<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Wim Mees</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enhanced Collaboration for Cyber Security and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">Collaborative Network Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber digital skills</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">human factor</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">threat intelligence</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">7-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the structure and content of articles accepted for presentation at the Fourth International Scientific Conference “Digital Transformation, Cyber Security and Resilience, DIGILIENCE 2022. The volume includes articles presenting results on six particular topics: Advanced Threat Intelligence and Information Sharing; Digitalization and Privacy Preservation; Governing Cybersecurity Networks and Ecosystems; Developing Critical Cyber Skills; Human Factors for Safety and Resilience to Cyber/Hybrid Influence; and Cyber Ranges, Simulation and Training.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Ivan Nikolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">exercising</style></keyword><keyword><style  face="normal" font="default" size="100%">federated</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">287-302</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cyber exercising is essential to crisis management preparation and maintaining a robust cybersecurity posture. To prepare for growing hybrid threats, complex cyber-hybrid scenarios with practical cooperation at the technical, operational, and higher decision-making levels are increasingly being used, leveraging the power of cyber ranges. Alas, owing to a lack of suitable simulation infrastructure and the ability to adapt cyber ranges to varied situations, such complex scenarios often remain inaccessible. The federation of cyber ranges is one potential response to this challenge, providing a solution for the individual cyber range limitations in terms of resources to replicate complex cybersecurity-relevant realities. 
The current contribution describes the authors’ experience designing the Red Ranger, a Composite Cyber Range. We detail the design and development to facilitate the agility required to support a working multi-faceted federation with the ECHO Cyber Range to allow for an “exercise-as-a-service” model to provide adequate and accessible cyber-hybrid mechanisms for crisis response training and preparation.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">287</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nikolai Stoianov</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">AI-driven Cybersecurity Solutions, Cyber Ranges for Education &amp; Training, and ICT Applications for Military Purposes</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative network organisation</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity ethics</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">ECHO project</style></keyword><keyword><style  face="normal" font="default" size="100%">human factors</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword><keyword><style  face="normal" font="default" size="100%">Situational awareness</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Third International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2021, and summarises the results from four of its sessions: AI-driven Cybersecurity Solutions; Organisational and Ethical Considerations in Providing Cybersecurity; Cyber Ranges for Innovative Education &amp; Training; and Advanced ICT Solutions with Military Applications.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elitsa Pavlova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Federated Cyber Ranges  in Bulgarian Universities: Challenges, Requirements, and Opportunities</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Bulgaria</style></keyword><keyword><style  face="normal" font="default" size="100%">classification</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Education</style></keyword><keyword><style  face="normal" font="default" size="100%">functionalities</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword><keyword><style  face="normal" font="default" size="100%">University</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">149-159 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;Cyber education has been one of the global challenges in recent years. Attacks are becoming more sophisticated, and it is increasingly difficult to provide a safe working environment. Hyper-realistic virtual environments called cyber ranges help increase the level of cybersecurity training. Access to multi-domain exercises is needed to make full use of their capabilities, combine information technology networks and other appropriate infrastructure. A systematic review of the modern cyber ranges used for teaching and research purposes in higher education institutions has been made. This study aims to analyse cyber range characteristics, functionalities, and requirements for their implementation and integration in accordance with the EU regulations. The results will be used in the development of a conceptual model for a cybersecurity training laboratory at the University of National and World Economy, Sofia, Bulgaria. Its inclusion in the teaching and research process is a relevant, important, and promising area for the future of higher educaiton in cybersecurity.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Georgi Koykov</style></author><author><style face="normal" font="default" size="100%">Georgi Zahariev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Crisis Response</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid Security</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Standard Operating Procedures</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">129-148 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:20.15pt;&quot;&gt;The current cybersecurity landscape is conducive to the enhancement of the traditional cyber-exercising paradigm and instruments. Considering the complex nature of the cyberattacks and their cascading impact, moving away from purely technical or entirely decision-making exercises is becoming paramount for realistic exercising of emergency response. Complex cyber-hybrid scenarios, exercising effective collaboration at the technical, operational, and higher decision-making levels, are increasingly employed to prepare to face emerging hybrid threats. Such scenarios simulate seemingly independent incidents in different locations, businesses, or systems that may quickly escalate to a sectoral or a national crisis. Unfortunately, such diverse scenarios remain inaccessible due to the lack of proper simulation infrastructure and expertise to adapt them to various contexts. The current contribution presents the authors&amp;rsquo; experience in designing a Composite Cyber Range, following a Systems-of-Systems approach for the dynamic activation or incorporation of playgrounds and on-the-run integration of custom-made emulation or overlay ranges to support an &amp;ldquo;exercise-as-a-service&amp;rdquo; model for the provision of adequate and accessible cyber-hybrid mechanisms for crisis response training and preparation.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michal Turčaník</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Cyber Range for Armed Forces Education</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber range</style></keyword><keyword><style  face="normal" font="default" size="100%">E&amp;T</style></keyword><keyword><style  face="normal" font="default" size="100%">education and training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">304-310</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Cyber security is one of the prominent global challenges due to significant increase in the number of cyberattacks over the last few decades. Cyber-security awareness and cyber security training are promoted by hyper-realistic virtual environments termed as cyber ranges. This article high-lights the concept of a cyber range. Cyber range for educational purposes in the armed forces has been proposed taking into account the important parameters a cyber range should incorporate. The author takes into ac-count the use cases, the topology and software tools of the newly created cyber range.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">304</style></section></record></records></xml>