↓ Skip to main content

Computer Security

Overview of attention for book
Cover of 'Computer Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Comprehensive Technical Survey of Contemporary Cybersecurity Products and Solutions
  3. Altmetric Badge
    Chapter 2 CyberSure: A Framework for Liability Based Trust
  4. Altmetric Badge
    Chapter 3 Deploying Fog-to-Cloud Towards a Security Architecture for Critical Infrastructure Scenarios
  5. Altmetric Badge
    Chapter 4 Event-Based Remote Attacks in HTML5-Based Mobile Apps
  6. Altmetric Badge
    Chapter 5 Horizontal Attacks Against ECC: From Simulations to ASIC
  7. Altmetric Badge
    Chapter 6 Web Servers Protection Using Anomaly Detection for HTTP Requests
  8. Altmetric Badge
    Chapter 7 You Shall Not Register! Detecting Privacy Leaks Across Registration Forms
  9. Altmetric Badge
    Chapter 8 A Model Driven Approach for Cyber Security Scenarios Deployment
  10. Altmetric Badge
    Chapter 9 Difficult XSS Code Patterns for Static Code Analysis Tools
  11. Altmetric Badge
    Chapter 10 An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures
  12. Altmetric Badge
    Chapter 11 PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks
  13. Altmetric Badge
    Chapter 12 Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective
  14. Altmetric Badge
    Chapter 13 Towards the Insurance of Healthcare Systems
  15. Altmetric Badge
    Chapter 14 The THREAT-ARREST Cyber-Security Training Platform
  16. Altmetric Badge
    Chapter 15 dAPTaset : A Comprehensive Mapping of APT-Related Data
  17. Altmetric Badge
    Chapter 16 Blockchain Based Sharing of Security Information for Critical Infrastructures of the Finance Sector
  18. Altmetric Badge
    Chapter 17 Bunkers: Jail Application Level Firewall for the Mitigation and Identification of Service Takeover Attacks on HardenedBSD
  19. Altmetric Badge
    Chapter 18 A Language-Based Approach to Prevent DDoS Attacks in Distributed Financial Agent Systems
Attention for Chapter 12: Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
20 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective
Chapter number 12
Book title
Computer Security
Published by
Springer, Cham, September 2019
DOI 10.1007/978-3-030-42051-2_12
Book ISBNs
978-3-03-042050-5, 978-3-03-042051-2
Authors

Iason Somarakis, Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, Somarakis, I., Smyrlis, M., Fysarakis, K., Spanoudakis, G., Somarakis, Iason, Smyrlis, Michail, Fysarakis, Konstantinos, Spanoudakis, George

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Doctoral Student 4 20%
Student > Master 4 20%
Student > Ph. D. Student 4 20%
Student > Bachelor 1 5%
Professor 1 5%
Other 2 10%
Unknown 4 20%
Readers by discipline Count As %
Computer Science 11 55%
Business, Management and Accounting 1 5%
Medicine and Dentistry 1 5%
Engineering 1 5%
Unknown 6 30%