References
- Andreolini M., Colacino V.G., Colajanni M., Marchetti M., A framework for the evaluation of trainee performance in cyber range exercises, Mobile Networks and Applications, vol. 25, pp. 236–247, 2020.
- Attiah A., Chatterjee M., Zou C.C., A game theoretic approach to model cyber attack and defense strategies, in International Conference on Communications, Kansas City, MO, USA, 2018, pp. 1–7.
- Bock K., Hughey G., Levin D., King of the hill: A novel cybersecurity competition for teaching penetration testing, in USENIX Workshop on Advances in Security Education, Baltimore, MD, 2018.
- Brilingaitė A., Bukauskas L., Juozapavičius A., A framework for competence development and assessment in hybrid cybersecurity exercises, Computers Security, vol. 88, p. 101607, 2020.
- Chindruș C., Căruntu C.F., Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents, 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 2022, pp. 1-7.
- Cheung R.S., Cohen J.P., Lo H.Z., Elia F., Carrillo-Marquez V., Effectiveness of cybersecurity competitions, in International Conference on Security and Management. Las Vegas, USA: The Steering Committee of The World Congress in Computer Science, 2012, p. 1.
- DeCusatis C., Bavaro J., Cannistraci T., Griffin B., Jenkins J., Ronan M., Red-Blue team exercises for cybersecurity training during a pandemic, in IEEE 11th Annual Computing and Communication Workshop and Conference, NV, USA, 2021, pp. 1055–1060.
- Haney J.M., Paul C.L., Toward integrated tactical operations for Red/Blue cyber defense teams, in Workshop on Security Information Workers at Symposium on Usable Privacy and Security, Baltimore, MD, USA, 2018.
- Karjalainen M., Kokkonen T., Comprehensive cyber arena; the next generation cyber range, in IEEE European Symposium on Security and Privacy Workshops, Genoa, Italy, 2020, pp. 11–16.
- Katsantonis M.N., Fouliras P., Mavridis I., Conceptual analysis of cyber security education based on live competitions, in IEEE Global Engineering Education Conference, Athens, Greece, 2017, pp. 771–779.
- Katsantonis M.N., Mavridis I., Gritzalis D., Design and evaluation of cofelet-based approaches for cyber security learning and training, Computers & Security, vol. 105, p. 102263, 2021.
- Khan M.A., Merabet A., Alkaabi S., Sayed H.E., Game-based learning platform to enhance cybersecurity education, Education and Information Technologies, pp. 1–25, 2022.
- Kokkonen T., Puuska S., Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises, in Internet of things, smart spaces, and next generation networks and systems. Cham: Springer, 2018, pp. 277–288.
- Pusey P., Gondree M., Peterson Z., The outcomes of cybersecurity competitions and implications for underrepresented populations, IEEE Security & Privacy, vol. 14, no. 6, pp. 90–95, 2016.
- Seker E., Ozbenli H.H., The concept of cyber defence exercises (cdx): Planning, execution, evaluation, in International Conference on Cyber Security and Protection of Digital Services. Glasgow, UK: IEEE, 2018, pp. 1–9.
- Shen C.C., Chiou Y.-M., Mouza C., Rutherford T., Work-inprogress-design and evaluation of mixed reality programs for cybersecurity education, in 7th International Conference of the Immersive Learning Research Network. Eureka, CA, USA: IEEE, 2021, pp. 1–3.
- Thomas L.J., Balders M., Countney Z., Zhong C., Yao J., Xu C., Cybersecurity education: From beginners to advanced players in cybersecurity competitions, in International Conference on Intelligence and Security Informatics. Shenzhen, China: IEEE, 2019, pp. 149–151.
- Veerasamy N., High-level methodology for carrying out combined Red and Blue teams, in 2nd International Conference on Computer and Electrical Engineering, Dubai, United Arab Emirates, 2009, pp. 416–420.
- Vigna G., Teaching network security through live exercises, in Security Education and Critical Infrastructures, C. Irvine and H. Armstrong, Eds. New York, NY: Springer US, 2003, pp. 3–18.
- Yamin M.M., Katt B., Gkioulos V., Cyber ranges and security testbeds: Scenarios, functions, tools and architecture, Computers Security, vol. 88, p. 101636, 2020.
- Yang P., Gao F., Zhang H., Multi-player evolutionary game of network attack and defense based on system dynamics, Mathematics, vol. 9, no. 23, p. 3014, 2021.
- Zhang H., Jiang L., Huang S., Wang J., Zhang Y., Attack-defense differential game model for network defense strategy selection, IEEE Access, vol. 7, pp. 50 618–50 629, 2018