[
Andreolini M., Colacino V.G., Colajanni M., Marchetti M., A framework for the evaluation of trainee performance in cyber range exercises, Mobile Networks and Applications, vol. 25, pp. 236–247, 2020.
]Search in Google Scholar
[
Attiah A., Chatterjee M., Zou C.C., A game theoretic approach to model cyber attack and defense strategies, in International Conference on Communications, Kansas City, MO, USA, 2018, pp. 1–7.
]Search in Google Scholar
[
Bock K., Hughey G., Levin D., King of the hill: A novel cybersecurity competition for teaching penetration testing, in USENIX Workshop on Advances in Security Education, Baltimore, MD, 2018.
]Search in Google Scholar
[
Brilingaitė A., Bukauskas L., Juozapavičius A., A framework for competence development and assessment in hybrid cybersecurity exercises, Computers Security, vol. 88, p. 101607, 2020.
]Search in Google Scholar
[
Chindruș C., Căruntu C.F., Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents, 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 2022, pp. 1-7.
]Search in Google Scholar
[
Cheung R.S., Cohen J.P., Lo H.Z., Elia F., Carrillo-Marquez V., Effectiveness of cybersecurity competitions, in International Conference on Security and Management. Las Vegas, USA: The Steering Committee of The World Congress in Computer Science, 2012, p. 1.
]Search in Google Scholar
[
DeCusatis C., Bavaro J., Cannistraci T., Griffin B., Jenkins J., Ronan M., Red-Blue team exercises for cybersecurity training during a pandemic, in IEEE 11th Annual Computing and Communication Workshop and Conference, NV, USA, 2021, pp. 1055–1060.
]Search in Google Scholar
[
Haney J.M., Paul C.L., Toward integrated tactical operations for Red/Blue cyber defense teams, in Workshop on Security Information Workers at Symposium on Usable Privacy and Security, Baltimore, MD, USA, 2018.
]Search in Google Scholar
[
Karjalainen M., Kokkonen T., Comprehensive cyber arena; the next generation cyber range, in IEEE European Symposium on Security and Privacy Workshops, Genoa, Italy, 2020, pp. 11–16.
]Search in Google Scholar
[
Katsantonis M.N., Fouliras P., Mavridis I., Conceptual analysis of cyber security education based on live competitions, in IEEE Global Engineering Education Conference, Athens, Greece, 2017, pp. 771–779.
]Search in Google Scholar
[
Katsantonis M.N., Mavridis I., Gritzalis D., Design and evaluation of cofelet-based approaches for cyber security learning and training, Computers & Security, vol. 105, p. 102263, 2021.
]Search in Google Scholar
[
Khan M.A., Merabet A., Alkaabi S., Sayed H.E., Game-based learning platform to enhance cybersecurity education, Education and Information Technologies, pp. 1–25, 2022.
]Search in Google Scholar
[
Kokkonen T., Puuska S., Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises, in Internet of things, smart spaces, and next generation networks and systems. Cham: Springer, 2018, pp. 277–288.
]Search in Google Scholar
[
Pusey P., Gondree M., Peterson Z., The outcomes of cybersecurity competitions and implications for underrepresented populations, IEEE Security & Privacy, vol. 14, no. 6, pp. 90–95, 2016.
]Search in Google Scholar
[
Seker E., Ozbenli H.H., The concept of cyber defence exercises (cdx): Planning, execution, evaluation, in International Conference on Cyber Security and Protection of Digital Services. Glasgow, UK: IEEE, 2018, pp. 1–9.
]Search in Google Scholar
[
Shen C.C., Chiou Y.-M., Mouza C., Rutherford T., Work-inprogress-design and evaluation of mixed reality programs for cybersecurity education, in 7th International Conference of the Immersive Learning Research Network. Eureka, CA, USA: IEEE, 2021, pp. 1–3.
]Search in Google Scholar
[
Thomas L.J., Balders M., Countney Z., Zhong C., Yao J., Xu C., Cybersecurity education: From beginners to advanced players in cybersecurity competitions, in International Conference on Intelligence and Security Informatics. Shenzhen, China: IEEE, 2019, pp. 149–151.
]Search in Google Scholar
[
Veerasamy N., High-level methodology for carrying out combined Red and Blue teams, in 2nd International Conference on Computer and Electrical Engineering, Dubai, United Arab Emirates, 2009, pp. 416–420.
]Search in Google Scholar
[
Vigna G., Teaching network security through live exercises, in Security Education and Critical Infrastructures, C. Irvine and H. Armstrong, Eds. New York, NY: Springer US, 2003, pp. 3–18.
]Search in Google Scholar
[
Yamin M.M., Katt B., Gkioulos V., Cyber ranges and security testbeds: Scenarios, functions, tools and architecture, Computers Security, vol. 88, p. 101636, 2020.
]Search in Google Scholar
[
Yang P., Gao F., Zhang H., Multi-player evolutionary game of network attack and defense based on system dynamics, Mathematics, vol. 9, no. 23, p. 3014, 2021.
]Search in Google Scholar
[
Zhang H., Jiang L., Huang S., Wang J., Zhang Y., Attack-defense differential game model for network defense strategy selection, IEEE Access, vol. 7, pp. 50 618–50 629, 2018
]Search in Google Scholar