Academic literature on the topic 'Cyber exercises'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber exercises.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber exercises"
Aoyama, Tomomi, Toshihiko Nakano, Ichiro Koshijima, Yoshihiro Hashimoto, and Kenji Watanabe. "On the Complexity of Cybersecurity Exercises Proportional to Preparedness." Journal of Disaster Research 12, no. 5 (2017): 1081–90. http://dx.doi.org/10.20965/jdr.2017.p1081.
Full textRoşu, Livia, and Georgiana Subaşu. "Digital Forensics in Cyber Security Exercises." Journal of Military Technology 1, no. 1 (2018): 13–18. http://dx.doi.org/10.32754/jmt.2018.1.02.
Full textHallaq, Bil, Andrew Nicholson, Richard Smith, et al. "A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems." International Journal of Smart Security Technologies 8, no. 1 (2021): 16–34. http://dx.doi.org/10.4018/ijsst.2021010102.
Full textAbbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.
Full textKarjalainen, Mika, and Tero Kokkonen. "Review of Pedagogical Principles of Cyber Security Exercises." Advances in Science, Technology and Engineering Systems Journal 5, no. 5 (2020): 592–600. http://dx.doi.org/10.25046/aj050572.
Full textConte de Leon, Daniel, Christopher E. Goes, Michael A. Haney, and Axel W. Krings. "ADLES: Specifying, deploying, and sharing hands-on cyber-exercises." Computers & Security 74 (May 2018): 12–40. http://dx.doi.org/10.1016/j.cose.2017.12.007.
Full textOšlejšek, Radek, and Tomáš Pitner. "Optimization of Cyber Defense Exercises Using Balanced Software Development Methodology." International Journal of Information Technologies and Systems Approach 14, no. 1 (2021): 136–55. http://dx.doi.org/10.4018/ijitsa.2021010108.
Full textKuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.
Full textKonstantinou, Charalambos. "Cyber-Physical Systems Security Education Through Hands-on Lab Exercises." IEEE Design & Test 37, no. 6 (2020): 47–55. http://dx.doi.org/10.1109/mdat.2020.3005365.
Full textAndreolini, Mauro, Vincenzo Giuseppe Colacino, Michele Colajanni, and Mirco Marchetti. "A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises." Mobile Networks and Applications 25, no. 1 (2019): 236–47. http://dx.doi.org/10.1007/s11036-019-01442-0.
Full textDissertations / Theses on the topic "Cyber exercises"
Berninger, Matthew L. "Developing standard exercises and statistics to measure the impact of cyber defenses." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42581.
Full textSjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.
Full textAhlin, Katarina, and Sanna Bredin. "European Aviation Crisis Management." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-104012.
Full textSherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.
Full textAhmad, Arniyati. "A cyber exercise post assessment framework : in Malaysia perspectives." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7553/.
Full textGuild, R. James. "Design and analysis of a model reconfigurable cyber-exercise laboratory (RCEL) for information assurance education." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1187.
Full textDe, las Casas Zolezzi Humberto Jose. "Model-Free Optimization of Trajectory and Impedance Parameters on Exercise Robots with Applications to Human Performance and Rehabilitation." Cleveland State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=csu1625490714196286.
Full text柯柏宇. "A Study of Virtual-Machine-Based Cyber Defense Exercises." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7gghfu.
Full textChing-HuangLin and 林敬皇. "Framework Design for Cyber Attack and Defense Exercises with Empirical Cloud Data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58312539008444263933.
Full textBooks on the topic "Cyber exercises"
An Analysis of VPN Solutions and Best Practices for Use in Conjunction With Cyber Attack and Defend Exercises. Storming Media, 2004.
Find full textBook chapters on the topic "Cyber exercises"
Nunes, Eric, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, and Jay Little. "Cyber-Deception and Attribution in Capture-the-Flag Exercises." In Cyber Deception. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32699-3_7.
Full textØstby, Grethe, and Stewart James Kowalski. "Preparing for Cyber Crisis Management Exercises." In Augmented Cognition. Human Cognition and Behavior. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50439-7_19.
