Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

Research and Practice of Delivering Tabletop Exercises

J Vykopal, P Čeleda, V Švábenský… - Proceedings of the …, 2024 - dl.acm.org
Tabletop exercises are used to train personnel in the efficient mitigation and resolution of
incidents. They are applied in practice to support the preparedness of organizations and to …

Addressing cybersecurity challenges in education

WJ Triplett - International Journal of STEM Education for …, 2023 - journal.gmpionline.com
This study aimed to address the challenges of cybersecurity in education. As kindergarten
through twelfth-grade education shifts to online and remote learning, educators and …

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

GN Angafor, I Yevseyeva, L Maglaras - Information & Computer …, 2023 - emerald.com
Purpose This paper aims to discuss the experiences designing and conducting an
experiential learning virtual incident response tabletop exercise (VIRTTX) to review a …

[HTML][HTML] From Dis-empowerment to empowerment: Crafting a healthcare cybersecurity self-assessment

W Burke, A Stranieri, T Oseni - Computers & Security, 2025 - Elsevier
Due to the valuable and sensitive nature of its data, the Australian healthcare sector is
increasingly targeted by cyberattacks. Existing cybersecurity evaluation methods often lack …

Bridging the digital gap: Teaching cyber strategy and policy through a crisis simulation

G Winger, S Ellis, D Glover - International Studies Perspectives, 2024 - academic.oup.com
This article details an attempt to bridge the gulf between information technology (IT) and
social science approaches to cybersecurity using a simulation. Digital affairs are …

Unlocking productivity potential: the promising role of agricultural robots in enhancing farming efficiency

AK Rai, N Kumar, D Katiyar… - … of Plant & Soil …, 2023 - repository.journal4submission.com
Integration of advanced robotics in agriculture can exponentially boost productivity, alleviate
labor shortages, reduce the environmental footprint, and increase the overall profitability of …

Teaching and learning cybersecurity for European youth by applying interactive technology and smart education

AJ Blažič, BJ Blažič - Education and Information Technologies, 2024 - Springer
This paper presents a new developed methodology for teaching and learning subjects that
although are very important in the modern digital society are neglected in high school …

Toward effective learning of cybersecurity: new curriculum agenda and learning methods

AJ Blažič, BJ Blažič - Journal of Cybersecurity, 2024 - academic.oup.com
A recent survey among high school teachers and students in the EU revealed that
cybersecurity topics are not included in the programs addressing computer science topics of …