You are currently on the new version of our website. Access the old version .

25 Results Found

  • Article
  • Open Access
10 Citations
2,956 Views
13 Pages

Digital Twin of Food Supply Chain for Cyber Exercises

  • Tuomo Sipola,
  • Tero Kokkonen,
  • Markku Puura,
  • Kalle-Eemeli Riuttanen,
  • Kari Pitkäniemi,
  • Elina Juutilainen and
  • Teemu Kontio

14 June 2023

The food supply chain is a critical part of modern societies. As with other facets of life, it is thoroughly digitalized, and uses network connections. Consequently, the cyber security of the supply chain becomes a major concern as new threats emerge...

  • Article
  • Open Access
9 Citations
5,548 Views
14 Pages

Developing a Cyber Incident Exercises Model to Educate Security Teams

  • Basil Alothman,
  • Aldanah Alhajraf,
  • Reem Alajmi,
  • Rawan Al Farraj,
  • Nourah Alshareef and
  • Murad Khan

Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security defense is crucial. A cyber incident exercise model is a learning technique to provide knowledge about cyber security to enhance a security team’s incid...

  • Article
  • Open Access
3,230 Views
37 Pages

This study introduces a novel approach to cyber defense exercises, emphasizing the emulation of technical tasks to create realistic incident response scenarios. Unlike traditional cyber ranges or tabletop exercises, this method enables both managemen...

  • Feature Paper
  • Article
  • Open Access
6 Citations
8,987 Views
28 Pages

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?

  • Samuel Chapman,
  • Richard Smith,
  • Leandros Maglaras and
  • Helge Janicke

This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exerci...

  • Article
  • Open Access
8 Citations
4,176 Views
37 Pages

Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range

  • Alberto Mozo,
  • Antonio Pastor,
  • Amit Karamchandani,
  • Luis de la Cal,
  • Diego Rivera and
  • Jose Ignacio Moreno

14 October 2022

Cybercrime has become more pervasive and sophisticated over the years. Cyber ranges have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats and attacks. Cyber ranges have evolved to virtual environments that allow va...

  • Article
  • Open Access
355 Views
25 Pages

25 November 2025

Developing flexible, cost-effective, and durable sensors is a key challenge for integrating Cyber–Physical–Human Systems (CPHSs) into smart homes. This paper introduces a flexible pressure sensor array designed for CPHS applications, addr...

  • Article
  • Open Access
2 Citations
3,616 Views
20 Pages

29 September 2024

As cyberattacks become increasingly sophisticated with advancements in information and communication technology, the impact of cyberspace threats is growing in both civilian and defense sectors. The utilization of cyber capabilities in operations is...

  • Article
  • Open Access
80 Citations
12,652 Views
23 Pages

Cyber Ranges and TestBeds for Education, Training, and Research

  • Nestoras Chouliaras,
  • George Kittes,
  • Ioanna Kantzavelou,
  • Leandros Maglaras,
  • Grammati Pantziou and
  • Mohamed Amine Ferrag

18 February 2021

In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting...

  • Article
  • Open Access
4 Citations
8,796 Views
14 Pages

This study aims to compare physical activity levels, esports-specific reaction times, self-evaluated health, and injuries between non-professional esports players (EPs) and non-players (NPs). Participants were healthy, with an average age of 22.7 &pl...

  • Article
  • Open Access
6 Citations
4,233 Views
24 Pages

16 January 2024

Due to the nature of the industrial control systems (ICS) environment, where process continuity is essential, intentionally initiating a cyberattack to check security controls can cause severe financial and human damage to the organization. Therefore...

  • Article
  • Open Access
3 Citations
2,303 Views
15 Pages

9 December 2023

Critical Infrastructure Security Showdown 2021—Online (CISS2021-OL) represented the fifth run of iTrust’s international technology assessment exercise. During this event, researchers and experts from the industry evaluated the performance...

  • Article
  • Open Access
7 Citations
3,718 Views
27 Pages

Cyber5Gym: An Integrated Framework for 5G Cybersecurity Training

  • Muhammad Ali Hamza,
  • Usama Ejaz and
  • Hyun-chul Kim

26 February 2024

The rapid evolution of 5G technology, while offering substantial benefits, concurrently presents complex cybersecurity challenges. Current cybersecurity systems often fall short in addressing challenges such as the lack of realism of the 5G network,...

  • Article
  • Open Access
8 Citations
3,001 Views
22 Pages

15 December 2023

Cyber threats to industrial control systems (ICSs) have increased as information and communications technology (ICT) has been incorporated. In response to these cyber threats, we are implementing a range of security equipment and specialized training...

