Skip to Content

431 Results Found

  • Article
  • Open Access
2 Citations
3,787 Views
20 Pages

29 September 2024

As cyberattacks become increasingly sophisticated with advancements in information and communication technology, the impact of cyberspace threats is growing in both civilian and defense sectors. The utilization of cyber capabilities in operations is...

  • Article
  • Open Access
17 Citations
5,479 Views
18 Pages

Design and Implementation of Multi-Cyber Range for Cyber Training and Testing

  • Moosung Park,
  • Hyunjin Lee,
  • Yonghyun Kim,
  • Kookjin Kim and
  • Dongkyoo Shin

7 December 2022

It is essential to build a practical environment of the training/test site for cyber training and weapon system test evaluation. In a military environment, cyber training sites should be continuously developed according to the characteristics of the...

  • Article
  • Open Access
63 Citations
14,768 Views
26 Pages

Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees

  • George Hatzivasilis,
  • Sotiris Ioannidis,
  • Michail Smyrlis,
  • George Spanoudakis,
  • Fulvio Frati,
  • Ludger Goeke,
  • Torsten Hildebrandt,
  • George Tsakirakis,
  • Fotis Oikonomou and
  • Hristo Koshutanski
  • + 1 author

17 August 2020

Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures. This is due to security breaches on popular servic...

  • Article
  • Open Access
6 Citations
2,054 Views
17 Pages

AT4CTIRE: Adversarial Training for Cyber Threat Intelligence Relation Extraction

  • Yue Han,
  • Rong Jiang,
  • Changjian Li,
  • Yanyi Huang,
  • Kai Chen,
  • Han Yu,
  • Aiping Li,
  • Weihong Han,
  • Shengnan Pang and
  • Xuechen Zhao

Cyber Threat Intelligence (CTI) plays a crucial role in cybersecurity. However, traditional information extraction has low accuracy due to the specialization of CTI and the concealment of relations. To improve the performance of CTI relation extracti...

  • Review
  • Open Access
158 Citations
34,098 Views
16 Pages

The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals t...

  • Article
  • Open Access
83 Citations
12,925 Views
23 Pages

Cyber Ranges and TestBeds for Education, Training, and Research

  • Nestoras Chouliaras,
  • George Kittes,
  • Ioanna Kantzavelou,
  • Leandros Maglaras,
  • Grammati Pantziou and
  • Mohamed Amine Ferrag

18 February 2021

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting...

  • Article
  • Open Access
7 Citations
3,803 Views
27 Pages

Cyber5Gym: An Integrated Framework for 5G Cybersecurity Training

  • Muhammad Ali Hamza,
  • Usama Ejaz and
  • Hyun-chul Kim

26 February 2024

The rapid evolution of 5G technology, while offering substantial benefits, concurrently presents complex cybersecurity challenges. Current cybersecurity systems often fall short in addressing challenges such as the lack of realism of the 5G network,...

  • Article
  • Open Access
10 Citations
3,864 Views
25 Pages

An Integrated Testbed for Power System Cyber-Physical Operations Training

  • Manohar Chamana,
  • Rabindra Bhatta,
  • Konrad Schmitt,
  • Rajendra Shrestha and
  • Stephen Bayne

21 August 2023

The increased adoption of information and communication technology for smart grid applications will require innovative cyber–physical system (CPS) testbeds to support research and education in the field. Groundbreaking CPS testbeds with realist...

  • Article
  • Open Access
21 Citations
4,897 Views
22 Pages

24 November 2022

Occupational safety and health (OSH) should be regarded as a crucial challenge that affects the public world widely. Work-related accidents and occupational illness contribute to considerable mortality and morbidity. As technology advances, mixed rea...

  • Review
  • Open Access
102 Citations
15,850 Views
35 Pages

A Review of Cyber-Ranges and Test-Beds: Current and Future Trends

  • Elochukwu Ukwandu,
  • Mohamed Amine Ben Farah,
  • Hanan Hindy,
  • David Brosset,
  • Dimitris Kavallieros,
  • Robert Atkinson,
  • Christos Tachtatzis,
  • Miroslav Bures,
  • Ivan Andonovic and
  • Xavier Bellekens

13 December 2020

Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established p...

