Frankenstack: Toward real-time red team feedback

M Kont, M Pihelgas, K Maennel… - MILCOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Cyber Defense Exercises have received much attention in recent years, and are
increasingly becoming the cornerstone for ensuring readiness in this new domain. Crossed …

A league of our own: the future of cyber defense competitions

D Manson, A Carlin - Communications of the IIMA, 2011 - scholarworks.lib.csusb.edu
Numerous cyber defense competitions exist today for individuals and teams to test their
cyber security skills where each team has to “win or go home.” What is missing from these …

A cyber exercise post assessment framework: In Malaysia perspectives

A Ahmad - 2016 - theses.gla.ac.uk
Critical infrastructures are based on complex systems that provide vital services to the
nation. The complexities of the interconnected networks, each managed by individual …

[PDF][PDF] SAKGP: secure authentication key generation protocol in WLAN

PH Latha, R Vasantha - International Journal of Computer …, 2014 - researchgate.net
Wireless LAN is one of the cost effective way to establish local networking as compared to
wired network. Although the last decade has seen various sophisticated WLAN routers and …

[PDF][PDF] International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net

T Nadu - CYBERNETICS: SYSTEMS, 2013 - Citeseer
In this paper we deal with the advantages of cloud computing technologies in health care
information systems. In the last few years, expectations about patient privacy information …