Scenario Design and Validation for Next Generation Cyber Ranges
暂无分享,去创建一个
[1] Suku Nair,et al. A Predictive Framework for Cyber Security Analytics using Attack Graphs , 2015, ArXiv.
[2] Bertram Ludäscher,et al. Declarative Datalog Debugging for Mere Mortals , 2012, Datalog.
[3] Letizia Tanca,et al. What you Always Wanted to Know About Datalog (And Never Dared to Ask) , 1989, IEEE Trans. Knowl. Data Eng..
[4] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[5] Jan Vykopal,et al. Lessons learned from complex hands-on defence exercises in a cyber range , 2017, 2017 IEEE Frontiers in Education Conference (FIE).
[6] Thomas Shaw,et al. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events , 2017, ASE @ USENIX Security Symposium.
[7] Kashif Kifayat,et al. Cyber Security Teaching and Learning Laboratories: A Survey , 2016 .
[8] Yasuo Tan,et al. Cybersecurity Education and Training Support System: CyRIS , 2018, IEICE Trans. Inf. Syst..
[9] Elisabetta Di Nitto,et al. DevOps: Introducing Infrastructure-as-Code , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[10] Jens Mache,et al. Teaching Cybersecurity Analysis Skills in the Cloud , 2015, SIGCSE.
[11] Jan Vykopal,et al. KYPO Cyber Range: Design and Use Cases , 2017, ICSOFT.
[12] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .