Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models
暂无分享,去创建一个
George Spanoudakis | George Hatzivasilis | Konstantinos Fysarakis | Michail Smyrlis | G. Spanoudakis | George Hatzivasilis | Konstantinos Fysarakis | Michail Smyrlis
[1] Kristian Beckers,et al. PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks , 2019, IOSec/MSTEC/FINSEC@ESORICS.
[2] Alessandro Armando,et al. Scenario Design and Validation for Next Generation Cyber Ranges , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[3] Charalampos Manifavas,et al. How Effective Is Your Security Awareness Program? An Evaluation Methodology , 2012, Inf. Secur. J. A Glob. Perspect..
[4] George Spanoudakis,et al. Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective , 2019, IOSec/MSTEC/FINSEC@ESORICS.
[5] George Bravos,et al. The THREAT-ARREST Cyber-Security Training Platform , 2019, IOSec/MSTEC/FINSEC@ESORICS.
[6] Gencer Erdogan,et al. An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models , 2020, ICSOFT.
[7] Vasileios Gkioulos,et al. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture , 2020, Comput. Secur..
[8] Elvinia Riccobene,et al. A Model Driven Approach for Cyber Security Scenarios Deployment , 2019, IOSec/MSTEC/FINSEC@ESORICS.
[9] Sebastian Pape,et al. Social engineering defence mechanisms and counteracting training strategies , 2017, Inf. Comput. Secur..