  • Systematic Review
  • Open Access
2 Citations
3,220 Views
36 Pages

A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy

  • Pilleriin Lillemets,
  • Nabaa Bashir Jawad,
  • Joseph Kashi,
  • Ahmad Sabah and
  • Nicola Dragoni

Cyber ranges have become essential platforms for realistic cybersecurity training, research, and development. Existing taxonomies often describe the functional aspects of cyber ranges—scenario design, team configurations, and evaluation metrics...

  • Article
  • Open Access
18 Citations
6,362 Views
28 Pages

CYRA: A Model-Driven CYber Range Assurance Platform

  • Michail Smyrlis,
  • Iason Somarakis,
  • George Spanoudakis,
  • George Hatzivasilis and
  • Sotiris Ioannidis

2 June 2021

Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet of Things. However, mainstream and sophisticated attacks are remaining a threat, both for i...

  • Article
  • Open Access
17 Citations
4,913 Views
23 Pages

13 October 2021

Prior experience from the authors has shown that a heavily theoretical approach for cybersecurity training has multiple shortcomings, mostly due to the demanding and diversified nature of the prerequisites, often involving concepts about operating sy...

  • Article
  • Open Access
23 Citations
6,456 Views
18 Pages

K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph

  • Zong-Xun Li,
  • Yu-Jun Li,
  • Yi-Wei Liu,
  • Cheng Liu and
  • Nan-Xin Zhou

25 January 2023

Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present. Researchers have p...

  • Article
  • Open Access
1 Citations
3,468 Views
37 Pages

This study introduces a novel approach to cyber defense exercises, emphasizing the emulation of technical tasks to create realistic incident response scenarios. Unlike traditional cyber ranges or tabletop exercises, this method enables both managemen...

  • Article
  • Open Access
19 Citations
4,887 Views
18 Pages

Failure Mode and Effect Analysis for Cyber-Physical Systems

  • João Oliveira,
  • Gonçalo Carvalho,
  • Bruno Cabral and
  • Jorge Bernardino

20 November 2020

Cyber-Physical Systems (CPS) are a prominent component of the modern digital transformation, which combines the dynamics of the physical processes with those of software and networks. Critical infrastructures have built-in CPS, and assessing its risk...

  • Article
  • Open Access
6 Citations
4,533 Views
27 Pages

11 April 2025

As today’s cybersecurity environment is becoming increasingly complex, it is crucial to analyse threats quickly and effectively. A delayed response or lack of foresight can lead to data loss, reputational damage, and operational disruptions. Th...

  • Article
  • Open Access
13 Citations
3,611 Views
10 Pages

Impact of Digital Contexts in the Training of University Education Students

  • Violeta Cebrián-Robles,
  • Francisco José Ruíz-Rey,
  • Manuela Raposo-Rivas and
  • Manuel Cebrián-de-la-Serna

11 September 2023

The Internet is an important source of information and is a real ecosystem for learning that has provided important advances in education, although it has also generated problems, especially in terms of data security, identity theft, and cyber-plagia...

  • Systematic Review
  • Open Access
205 Citations
41,759 Views
25 Pages

Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review

  • Sokratis Nifakos,
  • Krishna Chandramouli,
  • Charoula Konstantina Nikolaou,
  • Panagiotis Papachristou,
  • Sabine Koch,
  • Emmanouil Panaousis and
  • Stefano Bonacina

28 July 2021

Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and Wa...

  • Article
  • Open Access
218 Citations
30,677 Views
44 Pages

Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways

  • Paula Fraga-Lamas,
  • Tiago M. Fernández-Caramés and
  • Luis Castedo

21 June 2017

Nowadays, the railway industry is in a position where it is able to exploit the opportunities created by the IIoT (Industrial Internet of Things) and enabling communication technologies under the paradigm of Internet of Trains. This review details th...

  • Article
  • Open Access
2 Citations
2,010 Views
15 Pages

Is Social Training Delivered with a Head-Mounted Display Suitable for Patients with Hereditary Ataxia?

