Cyber ranges and security testbeds: Scenarios, functions, tools and architecture

MM Yamin, B Katt, V Gkioulos - Computers & Security, 2020 - Elsevier
The first line of defense against cyber threats and cyber crimes is to be aware and get ready,
eg, through cyber security training. Training can have two forms, the first is directed towards …

A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

[HTML][HTML] Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises

M Glas, G Messmann, G Pernul - Computers & Security, 2024 - Elsevier
The global shortage of cybersecurity professionals poses a daunting challenge for
organizations seeking to protect their assets and data. To counteract this workforce …

A framework for the evaluation of trainee performance in cyber range exercises

M Andreolini, VG Colacino, M Colajanni… - Mobile Networks and …, 2020 - Springer
This paper proposes a novel approach for the evaluation of the performance achieved by
trainees involved in cyber security exercises implemented in modern cyber ranges. Our …

Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises

K Maennel - 2020 IEEE European symposium on security and …, 2020 - ieeexplore.ieee.org
Cybersecurity exercises are gaining in popularity in university curricula and professional
training paths and are seen as an effective teaching method. Such exercises provide digital …

Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack

F Giannakas, C Troussas, A Krouska… - … Security Journal: A …, 2023 - Taylor & Francis
Nowadays, due to the increasing number of cyberattacks, cybersecurity education, training,
and awareness are considered crucial for preparing current and future IT professionals …

Chat-GPT based learning platform for creation of different attack model signatures and development of defense algorithm for cyberattack detection

TM Santhi, K Srinivasan - IEEE Transactions on Learning …, 2024 - ieeexplore.ieee.org
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and
finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased …

Nasimemu: Network attack simulator & emulator for training agents generalizing to novel scenarios

J Janisch, T Pevný, V Lisý - … Symposium on Research in Computer Security, 2023 - Springer
Current frameworks for training offensive penetration testing agents with deep reinforcement
learning struggle to produce agents that perform well in real-world scenarios, due to the …

Cyber range for research-inspired learning of “attack defense by pretense” principle and practice

KB Vekaria, P Calyam, S Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
There is an increasing trend in cloud adoption of enterprise applications in, for example,
manufacturing, healthcare, and finance. Such applications are routinely subject to targeted …

ICSTASY: an integrated cybersecurity training system for military personnel

D Lee, D Kim, C Lee, MK Ahn, W Lee - IEEE Access, 2022 - ieeexplore.ieee.org
Cyberwarfare can occur at any moment, anywhere on the planet, and it happens more often
than we realize. The new form of warfare is wreaking havoc on not only the military but also …