Crypto-ransomware: A revision of the state of the art, advances and challenges
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …
knowledge of it as much as possible, this work is mainly aimed at diving into and …
Cyber ranges and testbeds for education, training, and research
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …
Research and Practice of Delivering Tabletop Exercises
Tabletop exercises are used to train personnel in the efficient mitigation and resolution of
incidents. They are applied in practice to support the preparedness of organizations and to …
incidents. They are applied in practice to support the preparedness of organizations and to …
Addressing cybersecurity challenges in education
WJ Triplett - International Journal of STEM Education for …, 2023 - journal.gmpionline.com
This study aimed to address the challenges of cybersecurity in education. As kindergarten
through twelfth-grade education shifts to online and remote learning, educators and …
through twelfth-grade education shifts to online and remote learning, educators and …
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
Purpose This paper aims to discuss the experiences designing and conducting an
experiential learning virtual incident response tabletop exercise (VIRTTX) to review a …
experiential learning virtual incident response tabletop exercise (VIRTTX) to review a …
[HTML][HTML] From Dis-empowerment to empowerment: Crafting a healthcare cybersecurity self-assessment
Due to the valuable and sensitive nature of its data, the Australian healthcare sector is
increasingly targeted by cyberattacks. Existing cybersecurity evaluation methods often lack …
increasingly targeted by cyberattacks. Existing cybersecurity evaluation methods often lack …
Bridging the digital gap: Teaching cyber strategy and policy through a crisis simulation
G Winger, S Ellis, D Glover - International Studies Perspectives, 2024 - academic.oup.com
This article details an attempt to bridge the gulf between information technology (IT) and
social science approaches to cybersecurity using a simulation. Digital affairs are …
social science approaches to cybersecurity using a simulation. Digital affairs are …
Unlocking productivity potential: the promising role of agricultural robots in enhancing farming efficiency
AK Rai, N Kumar, D Katiyar… - … of Plant & Soil …, 2023 - repository.journal4submission.com
Integration of advanced robotics in agriculture can exponentially boost productivity, alleviate
labor shortages, reduce the environmental footprint, and increase the overall profitability of …
labor shortages, reduce the environmental footprint, and increase the overall profitability of …
Teaching and learning cybersecurity for European youth by applying interactive technology and smart education
AJ Blažič, BJ Blažič - Education and Information Technologies, 2024 - Springer
This paper presents a new developed methodology for teaching and learning subjects that
although are very important in the modern digital society are neglected in high school …
although are very important in the modern digital society are neglected in high school …
Toward effective learning of cybersecurity: new curriculum agenda and learning methods
AJ Blažič, BJ Blažič - Journal of Cybersecurity, 2024 - academic.oup.com
A recent survey among high school teachers and students in the EU revealed that
cybersecurity topics are not included in the programs addressing computer science topics of …
cybersecurity topics are not included in the programs addressing computer science topics of …