  • Giorgia Malerba,
  • Silvia Bellazzecca,
  • Cosimo Urgesi,
  • Niccolò Butti,
  • Maria Grazia D’Angelo,
  • Eleonora Diella and
  • Emilia Biffi

Social cognition is fundamental in everyday life to understand “others’ behavior”, which is a key feature of social abilities. Previous studies demonstrated the efficacy of a rehabilitative intervention in semi-immersive virtual rea...

  • Article
  • Open Access
7 Citations
3,608 Views
26 Pages

May the Source Be with You: On ChatGPT, Cybersecurity, and Secure Coding

  • Tiago Espinha Gasiba,
  • Andrei-Cristian Iosif,
  • Ibrahim Kessba,
  • Sathwik Amburi,
  • Ulrike Lechner and
  • Maria Pinto-Albuquerque

18 September 2024

Software security is an important topic that is gaining more and more attention due to the rising number of publicly known cybersecurity incidents. Previous research has shown that one way to address software security is by means of a serious game, t...

  • Article
  • Open Access
3 Citations
2,744 Views
15 Pages

An Improved Method for Online Teacher Training Courses for Bilingual Education Based on Cyber-Physical Systems

  • Ting-Hsuan Chien,
  • Yi-Lin Chen,
  • Jain-Shing Wu,
  • Cheng-Yan Siao,
  • Li-Ren Chien and
  • Rong-Guey Chang

23 February 2022

In recent years, bilingual education has become a critical index, and with its growth, internationalization has been significantly improved in the Republic of China (Taiwan). Therefore, countries worldwide are promoting all-English teaching, taking E...

  • Article
  • Open Access
368 Views
18 Pages

Modeling a 6 MV FFF Beam from the CyberKnife M6 to Produce Data for Training Artificial Neural Networks

  • Justyna Rostocka,
  • Joanna Prażmowska,
  • Adam Konefał,
  • Agnieszka Kapłon,
  • Andrzej Orlef and
  • Maria Sokół

18 December 2025

A Monte Carlo-based model of the CyberKnife M6 6 MV Flattening Filter-Free (FFF) beam was developed to produce the data that can be used to train artificial neural networks. The data include the energy spectra of the beam, its average energy, the spa...

  • Article
  • Open Access
22 Citations
8,875 Views
25 Pages

Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers

  • Sander Zeijlemaker,
  • Etiënne A. J. A. Rouwette,
  • Giovanni Cunico,
  • Stefano Armenia and
  • Michael von Kutzschenbach

14 April 2022

Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a complex environment. Given that it is hard for researchers to observe organisations’ decision-making processes driving cyber-security strategy, we d...

  • Article
  • Open Access
5 Citations
1,928 Views
25 Pages

4 July 2025

As industries become increasingly dependent on cyber-physical systems (CPSs), failures within these systems can cause significant operational disruptions, underscoring the critical need for effective Prognostics and Health Management (PHM). The large...

  • Article
  • Open Access
6 Citations
2,110 Views
25 Pages

19 February 2025

The rapid proliferation of ransomware variants necessitates more effective detection mechanisms, as traditional signature-based methods are increasingly inadequate. These conventional methods rely on manual feature extraction and matching, which are...

  • Article
  • Open Access
3 Citations
2,458 Views
16 Pages

A Cyber–Physical Production System for the Integrated Operation and Monitoring of a Continuous Manufacturing Train for the Production of Monoclonal Antibodies

  • Garima Thakur,
  • Saxena Nikita,
  • Vinesh Balakrishnan Yezhuvath,
  • Venkata Sudheendra Buddhiraju and
  • Anurag S. Rathore

The continuous manufacturing of biologics offers significant advantages in terms of reducing manufacturing costs and increasing capacity, but it is not yet widely implemented by the industry due to major challenges in the automation, scheduling, proc...

  • Article
  • Open Access
5 Citations
3,255 Views
20 Pages

The use of virtual reality (VR) for flight simulation, particularly in the earliest stages of pilot training, is gaining attention in both research and industry. The use of the technology for this ab initio training requires suitable consideration of...

