Academic literature on the topic 'Cyber exercises'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber exercises.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber exercises"

1

Aoyama, Tomomi, Toshihiko Nakano, Ichiro Koshijima, Yoshihiro Hashimoto, and Kenji Watanabe. "On the Complexity of Cybersecurity Exercises Proportional to Preparedness." Journal of Disaster Research 12, no. 5 (2017): 1081–90. http://dx.doi.org/10.20965/jdr.2017.p1081.

Full text
Abstract:
The purpose of this study is to illustrate how exercises can play the role of a driving power to improve an organization’s cyber security preparedness. The degree of cyber security preparedness varies significantly among organizations. This implies that training and exercises must be tailored to specific capabilities. In this paper, we review the National Institute of Standards and Technology (NIST) cybersecurity framework that formalizes the concept of tier, which measures the degree of preparedness. Subsequently, we examine the types of exercises available in the literature and propose guide
APA, Harvard, Vancouver, ISO, and other styles
2

Roşu, Livia, and Georgiana Subaşu. "Digital Forensics in Cyber Security Exercises." Journal of Military Technology 1, no. 1 (2018): 13–18. http://dx.doi.org/10.32754/jmt.2018.1.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hallaq, Bil, Andrew Nicholson, Richard Smith, et al. "A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems." International Journal of Smart Security Technologies 8, no. 1 (2021): 16–34. http://dx.doi.org/10.4018/ijsst.2021010102.

Full text
Abstract:
Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop concrete guidance, procedures, and tools to help individuals collectively react in different, unpredictable situations. Experiential learning is a training technique based on the assumed importance of experimenting and involvement, proposing that active engagement in a scenario develops personal experiences that form the basis of understanding. Exerc
APA, Harvard, Vancouver, ISO, and other styles
4

Abbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karjalainen, Mika, and Tero Kokkonen. "Review of Pedagogical Principles of Cyber Security Exercises." Advances in Science, Technology and Engineering Systems Journal 5, no. 5 (2020): 592–600. http://dx.doi.org/10.25046/aj050572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conte de Leon, Daniel, Christopher E. Goes, Michael A. Haney, and Axel W. Krings. "ADLES: Specifying, deploying, and sharing hands-on cyber-exercises." Computers & Security 74 (May 2018): 12–40. http://dx.doi.org/10.1016/j.cose.2017.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ošlejšek, Radek, and Tomáš Pitner. "Optimization of Cyber Defense Exercises Using Balanced Software Development Methodology." International Journal of Information Technologies and Systems Approach 14, no. 1 (2021): 136–55. http://dx.doi.org/10.4018/ijitsa.2021010108.

Full text
Abstract:
Cyber defense exercises (CDXs) represent an effective way to train cybersecurity experts. However, their development is lengthy and expensive. The reason lies in current practice where the CDX life cycle is not sufficiently mapped and formalized, and then exercises are developed ad-hoc. However, the CDX development shares many aspects with software development, especially with ERP systems. This paper presents a generic CDX development method that has been derived from existing CDX life cycles using the SPEM standard meta-model. The analysis of the method revealed bottlenecks in the CDX develop
APA, Harvard, Vancouver, ISO, and other styles
8

Kuusisto, Tuija, and Rauno Kuusisto. "Strategic Communication for Supporting Cyber-Security." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 72–79. http://dx.doi.org/10.4018/ijcwt.2013070105.

Full text
Abstract:
The purpose of this paper is to outline a methodology for figuring out what types of information shall be shared via strategic level communication to support cyber-security. With this methodology the key development issues required to create relevant strategic messages can be sorted out. The paper follows the system modeling approach and considers the cyber world as a complex adaptive system. First, the paper studies shortly the key concepts of the cyber world and strategic communication. A social system model of a society is applied as an approach for the identifying of emergent phenomena and
APA, Harvard, Vancouver, ISO, and other styles
9

Konstantinou, Charalambos. "Cyber-Physical Systems Security Education Through Hands-on Lab Exercises." IEEE Design & Test 37, no. 6 (2020): 47–55. http://dx.doi.org/10.1109/mdat.2020.3005365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Andreolini, Mauro, Vincenzo Giuseppe Colacino, Michele Colajanni, and Mirco Marchetti. "A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises." Mobile Networks and Applications 25, no. 1 (2019): 236–47. http://dx.doi.org/10.1007/s11036-019-01442-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber exercises"

1

Berninger, Matthew L. "Developing standard exercises and statistics to measure the impact of cyber defenses." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42581.

Full text
Abstract:
CHDS State/Local<br>As companies seek protection from cyber attacks, justifying proper levels of investment in cyber security is essential. Like all investments, cyber defense costs must be weighed against their expected benefits. While some cyber investment models exist that can relate costs and benefits, these models are largely untested with experimental data. This research develops an experimental framework and statistics for testing and measuring the efficacy of cyber mitigation methods, such that they can be integrated into existing cyber investment models. This work surveys cyber securi
APA, Harvard, Vancouver, ISO, and other styles
2

Sjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.

