Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

1. G. Hatzivasilis et al.

, "SPD-Safe: Secure administration of railway intelligent


transportation systems", Electronics – Special Issue on Advances in Public
Transport Platform for the Development of Sustainability Cities MDPI Open Access
Journal, vol. 10, no. 1, pp. 1-26, January 2021.

2. G. Hatzivasilis et al., "AI-driven composition and security validation of an IoT


ecosystem", Applied Sciences – Special Issue on Smart City and Multi-Agent Systems
MDPI Open Access Journal, vol. 10, no. 14, pp. 1-31, August 2020.

3. S. Maghool et al., "The coevolution of contagion and behavior with increasing


and decreasing awareness", PLOS ONE, vol. 14, no. 12, pp. 1-22, December 2019.

4. I. Smyrlis et al., "CYRA: A Model-Driven Cyber Range Assurance Platform",


Applied Sciences – Special Issue on Security Management of 5G and IoT Ecosystems
MDPI Open Access Journal, vol. 11, no. 11, pp. 1-28, June 2021.

5. C. Braghin et al., "Towards the Monitoring and Evaluation of Trainees’


Activities in Cyber Ranges", 2nd Model-driven Simulation and Training Environments
for Cybersecurity (MSTEC) ESORICS, vol. 12512, pp. 79-91, September 2020.

6. G. Hatzivasilis et al., "Modern Aspects of Cyber-Security Training and


Continuous Adaptation of Programmes to Trainees", Applied Sciences, vol. 10, pp. 1-
26, 2020.

7. N. Chouliaras et al., "Cyber ranges and testbeds for education training and
research", Applied Sciences, vol. 11, pp. 1-23, 2021.

8. N. Chowdhury and V. Gkioulos, "Cyber security training for critical


infrastructure protection: A literature review", Computer Science Review, vol. 40,
pp. 1-20, 2021.

9. T. Gustafsson and J. Almroth, "Cyber range automation overview with a case study
of CRATE", 25th Nordic Conference on Secure IT Systems (NordSec), vol. 12556, pp.
192-209, 2021.

10. "Online cyber security training", [online] Available:


https://www.sans.org/online-security-training/.

11. "Develop security skills", [online] Available: https://www.cybrary.it/.

12. "Online cyber security hacking courses", [online] Available:


https://www.stationx.net/.

13. "Complete cybersecurity course review on CYBERINERNACADEMY", [online]


Available: https://www.cyberinternacademy.com/complete-cybersecurity-course-guide-
review/.

14. "Security awareness training", [online] Available: https://www.awarego.com/.

15. "Security Awareness Training", [online] Available:


https://www.beonedevelopment.com/en/security-awareness/.

16. "CyberSecurity Nexus (CSX) training platform", [online] Available:


https://cybersecurity.isaca.org/csx-certifications/csx-training-platform.

17. "Kaspersky security awareness", [online] Available:


https://www.kaspersky.com/enterprise-security/security-awareness.
18. "Cyber Security Training Platform", [online] Available:
https://www.cyberbit.com/blog/security-training/cyber-security-training-platform/.

19. P. Puhakainen and M. Siponen, "Improving employees’ compliance through


information systems security training: an action research study", MIS Quarterly,
vol. 34, pp. 757-778, 2010.

20. S. Abraham and I. Chengalur-Smith, "Evaluating the effectiveness of learner


controlled information security training", Computers Security, vol. 87, pp. 1-12,
2019.

21. T.T. Baldwin and J.K. Ford, "Transfer of training: a review and directions for
future research", Personnel Psychology, vol. 41, pp. 63-105, 1988.

22. R. Velada et al., "The effects of training design individual characteristics


and work environment on transfer of training", International Journal of Training
and Development, vol. 11, pp. 282-294, 2007.

23. S. Katopodis, G. Spanoudakis and K. Mahbub, "Towards hybrid cloud service


certification models", International Conference on Services Computing, pp. 394-399,
June, 2014.

24. G. Hatzivasilis, I. Papaefstathiou and C. Manifavas, "Software Security Privacy


and Dependability: Metrics and Measurement", IEEE Software, vol. 33, no. 4, pp. 46-
54, 2016.

25. P. Cichonski et al., "Computer security incident handling guide", NIST, pp. 1-
79, 2012.

26. L. Goeke et al., "PROTECT – An Easy Configurable Serious Game to Train


Employees Against Social Engineering Attacks", 1st Model-driven Simulation and
Training Environments for Cybersecurity (MSTEC) ESORICS, vol. 11981, pp. 156-171,
September 2019.

27. S. Pape et al., "Conceptualization of a CyberSecurity Awareness Quiz", 2nd


Model-driven Simulation and Training Environments for Cybersecurity (MSTEC)
ESORICS, vol. 12512, pp. 61-76, September 2020.

28. "Create high-quality test data while minimizing the risks of using sensitive
production data", IBM InfoSphere Optim Test Data Fabrication, 2017, [online]
Available: https://www.ibm.com/il-en/marketplace/infosphere-optim-test-data-
fabrication.

You might also like