  • Article
  • Open Access
1 Citations
2,234 Views
18 Pages

Design and Implementation of an Immersive Web-Based Digital Twin Steam Turbine System for Industrial Training

  • Zhe Li,
  • Hui Xiao,
  • Bo Wang,
  • Xuzhu Dong,
  • Lianteng Shen,
  • Xiaomeng Di and
  • Xiaodong Du

11 December 2024

The steam turbine and its digital electro-hydraulic (DEH) control system constitute vital elements within thermal power generation. However, the complexity of the on-site environment and the high production costs of the equipment hinder users, especi...

  • Article
  • Open Access
594 Views
22 Pages

5 November 2025

Foster carers are a hard-to-reach population who carry a vast bureaucratic and emotional load. They need tailored and specialised training, support, and advice regarding the digital lives of the children and young people (CYP) they care for. Looked-a...

  • Review
  • Open Access
3 Citations
3,691 Views
26 Pages

A Survey on Immersive Cyber Situational Awareness Systems

  • Hussain Ahmad,
  • Faheem Ullah and
  • Rehan Jafri

Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data occlusion and convolution issues due to the burgeoning complexity, dimen...

  • Article
  • Open Access
4 Citations
2,239 Views
20 Pages

28 October 2022

Smart factories are complex; with the increased complexity of employed cyber-physical systems, the complexity evolves further. Cyber-physical systems produce high amounts of data that are hard to capture and challenging to analyze. Real-time recordin...

  • Article
  • Open Access
10 Citations
5,624 Views
14 Pages

Developing a Cyber Incident Exercises Model to Educate Security Teams

  • Basil Alothman,
  • Aldanah Alhajraf,
  • Reem Alajmi,
  • Rawan Al Farraj,
  • Nourah Alshareef and
  • Murad Khan

Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incid...

  • Article
  • Open Access
8 Citations
3,100 Views
22 Pages

15 December 2023

Cyber threats to industrial control systems (ICSs) have increased as information and communications technology (ICT) has been incorporated. In response to these cyber threats, we are implementing a range of security equipment and specialized training...

  • Article
  • Open Access
10 Citations
3,044 Views
13 Pages

Digital Twin of Food Supply Chain for Cyber Exercises

  • Tuomo Sipola,
  • Tero Kokkonen,
  • Markku Puura,
  • Kalle-Eemeli Riuttanen,
  • Kari Pitkäniemi,
  • Elina Juutilainen and
  • Teemu Kontio

14 June 2023

The food supply chain is a critical part of modern societies. As with other facets of life, it is thoroughly digitalized, and uses network connections. Consequently, the cyber security of the supply chain becomes a major concern as new threats emerge...

  • Article
  • Open Access
22 Citations
6,211 Views
16 Pages

Defining a Cyber Resilience Investment Strategy in an Industrial Internet of Things Context

  • Juan Francisco Carías,
  • Leire Labaka,
  • José María Sarriegi and
  • Josune Hernantes

3 January 2019

The fourth industrial revolution has brought several risks to factories along with its plethora of benefits. The convergence of new technologies, legacy technologies, information technologies and operational technologies in the same network generates...

  • Article
  • Open Access
3 Citations
2,943 Views
15 Pages

Performance Analysis of Embedded Multilayer Perceptron Artificial Neural Networks on Smart Cyber-Physical Systems for IoT Environments

  • Mayra A. Torres-Hernández,
  • Miguel H. Escobedo-Barajas,
  • Héctor A. Guerrero-Osuna,
  • Teodoro Ibarra-Pérez,
  • Luis O. Solís-Sánchez and
  • Ma del R. Martínez-Blanco

4 August 2023

At present, modern society is experiencing a significant transformation. Thanks to the digitization of society and manufacturing, mainly because of a combination of technologies, such as the Internet of Things, cloud computing, machine learning, smar...

  • Article
  • Open Access
60 Citations
9,179 Views
19 Pages

15 August 2021

Smart grids integrate advanced information and communication technologies (ICTs) into traditional power grids for more efficient and resilient power delivery and management, but also introduce new security vulnerabilities that can be exploited by adv...