  • Article
  • Open Access
17 Citations
4,821 Views
23 Pages

13 October 2021

Prior experience from the authors has shown that a heavily theoretical approach for cybersecurity training has multiple shortcomings, mostly due to the demanding and diversified nature of the prerequisites, often involving concepts about operating sy...

  • Article
  • Open Access
328 Views
46 Pages

A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation

  • Evangelos Chaskos,
  • Nicholas Kolokotronis and
  • Stavros Shiaeles

4 January 2026

The evolution towards an Open Radio Access Network (O-RAN) and 6G introduces unprecedented openness and intelligence in mobile networks, alongside significant security challenges. Current cyber-ranges (CRs) are not prepared to address the disaggregat...

  • Article
  • Open Access
7 Citations
3,928 Views
17 Pages

10 July 2020

The advent of the cyber age has created a world in which digital systems, operating on their own and interacting with more conventional material or physical systems, have become an increasingly prominent feature of the landscape of human affairs. Thi...

  • Article
  • Open Access
17 Citations
9,370 Views
26 Pages

Information Security Risk Assessment Using Situational Awareness Frameworks and Application Tools

  • Nungky Awang Chandra,
  • Kalamullah Ramli,
  • Anak Agung Putri Ratna and
  • Teddy Surya Gunawan

17 August 2022

This paper describes the development of situational awareness models and applications to assess cybersecurity risks based on Annex ISO 27001:2013. The risk assessment method used is the direct testing method, namely audit, exercise and penetration te...

  • Article
  • Open Access
2 Citations
1,329 Views
18 Pages

End-users in a decision-oriented Internet of Things (IoT) healthcare system are often left in the dark regarding critical security information necessary for making informed decisions about potential risks. This is partly due to the lack of transparen...

  • Article
  • Open Access
30 Citations
9,319 Views
25 Pages

Design of a Digital Twin Training Centre for an Industrial Robot Arm

  • Timotei István Erdei,
  • Rudolf Krakó and
  • Géza Husi

3 September 2022

The Cyber-Physical and Intelligent Robotics Laboratory has been digitally recreated, and it includes all the key elements that allow 6-axis industrial robots to perform PTP, LIN, and CIRC motions. Furthermore, the user can create a program with these...

  • Article
  • Open Access
1,655 Views
23 Pages

Advanced Network and System Security Teaching

  • Mihajlo Ogrizović,
  • Pavle Vuletić and
  • Žarko Stanisavljević

In an attempt to address the growing shortage of cybersecurity specialists in the country, the School of Electrical Engineering, University of Belgrade, started the course entitled Advanced Network and System Security (ANS) in the 2019/2020 school ye...

  • Article
  • Open Access
1 Citations
3,586 Views
19 Pages

Partial body weight support systems have proven to be a vital tool in performing physical therapy for patients with lower limb disabilities to improve gait. Developing this type of equipment requires rigorous design process that obtains a robust syst...

  • Article
  • Open Access
46 Citations
11,539 Views
17 Pages

E-Commerce Calls for Cyber-Security and Sustainability: How European Citizens Look for a Trusted Online Environment

  • Idiano D’Adamo,
  • Rocío González-Sánchez,
  • Maria Sonia Medina-Salgado and
  • Davide Settembre-Blundo

15 June 2021

The pandemic has changed the citizens’ behavior, inducing them to avoid any real contact. This has given an incredible impulse to e-commerce; however, the complexity of the topic has not yet been adequately explored in the literature. To fill this ga...

  • Article
  • Open Access
2 Citations
2,177 Views
22 Pages

Design of a Cyber-Physical System-of-Systems Architecture for Elderly Care at Home

  • José Galeas,
  • Alberto Tudela,
  • Óscar Pons,
  • Juan Pedro Bandera and
  • Antonio Bandera

21 November 2024

The idea of introducing a robot into an Ambient Assisted Living (AAL) environment to provide additional services beyond those provided by the environment itself has been explored in numerous projects. Moreover, new opportunities can arise from this s...

  • Article
  • Open Access
1,004 Views
17 Pages

The escalating frequency and complexity of cyber threats have made cybersecurity education a national priority, yet a practical gap persists between theoretical instruction and workforce readiness. This study presents a comprehensive, modular framewo...

  • Article
  • Open Access
3 Citations
4,705 Views
23 Pages

Study of a BIM-Based Cyber-Physical System and Intelligent Disaster Prevention System in Taipei Main Station

  • Chao-Hsiu Lin,
  • Ming-Chin Ho,
  • Po-Chuan Hsieh,
  • Yan-Chyuan Shiau and
  • Ming-Ling Yang

23 October 2022

Because of its large area and complicated space utilization, in the event of a disaster, rescue efforts in specific areas of Taipei Main Station would be difficult. In addition, rescue efforts are also difficult to implement, because each area is man...