All Stories

  1. NITRO: an Interconnected 5G-IoT Cyber Range
  2. AI-Powered Penetration Testing using Shennina: From Simulation to Validation
  3. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams
  4. Mastering data privacy: leveraging K-anonymity for robust health data sharing
  5. Unraveling the Complexity of Mobile Application Permissions: Strategies to Enhance Users’ Privacy Education
  6. Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication
  7. Chidroid introduces the seamless collection of data from smart healthcare devices is empowered.
  8. Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
  9. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams
  10. A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities.
  11. Analysis and Evaluation of Capture the Flag Challenges in Secure Mobile Application Development
  12. Incident Handling for Healthcare Organizations and Supply-Chains
  13. A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games
  14. Deploy and Document Realistic Cyberattack Scenarios - A Rootkit Case Study
  15. PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises
  16. Automated and On-Demand Cybersecurity Certification
  17. Structured Vehicle Cybersecurity Testing
  18. A Digital Twin-Based Cyber Range for SOC Analysts
  19. Usage of capture the flag (CTF) challenges as part of an engaging cybersecurity learning experience.
  20. Reference Scenarios and Key Performance Indicators for 5G Ultra-dense Networks
  21. Engaging Students in Basic Cybersecurity Concepts Using Digital Game-Based Learning: Computer Games as Virtual Learning Environments
  22. Sandboxing the Cyberspace for Cybersecurity Education and Learning
  23. An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools
  24. Constructing Tool-based Security Test Sequences for Vehicles as High-tech Data-rich Systems
  25. Game-Based Information Security/Privacy Education and Awareness: Theory and Practice