  • Article
  • Open Access
15 Citations
15,276 Views
14 Pages

Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security

  • Ricardo A. Calix,
  • Sumendra B. Singh,
  • Tingyu Chen,
  • Dingkai Zhang and
  • Michael Tu

11 February 2020

The cyber security toolkit, CyberSecTK, is a simple Python library for preprocessing and feature extraction of cyber-security-related data. As the digital universe expands, more and more data need to be processed using automated approaches. In recent...

  • Article
  • Open Access
25 Citations
13,869 Views
27 Pages

Perspectives on Cyber Security for Offshore Oil and Gas Assets

  • Iosif Progoulakis,
  • Nikitas Nikitakos,
  • Paul Rohmeyer,
  • Barry Bunin,
  • Dimitrios Dalaklis and
  • Stavros Karamperidis

In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operationa...

  • Article
  • Open Access
16 Citations
5,731 Views
24 Pages

Security is crucial in cyber-physical systems (CPS). As a typical CPS, the communication-based train control (CBTC) system is facing increasingly serious cyber-attacks. Intrusion detection systems (IDSs) are vital to protect the system against cyber-...

  • Article
  • Open Access
2 Citations
2,777 Views
19 Pages

Towards Diagnosing and Mitigating Behavioral Cyber Risks

  • Carlo Pugnetti,
  • Albena Björck,
  • Reto Schönauer and
  • Carlos Casián

19 July 2024

A company’s cyber defenses are based on a secure infrastructure and risk-aware behavior by employees. With rising cyber threats and normative training efforts showing limited impact, raising cyber risk awareness is emerging as a challenging eff...

  • Article
  • Open Access
7 Citations
3,599 Views
17 Pages

Cyber-Resilience Evaluation Methods Focusing on Response Time to Cyber Infringement

  • Se-Ho Choi,
  • Jaepil Youn,
  • Kookjin Kim,
  • Seongkee Lee,
  • Oh-Jin Kwon and
  • Dongkyoo Shin

7 September 2023

Though multilevel, in-depth information protection systems are employed to defend against unknown cyber threats, vulnerabilities in these systems are frequently exploited by cyberattacks. As a result, it becomes challenging to comprehensively counter...

  • Article
  • Open Access
3 Citations
3,369 Views
24 Pages

Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis

  • Iosif Progoulakis,
  • Ioannis K. Dagkinis,
  • Anastasia Dimakopoulou,
  • Theodoros Lilas,
  • Nikitas Nikitakos and
  • Panagiotis M. Psomas

4 October 2024

The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity. Th...

  • Article
  • Open Access
3 Citations
4,267 Views
26 Pages

Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness

  • Roumen Daton Medenou Choumanof,
  • Salvador Llopis Sanchez,
  • Victor Manuel Calzado Mayo,
  • Miriam Garcia Balufo,
  • Miguel Páramo Castrillo,
  • Francisco José González Garrido,
  • Alvaro Luis Martinez,
  • David Nevado Catalán,
  • Ao Hu and
  • Jorge Maestre Vidal
  • + 6 authors

7 July 2022

The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making...

  • Article
  • Open Access
1 Citations
2,559 Views
30 Pages

19 September 2022

Automatic Machine Learning (AML) methods are currently considered of great interest for use in the development of cyber-physical systems. However, in practice, they present serious application problems with respect to fitness computation, overfitting...

  • Article
  • Open Access
2 Citations
2,001 Views
17 Pages

7 September 2023

Virtual coupling systems are important for improving the safety and efficiency of heavy-haul trains by coordinating the velocities of heavy-haul trains. However, the set point change of reference velocity leads to unsafe train operation. To address t...

  • Article
  • Open Access
241 Citations
18,419 Views
17 Pages

MQTTset, a New Dataset for Machine Learning Techniques on MQTT

  • Ivan Vaccari,
  • Giovanni Chiola,
  • Maurizio Aiello,
  • Maurizio Mongelli and
  • Enrico Cambiaso

18 November 2020

IoT networks are increasingly popular nowadays to monitor critical environments of different nature, significantly increasing the amount of data exchanged. Due to the huge number of connected IoT devices, security of such networks and devices is ther...

of 9