Full textSommestad, Teodor, and Jonas Hallberg. "Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments." In Secure IT Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34210-3_4.
Full textMaennel, Kaie, Rain Ottis, and Olaf Maennel. "Improving and Measuring Learning Effectiveness at Cyber Defense Exercises." In Secure IT Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2_8.
Full textSiaterlis, Christos, Andres Perez-Garcia, and Marcelo Masera. "Using an Emulation Testbed for Operational Cyber Security Exercises." In Critical Infrastructure Protection V. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24864-1_13.
Full textReed, Theodore, Kevin Nauer, and Austin Silva. "Instrumenting Competition-Based Exercises to Evaluate Cyber Defender Situation Awareness." In Foundations of Augmented Cognition. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39454-6_9.
Full textSitnikova, Elena, Ernest Foo, and Rayford B. Vaughn. "The Power of Hands-On Exercises in SCADA Cyber Security Education." In Information Assurance and Security Education and Training. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39377-8_9.
Full textGustafsson, Tommy, and Jonas Almroth. "Cyber Range Automation Overview with a Case Study of CRATE." In Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70852-8_12.
Full textAngafor, Giddeon N., Iryna Yevseyeva, and Ying He. "Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis." In Serious Games. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61814-8_10.
Full textKokkonen, Tero, and Samir Puuska. "Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01168-0_26.
Full textConference papers on the topic "Cyber exercises"
Dodge, Ronald, Brian Hay, and Kara Nance. "Standards-Based Cyber Exercises." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.72.
Full textWahsheh, Luay A., and Biruk Mekonnen. "Practical Cyber Security Training Exercises." In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2019. http://dx.doi.org/10.1109/csci49370.2019.00015.
Full text"Information Sharing in Cyber Defence Exercises." In The 19th European Conference on Cyber Warfare. ACPI, 2020. http://dx.doi.org/10.34190/ews.20.034.
Full textKarjalainen, Mika, Tero Kokkonen, and Samir Puuska. "Pedagogical Aspects of Cyber Security Exercises." In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2019. http://dx.doi.org/10.1109/eurospw.2019.00018.
Full textHenshel, Diane S., Gary M. Deckard, Brad Lufkin, et al. "Predicting proficiency in cyber defense team exercises." In MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM). IEEE, 2016. http://dx.doi.org/10.1109/milcom.2016.7795423.
Full textConklin, A., and G. B. White. "e-Government and Cyber Security: The Role of Cyber Security Exercises." In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06). IEEE, 2006. http://dx.doi.org/10.1109/hicss.2006.133.
Full textJavali, Chitra, and Girish Revadigar. "Network Web Traffic Generator for Cyber Range Exercises." In 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, 2019. http://dx.doi.org/10.1109/lcn44214.2019.8990880.
Full textFurtuna, Adrian, Victor-Valeriu Patriciu, and Ion Bica. "A structured approach for implementing cyber security exercises." In 2010 8th International Conference on Communications (COMM). IEEE, 2010. http://dx.doi.org/10.1109/iccomm.2010.5509123.
Full textGurnani, Rahul, Kaushik Pandey, and Shashi Kant Rai. "A scalable model for implementing Cyber Security Exercises." In 2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2014. http://dx.doi.org/10.1109/indiacom.2014.6828048.
Full textSeker, Ensar, and Hasan Huseyin Ozbenli. "The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation." In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2018. http://dx.doi.org/10.1109/cybersecpods.2018.8560673.
Full textReports on the topic "Cyber exercises"
Glumich, Sonja. Cyber Fundamental Exercises. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada582472.
Full textFulp, J. D. The Bastion Network Project: A Framework for Conducting Interscholastic Cyber-Exercises. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada435318.
Full textCarbajal, Armida J., Susan Marie Stevens-Adams, Austin Ray Silva, Kevin S. Nauer, Benjamin Robert Anderson, and James Chris Forsythe. Enhanced Training for Cyber Situational Awareness in Red versus Blue Team Exercises. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1325560.
Full textHwang, Nicholas J., and Kevin B. Bush. Operational Exercise Integration Recommendations for DoD Cyber Ranges. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada623114.
Full textFranklin, David M. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada525274.
Full text