCADA systems

B Hallaq, A Nicholson, R Smith, L Maglaras… - Cyber Security and …, 2018 - igi-global.com
Abstract Cyber Security of ICS/SCADA systems is a major aspect of current research focus.
Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real …

DefAtt-architecture of virtual cyber labs for research and education

RV Mahmoud, E Kidmose, A Turkmen… - … on Cyber Situational …, 2021 - ieeexplore.ieee.org
There is a need for more skilled people in cybersecurity, and initiatives are being taken all
over the world to improve the education of both students and professionals. This includes …

[PDF][PDF] Design and Implementation of A Devs-Based Cyber-Attack Simulator for Cyber Security

S Kara, S Hizal, A Zengin - International Journal of Simulation …, 2022 - ijsimm.com
The necessity of conducting business processes of institutions and individuals with
information technologies has brought risks and threats. Cyber-attacks may lead to hard-to …

Context model fusion for multistage network attack simulation

S Moskal, B Wheeler, D Kreider… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Analyzing and predicting complex network attack strategies require an efficient way to
produce realistic and up-to-date data representing a variety of attack behaviors on diverse …

[HTML][HTML] SpecRep: Adversary Emulation Based on Attack Objective Specification in Heterogeneous Infrastructures

RM Portase, A Colesa, G Sebestyen - Sensors, 2024 - mdpi.com
Cybercriminals have become an imperative threat because they target the most valuable
resource on earth, data. Organizations prepare against cyber attacks by creating Cyber …

Simulating attack behaviors in enterprise networks

S Moskal, D Kreider, L Hays, B Wheeler… - … IEEE Conference on …, 2013 - ieeexplore.ieee.org
Research works on cyber security have shifted from simply hardening the networked
systems to enabling fight-through technologies where the system is resilient to sophisticated …

[图书][B] Introduction to the Cyber Ranges

B Pandey, S Ahmad - 2022 - taylorfrancis.com
Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-
comprehend overview of different aspects involved in the cybersecurity arena. It expands on …