<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Serhii Salkutsan</style></author><author><style face="normal" font="default" size="100%">Al Stolberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Impact of War on the Ukraine Military Education System: Moving Forward in War and Peace</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">National Defense University</style></keyword><keyword><style  face="normal" font="default" size="100%">PME</style></keyword><keyword><style  face="normal" font="default" size="100%">Professional Military Education</style></keyword><keyword><style  face="normal" font="default" size="100%">reform</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">67-76</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The Russian invasion of Ukraine and Ukraine’s subsequent and ongoing combat successes have proven that agile, adaptive leaders can triumph against a better-equipped enemy. The foundational educational reforms within the Ukrainian Armed Forces, begun in 2018, have paid incalculable dividends. This article examines Ukraine’s Professional Military Education (system) before and during the war and proposes a policy to continue to prioritize training and education now and in the future.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">67</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elitsa Pavlova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Federated Cyber Ranges  in Bulgarian Universities: Challenges, Requirements, and Opportunities</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Bulgaria</style></keyword><keyword><style  face="normal" font="default" size="100%">classification</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">functionalities</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword><keyword><style  face="normal" font="default" size="100%">University</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">149-159 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;Cyber education has been one of the global challenges in recent years. Attacks are becoming more sophisticated, and it is increasingly difficult to provide a safe working environment. Hyper-realistic virtual environments called cyber ranges help increase the level of cybersecurity training. Access to multi-domain exercises is needed to make full use of their capabilities, combine information technology networks and other appropriate infrastructure. A systematic review of the modern cyber ranges used for teaching and research purposes in higher education institutions has been made. This study aims to analyse cyber range characteristics, functionalities, and requirements for their implementation and integration in accordance with the EU regulations. The results will be used in the development of a conceptual model for a cybersecurity training laboratory at the University of National and World Economy, Sofia, Bulgaria. Its inclusion in the teaching and research process is a relevant, important, and promising area for the future of higher educaiton in cybersecurity.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Slavchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using Cyber Ranges in Cybersecurity Management Educational Programmes</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber range platform</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">information security management</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">161-168 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;The demand for better-trained cybersecurity specialists is growing globally, triggering interest in advanced technology solutions supporting education and training. The analysis of cyber ranges used at various European universities, presented in this article, aims to determine the most appropriate cyber range for the needs of the Master&amp;rsquo;s program in Cybersecurity Management of the University of National and World Economy in Sofia, Bulgaria.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Luke Topham</style></author><author><style face="normal" font="default" size="100%">Kashif Kifayat</style></author><author><style face="normal" font="default" size="100%">Younis A. Younis</style></author><author><style face="normal" font="default" size="100%">Qi Shi</style></author><author><style face="normal" font="default" size="100%">Bob Askwith</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Teaching and Learning Laboratories: A Survey</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">Computing Laboratory</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">Pedagogy</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword><keyword><style  face="normal" font="default" size="100%">Virtualisation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">51-80</style></pages><abstract><style face="normal" font="default" size="100%">Currently there is a great demand for trained cyber security professionals with hands-on skills. The need for these professionals stems from our reliance on technology in many aspects of our daily lives and the smooth running of modern governments, education and health services. These professionals are desperately needed to defend cyberspace from threats such as hackers and malware who threaten to disrupt such services daily. This paper presents an insight into current approaches taken in the practical teaching of cyber security. We also give requirements and best practices for future training platforms based on a defined teaching process.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">51</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jüri Vain</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enhanced Education for Cybersecurity and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">SEREIN</style></keyword><keyword><style  face="normal" font="default" size="100%">TEMPUS</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Generic Reference Curriculum on Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competence framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">policy-making</style></keyword><keyword><style  face="normal" font="default" size="100%">technical expertise</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">181-184</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A volunteer group of academics and practitioners embarked on a two-year project to develop a generic reference curriculum on cybersecurity on behalf of NATO and the Partnership for Peace Consortium. This paper provides a brief overview of the result of this work - a curriculum that is recommended as a starting point for any university or training organization considering a program in the field of cybersecurity. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">181</style></section></record></records></xml>