Full text
Abstract:
In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies,  training of personnel etc., is imperative. Cyber ranges can provide ''safe environments'' in which for example cyber security exercises and experiments can be conducted. While easier to deploy and configure than ''real'' infrastructures, monitoring of such environments during ongoing exercises/experiments poses a number of chal
APA, Harvard, Vancouver, ISO, and other styles
3

Ahlin, Katarina, and Sanna Bredin. "European Aviation Crisis Management." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-104012.

Full text
Abstract:
Our aim is to investigate and evaluate the efficiency of crisis management in European aviation, and to recommend enhancements. To fulfill this, we mapped the current crisis management plans and created a fictive scenario where a cyber-attack shut down the power at five of the major airports in Europe. Air traffic in Europe was reconstructed to a chosen day; the 16th of September 2013, and the reconstructed traffic situation was used in the scenario. We also created a model, for the purpose of showing the effect of a cut in time for the steps in the crisis management plan may have on the traff
APA, Harvard, Vancouver, ISO, and other styles
4

Sherman, Michael A. "An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSherman.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ahmad, Arniyati. "A cyber exercise post assessment framework : in Malaysia perspectives." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7553/.

Full text
Abstract:
Critical infrastructures are based on complex systems that provide vital services to the nation. The complexities of the interconnected networks, each managed by individual organisations, if not properly secured, could offer vulnerabilities that threaten other organisations’ systems that depend on their services. This thesis argues that the awareness of interdependencies among critical sectors needs to be increased. Managing and securing critical infrastructure is not isolated responsibility of a government or an individual organisation. There is a need for a strong collaboration among critica
APA, Harvard, Vancouver, ISO, and other styles
6

Guild, R. James. "Design and analysis of a model reconfigurable cyber-exercise laboratory (RCEL) for information assurance education." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1187.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>This thesis addresses the need to create a flexible laboratory environment for teaching network security. For educators to fully realize the benefit of such a facility, proto-type exercise scenarios are also needed. The paper is based on a model laboratory created at the Naval Postgraduate School. The initial configuration of the NPS lab is described. The work then develops a list of learning objectives achievable in the RCEL. Six proto-type cyber-exercise scenarios are presented to supplement the RCEL description. The activities within
APA, Harvard, Vancouver, ISO, and other styles
7

De, las Casas Zolezzi Humberto Jose. "Model-Free Optimization of Trajectory and Impedance Parameters on Exercise Robots with Applications to Human Performance and Rehabilitation." Cleveland State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=csu1625490714196286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

柯柏宇. "A Study of Virtual-Machine-Based Cyber Defense Exercises." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7gghfu.

Full text
Abstract:
碩士<br>國防大學理工學院<br>資訊工程碩士班<br>106<br>Now Capture The Flag (CTF) is one of the most popular type of information security competitions around the world. The attendee needs to solve a series of challenges, or patch some vulnerabilities for defending owning system to earn points. The CTF can be categorized into three types: Jeopardy, Attack-Defense and King of the Hill.. CTF is a very matured method for evaluating information security technical skills. CTFtimes.org is a CTF portal for collecting all the competitions in the world. Hacker can track their performance and write-ups in the portal. Many
APA, Harvard, Vancouver, ISO, and other styles
9

Ching-HuangLin and 林敬皇. "Framework Design for Cyber Attack and Defense Exercises with Empirical Cloud Data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58312539008444263933.

Full text
Abstract:
博士<br>國立成功大學<br>電腦與通信工程研究所<br>101<br>Cyber Security Exercise training is gaining more attention in the information security field. Actual hands-on practice will strengthen the capabilities of attack and defense. Hence, we propose The Cyber Attack and Defense Exercises Framework in the dissertation to assist academic researchers or military cyber-units in designing, planning and performing security exercises. A competition of network attacks and defense was held on the Taiwan Network Security Testing Platform (Testbed@TWISC) to collect empirical data, verify suitability and find the direction f
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber exercises"

1

Cyber safety. EC-Council Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shakespeare, William. Macbeth (Cyber Classics). New Promise Inc, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shakespeare, William. Macbeth (Cyber Classics). Cyber Classics, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shakespeare, William. Hamlet (Cyber Classics). Cyber Classics, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shakespeare, William. Hamlet (Cyber Classics). New Promise Inc, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jonathan, Swift. Gulliver's Travels (Cyber Classics). Cyber Classics Inc, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jonathan, Swift. Gulliver's Travels (Cyber Classics). Cyber Classics, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shakespeare, William. Julius Caesar (Cyber Classics). Cyber Classics, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shakespeare, William. Julius Caesar (Cyber Classics). Cyber Classics Inc, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

An Analysis of VPN Solutions and Best Practices for Use in Conjunction With Cyber Attack and Defend Exercises. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber exercises"

