<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Ivan Nikolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">exercising</style></keyword><keyword><style  face="normal" font="default" size="100%">federated</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">287-302</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cyber exercising is essential to crisis management preparation and maintaining a robust cybersecurity posture. To prepare for growing hybrid threats, complex cyber-hybrid scenarios with practical cooperation at the technical, operational, and higher decision-making levels are increasingly being used, leveraging the power of cyber ranges. Alas, owing to a lack of suitable simulation infrastructure and the ability to adapt cyber ranges to varied situations, such complex scenarios often remain inaccessible. The federation of cyber ranges is one potential response to this challenge, providing a solution for the individual cyber range limitations in terms of resources to replicate complex cybersecurity-relevant realities. 
The current contribution describes the authors’ experience designing the Red Ranger, a Composite Cyber Range. We detail the design and development to facilitate the agility required to support a working multi-faceted federation with the ECHO Cyber Range to allow for an “exercise-as-a-service” model to provide adequate and accessible cyber-hybrid mechanisms for crisis response training and preparation.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">287</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hybrid Exercising for Cyber-Resilient Healthcare and  Cross-Sector Crisis Response Operability</style></title><secondary-title><style face="normal" font="default" size="100%">Information Systems and Grid Technologies ISTG, CEUR Workshop Proceedings</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">28-29 May 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">933</style></volume><pages><style face="normal" font="default" size="100%">329-351</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Crisis Response</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid Security</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Standard Operating Procedures</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">129-148 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;The current cybersecurity landscape is conducive to the enhancement of the traditional cyber-exercising paradigm and instruments. Considering the complex nature of the cyberattacks and their cascading impact, moving away from purely technical or entirely decision-making exercises is becoming paramount for realistic exercising of emergency response. Complex cyber-hybrid scenarios, exercising effective collaboration at the technical, operational, and higher decision-making levels, are increasingly employed to prepare to face emerging hybrid threats. Such scenarios simulate seemingly independent incidents in different locations, businesses, or systems that may quickly escalate to a sectoral or a national crisis. Unfortunately, such diverse scenarios remain inaccessible due to the lack of proper simulation infrastructure and expertise to adapt them to various contexts. The current contribution presents the authors&amp;rsquo; experience in designing a Composite Cyber Range, following a Systems-of-Systems approach for the dynamic activation or incorporation of playgrounds and on-the-run integration of custom-made emulation or overlay ranges to support an &amp;ldquo;exercise-as-a-service&amp;rdquo; model for the provision of adequate and accessible cyber-hybrid mechanisms for crisis response training and preparation.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Yavor Papazov</style></author><author><style face="normal" font="default" size="100%">Christina Todorovaa</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity Tools for Threat Intelligence and Vulnerability Monitoring for National and Sectoral Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Information Security in Education and Practice</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Cambridge Scholars Publishing</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">Chapter One</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Yavor Papazov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber risk</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threat</style></keyword><keyword><style  face="normal" font="default" size="100%">early warning</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">scalability</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">155-167</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Today’s digital society implies interconnectivity between the online operations of different sectors of everyday life and economy alike. As a consequence, malicious activities targeted towards a single online service could hurt entire indus¬tries and multiple private and public organizations. This interdependence be¬tween online services and economic units is an imperative for targeted efforts ensuring the integrity and availability of individual systems and complex systems-of-systems alike. This article presents MonSys, a flexible, robust, and scalable monitoring platform, implement-ed as a cloud-based service and an on-premise solution, specifically de-signed to ad¬dress the need for ensuring service availability at an individual level. MonSys provides several standardized services availability checks, such as web-based services from multiple geographical locations, and a flexible platform and tools for defining customized complex services. Particular attention is paid to the processes of metrics collection, processing, storage, and querying. MonSys can perform custom availability checks for different types of infrastructures, such as various black-box, grey-box, and white-box availability checks/metrics. The article presents also results from piloting the platform on performance and scalability and options for integration in early-warning and intelligent signaling, based on behavioral pattern analysis and predictive simulations.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">155</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Yavor Papazov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Martin Georgiev</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threat Map for National and Sectoral Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2019</style></date></pub-dates></dates><pages><style face="normal" font="default" size="100%">29-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yavor Papazov</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Managing Cyber Education Environments with Serverless Computing</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber education cybersecurity education cyber range serverless faas</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper presents the experience of the authors in their efforts to apply an innovative computation paradigm &amp;ndash; &amp;ldquo;serverless&amp;rdquo; computing &amp;ndash; into managing cyber education environments through the Course Manager platform, developed by the authors&amp;rsquo; team. The serverless paradigm, also referred to as Function-as-a-Service (FaaS), helps the developers abstract or automate away almost all infrastructure and operation overhead, allowing for what is often touted as &amp;quot;infinite scaling&amp;quot; applications, which can be a good fit for the rapidly increasing demand for practical cyber environments.&lt;/p&gt;&lt;p&gt;The authors provide an in-depth overview of the architecture and frontend of a cyber education environment management framework, designed to work in a serverless environment, and analyse the lessons learnt from using that framework in providing cyber trainings to students and IT professionals for more than a year.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record></records></xml>