scholarly journals Evaluation of Vulnerability Reproducibility in Container-based Cyber Range

Author(s):  
Ryotaro Nakata ◽  
Akira Otsuka
Keyword(s):  
Author(s):  
Yi-Hsien Chen ◽  
Yen-Da Lin ◽  
Chung-Kuan Chen ◽  
Chin-Laung Lei ◽  
Chun-Ying Huang
Keyword(s):  

2021 ◽  
Author(s):  
Georgios Potamos ◽  
Adamantini Peratikou ◽  
Stavros Stavrou

Author(s):  
Adamantini Peratikou ◽  
Constantinos Louca ◽  
Stavros Shiaeles ◽  
Stavros Stavrou

Author(s):  
Georgios Pappas ◽  
Adamantini Peratikou ◽  
Joshua Siegel ◽  
Konstantinos Politopoulos ◽  
Christopher Christodoulides ◽  
...  
Keyword(s):  

Author(s):  
Bil Hallaq ◽  
Andrew Nicholson ◽  
Richard Smith ◽  
Leandros Maglaras ◽  
Helge Janicke ◽  
...  

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is detailed documentation of the decision process and the potential difficulties that need to be considered when undertaking the creation of a Cyber Range (CR) in order to facilitate the capture of labelled datasets which is included in this paper. This paper makes several further contributions; a review of Cyber Ranges created by Academic Institutions that influenced the criteria in creating CYRAN, the De Montfort University CYber RANge. The article presents the design implementation, the process of creating effective rules of engagement, the management and running of a Cyber Range Event (CRE) with partners from Industry and Academia and the creation of labelled datasets.


Author(s):  
Mariano Albaladejo-González ◽  
Sofia Strukova ◽  
José A. Ruipérez-Valiente ◽  
Félix l Gómez Mármol
Keyword(s):  

Author(s):  
Antonio Roque ◽  
Douglas Stetson ◽  
Daniel J Hannon

We present a conceptual foundation and empirical framework for modeling cognitive complexity in cyber range event operating environments. Definitions of key concepts, such as cognitive complexity, task difficulty, and Blue Team cognitive workload, are informed by the literature of human factor engineering. This is followed by an approach to assessing cognitive complexity as experienced by a Blue Team in a given cyber range event operating environment, and a validation of that assessment method.


2019 ◽  
Vol 25 (1) ◽  
pp. 236-247 ◽  
Author(s):  
Mauro Andreolini ◽  
Vincenzo Giuseppe Colacino ◽  
Michele Colajanni ◽  
Mirco Marchetti
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document