1

Nunes, Eric, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, and Jay Little. "Cyber-Deception and Attribution in Capture-the-Flag Exercises." In Cyber Deception. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32699-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Østby, Grethe, and Stewart James Kowalski. "Preparing for Cyber Crisis Management Exercises." In Augmented Cognition. Human Cognition and Behavior. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50439-7_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sommestad, Teodor, and Jonas Hallberg. "Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments." In Secure IT Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34210-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maennel, Kaie, Rain Ottis, and Olaf Maennel. "Improving and Measuring Learning Effectiveness at Cyber Defense Exercises." In Secure IT Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70290-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siaterlis, Christos, Andres Perez-Garcia, and Marcelo Masera. "Using an Emulation Testbed for Operational Cyber Security Exercises." In Critical Infrastructure Protection V. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24864-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reed, Theodore, Kevin Nauer, and Austin Silva. "Instrumenting Competition-Based Exercises to Evaluate Cyber Defender Situation Awareness." In Foundations of Augmented Cognition. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39454-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sitnikova, Elena, Ernest Foo, and Rayford B. Vaughn. "The Power of Hands-On Exercises in SCADA Cyber Security Education." In Information Assurance and Security Education and Training. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39377-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gustafsson, Tommy, and Jonas Almroth. "Cyber Range Automation Overview with a Case Study of CRATE." In Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70852-8_12.

Full text
Abstract:
AbstractCyber security research is quintessential to secure computerized systems against cyber threats. Likewise, cyber security training and exercises are instrumental in ensuring that the professionals protecting the systems have the right set of skills to do the job. Cyber ranges provide platforms for testing, experimentation and training, but developing and executing experiments and training sessions are labour intensive and require highly skilled personnel. Several cyber range operators are developing automated tools to speed up the creation of emulated environments and scenarios as well as to increase the number and quality of the executed events. In this paper we investigate automated tools used in cyber ranges and research initiatives designated to augment cyber ranges automation. We also investigate the automation features in CRATE (Cyber Range And Training Environment) operated by the Swedish Defence Research Agency (FOI).
APA, Harvard, Vancouver, ISO, and other styles
9

Angafor, Giddeon N., Iryna Yevseyeva, and Ying He. "Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis." In Serious Games. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61814-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kokkonen, Tero, and Samir Puuska. "Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01168-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber exercises"

1

Dodge, Ronald, Brian Hay, and Kara Nance. "Standards-Based Cyber Exercises." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wahsheh, Luay A., and Biruk Mekonnen. "Practical Cyber Security Training Exercises." In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2019. http://dx.doi.org/10.1109/csci49370.2019.00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Information Sharing in Cyber Defence Exercises." In The 19th European Conference on Cyber Warfare. ACPI, 2020. http://dx.doi.org/10.34190/ews.20.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karjalainen, Mika, Tero Kokkonen, and Samir Puuska. "Pedagogical Aspects of Cyber Security Exercises." In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2019. http://dx.doi.org/10.1109/eurospw.2019.00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Henshel, Diane S., Gary M. Deckard, Brad Lufkin, et al. "Predicting proficiency in cyber defense team exercises." In MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM). IEEE, 2016. http://dx.doi.org/10.1109/milcom.2016.7795423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conklin, A., and G. B. White. "e-Government and Cyber Security: The Role of Cyber Security Exercises." In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06). IEEE, 2006. http://dx.doi.org/10.1109/hicss.2006.133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Javali, Chitra, and Girish Revadigar. "Network Web Traffic Generator for Cyber Range Exercises." In 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, 2019. http://dx.doi.org/10.1109/lcn44214.2019.8990880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Furtuna, Adrian, Victor-Valeriu Patriciu, and Ion Bica. "A structured approach for implementing cyber security exercises." In 2010 8th International Conference on Communications (COMM). IEEE, 2010. http://dx.doi.org/10.1109/iccomm.2010.5509123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gurnani, Rahul, Kaushik Pandey, and Shashi Kant Rai. "A scalable model for implementing Cyber Security Exercises." In 2014 International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2014. http://dx.doi.org/10.1109/indiacom.2014.6828048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Seker, Ensar, and Hasan Huseyin Ozbenli. "The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation." In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2018. http://dx.doi.org/10.1109/cybersecpods.2018.8560673.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber exercises"

1

Glumich, Sonja. Cyber Fundamental Exercises. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada582472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fulp, J. D. The Bastion Network Project: A Framework for Conducting Interscholastic Cyber-Exercises. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada435318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carbajal, Armida J., Susan Marie Stevens-Adams, Austin Ray Silva, Kevin S. Nauer, Benjamin Robert Anderson, and James Chris Forsythe. Enhanced Training for Cyber Situational Awareness in Red versus Blue Team Exercises. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1325560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hwang, Nicholas J., and Kevin B. Bush. Operational Exercise Integration Recommendations for DoD Cyber Ranges. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada623114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Franklin, David M. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada525274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!