Vis enkel innførsel

dc.contributor.authorYamin, Muhammad Mudassar
dc.contributor.authorKatt, Basel
dc.contributor.authorNowostawski, Mariusz
dc.date.accessioned2021-10-28T11:30:11Z
dc.date.available2021-10-28T11:30:11Z
dc.date.created2021-08-22T10:42:01Z
dc.date.issued2021
dc.identifier.issn0167-4048
dc.identifier.urihttps://hdl.handle.net/11250/2826296
dc.description.abstractTechnology is evolving rapidly; this poses a problem for security specialists and average citizens as their technological skill sets are quickly made obsolete. This makes the knowledge and understanding of cyber-security in a technologically evolving world difficult. Global IT infrastructure and individuals’ privacy are constantly under threat. One way to tackle this problem is by providing continuous training and self-learning platforms. Cyber-security exercises can provide a necessary platform for training people’s cyber-security skills. However, conducting cyber-security exercises with new and unique scenarios requires comprehensive planning and commitment to the preparation time and resources. In this work, we propose a serious game for the development of cyber-security exercise scenarios. The game provides a platform to model simulated cyber-security exercise scenarios, transforming them into an emulated cyber-security exercise environment using domain-specific language (DSL) and infrastructure orchestration. In this game, players can play as cyber attackers or defenders in a multiplayer environment to make operational cyber-security decisions in real-time. The decisions are evaluated for the development of operational cyber-attack and defense strategies.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleSerious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercisesen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.rights.holderThis is the authors' accepted manuscript to an article published by Elsevier. Locked until 20.8.2023 due to copyright restrictions. The AAM is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.source.journalComputers & securityen_US
dc.identifier.doihttps://doi.org/10.1016/j.cose.2021.102450
dc.identifier.cristin1927832
cristin.ispublishedfalse
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal