All Stories

  1. An Intelligent Network Fuzzer for Protocol Testing in Healthcare Systems
  2. Red vs. Blue Team Training Scenarios for 5G/6G Networks
  3. NITRO: an Interconnected 5G-IoT Cyber Range
  4. AI-Powered Penetration Testing using Shennina: From Simulation to Validation
  5. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams
  6. Mastering data privacy: leveraging K-anonymity for robust health data sharing
  7. Unraveling the Complexity of Mobile Application Permissions: Strategies to Enhance Users’ Privacy Education
  8. Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication
  9. Chidroid introduces the seamless collection of data from smart healthcare devices is empowered.
  10. Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
  11. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams
  12. A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities.
  13. Analysis and Evaluation of Capture the Flag Challenges in Secure Mobile Application Development
  14. Incident Handling for Healthcare Organizations and Supply-Chains
  15. A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games
  16. Deploy and Document Realistic Cyberattack Scenarios - A Rootkit Case Study
  17. PocketCTF: A Fully Featured Approach for Hosting Portable Attack and Defense Cybersecurity Exercises
  18. Automated and On-Demand Cybersecurity Certification
  19. Structured Vehicle Cybersecurity Testing
  20. A Digital Twin-Based Cyber Range for SOC Analysts
  21. Usage of capture the flag (CTF) challenges as part of an engaging cybersecurity learning experience.
  22. Reference Scenarios and Key Performance Indicators for 5G Ultra-dense Networks
  23. Engaging Students in Basic Cybersecurity Concepts Using Digital Game-Based Learning: Computer Games as Virtual Learning Environments
  24. Sandboxing the Cyberspace for Cybersecurity Education and Learning
  25. An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools
  26. Constructing Tool-based Security Test Sequences for Vehicles as High-tech Data-rich Systems
  27. Game-Based Information Security/Privacy Education and Awareness: Theory and Practice