Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents

OI Falowo, S Popoola, J Riep, VA Adewopo… - IEEE Access, 2022 - ieeexplore.ieee.org
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …

An Assessment of Capabilities Required for Effective Cybersecurity Incident Management-A Systematic Literature Review

OI Falowo, K Koshoedo, M Ozer - … International Conference on …, 2023 - ieeexplore.ieee.org
Reports from multiple independent sources reveal that a lack of preparation/readiness for
cybersecurity incidents detrimentally affects business continuity and delays the recovery of …

Network Modeling—A Convenient Way to Study IP Networks

I Nedyalkov, G Georgiev - … Technology: ICICT 2022, London, Volume 1, 2022 - Springer
The present paper proposes the use of platforms for modeling of communication networks,
in particular modeling of IP networks. The study of IP networks, by using modeled IP …

Application of IP Network Modeling Platforms for Cyber-Attack Research

I Nedyalkov, G Georgiev - Congress on Intelligent Systems, 2023 - Springer
This work proposes the use of IP network modeling platforms to study cyber-attacks. For the
purpose of this work, the GNS3 platform is proposed to be used due to the range of …

Information systems of virtual laboratories and their development

J Jurc, M Kontšek, M Šterbák - 2021 19th International …, 2021 - ieeexplore.ieee.org
In this publication, the issue of the development of virtual laboratories (VL) is discussed,
where the authors also deal with the division of VL. In the world, virtual laboratories are …