Accesso libero

Emerging Technologies in Critical Infrastructure Protection and Resilience-By-Design: the Case of Cyber Ranges

,  e   
18 set 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Abelian. (2024). Comprehensive Guide to Post-Quantum Cryptography: Types and Applications. Medium. Available at: https://pqabelian.medium.com/comprehensive-guide-to-post-quantum-cryptography-types-and-applications-32dabd971c84. Search in Google Scholar

Alexandru, A., Vevera, V., & Ciupercă, E.M. (2019). National security and critical infrastructure protection. International Conference Knowledge-Based Organization, Vol. 25, No. 1, 8-13. DOI:10.2478/kbo-2019-0001. Search in Google Scholar

Badea, D., Constantinescu, M., Ranf, D.E., & Bucoveţchi, O. (2022). Resilience of critical cultural urban infrastructures (CCUI) in the framework of digital transformations. Some managerial markers. Journal of Defense Resources Management, 13(2), 77-88. Search in Google Scholar

Badea, D., Halmaghi, E.E., Ranf, D.E., & Bucoveţchi, O. (2023). Transforming Urban Resilience. FAIMA Business & Management Journal, 11(3), 30-40. Search in Google Scholar

Bucoveţchi, O., Georgescu, A., Gheorghe, A.V., & Popescu, G. (2024). Understanding Resilience – a Conceptual Framework. Proceedings of the International Conference on Business Excellence, Vol. 18, No. 1, 2377-2385. Sciendo. Search in Google Scholar

Bucoveţchi, O., & Simion, P.C. (2015). Importance of Interdependencies in Critical Infrastructures’ protection. UPB Sci. Bull., Ser. C, 77(1), 301-309. Search in Google Scholar

Cîrnu, C.E., Rotună, C.I., Vevera, A.V., & Boncea, R. (2018). Measures to Mitigate Cybersecurity Risks and Vulnerabilities in Service-Oriented Architecture. Studies in Informatics and Control, ISSN 1220-1766, Vol. 27(3), 359-368. Available at: https://doi.org/10.24846/v27i3y201811. Search in Google Scholar

CyberArk (2024). Infosecs Guide to Post-Quantum Readiness. Available at: https://www.cyberark.com/resources/ebooks/infosecs-guide-to-post-quantum-readiness. Search in Google Scholar

CybExer (2023). Cyber ranges and Digital Twins. CybExer. Available at: https://cybexer.com/blog/cyber-ranges-and-digital-twins. Search in Google Scholar

CyberSec4Europe Project. (n.d.). Available at: https://cybersec4europe.eu/. Search in Google Scholar

CYRESRANGE Project. (n.d.). Available at: https://cyresrange.net/. Search in Google Scholar

Dargan. (2024). Quantum Cybersecurity Explained: Comprehensive Guide. The Quantum Insider. Available at: https://thequantuminsider.com/2024/03/13/quantum-cybersecurity-explained-comprehensive-guide/. Search in Google Scholar

Dinu, A., & Cîrnu, C.E. (2024). Empowering National Cybersecurity: The CYRESRANGE Project. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 6(1), 75-83. Available at: https://doi.org/10.54851/v6i1y202408. Search in Google Scholar

Dinu, A., Vasile, P.C., & Georgescu, A. (2024). AI-driven solutions for cybersecurity: comparative analysis and ethical aspects. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 34(3), 35-48. Available: https://doi.org/10.33436/v34i3y202403. Search in Google Scholar

Dumitrache, M., Sandu, I.E., Rotună, C-I, & Cohal, A. (2022). Blockchain-era eGovernment services. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 32(1), 7-18. Available at: https://doi.org/10.33436/v32i1y202201. Search in Google Scholar

European Cyber Security Organization ‒ ECSO. (2020). WG5 PAPER Understanding Cyber Ranges: From Hype to Reality. SWG 5.1 Cyber Range Environments and Technical Exercises. Available at: https://ecs-org.eu/ecso-uploads/2023/05/2020_SWG-5.1_paper_UnderstandingCyberRanges_final_v1.0-update.pdf. Search in Google Scholar

ECHO Project. (n.d.). Available at: https://www.echonetwork.eu/. Search in Google Scholar

Gambetta, J. (2022). Expanding the IBM Quantum roadmap to anticipate the future of quantum-centric supercomputing. IBM website. Available at: https://www.ibm.com/quantum/blog/ibm-quantum-roadmap-2025. Search in Google Scholar

Georgescu, A., & Cîrnu, C.E. (2019). Blockchain and Critical Infrastructures -Challenges and Opportunities. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 1(1), 93-100. Search in Google Scholar

Gheorghe, A.V., & Polinpapilinho F.K. (2023). Gamification for Resilience: Resilient Informed Decision Making. John Wiley & Sons, 2023. Search in Google Scholar

Gheorghe, A., Vamanu, D.V., Katina, P., & Pulfer, R. (2018). Critical Infrastructures, Key Resources, Key Assets: Risk, Vulnerability, Resilience, Fragility, and Perception Governance, Topics in Safety, Risk, Reliability and Quality. Springer International Publishing. Available at: https://doi.org/10.1007/978-3-319-69224-1. Search in Google Scholar

Immersive (2024). Immersive Labs Unveils GenAI-Powered Cyber Exercise Creator to Rapidly Prepare Workforces for Threats. Immersive. Available at: https://www.immersivelabs.com/resources/press/ai-scenario-generator. Search in Google Scholar

Ji, Y., Wang, R., Ngo, K., Dubrova, E., & Backlund, L. (2023). A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber. 2023 IEEE European Test Symposium (ETS), Venice, Italy, 1-5. DOI: 10.1109/ETS56758.2023.10174000. Search in Google Scholar

Kianpour, M., Kowalski, S., Zoto, E., Frantz, C., & Øverby, H. (2019). Designing Serious Games for Cyber Ranges: A Socio-technical Approach. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 85-93. DOI: 10.1109/EuroSPW.2019.00016. Search in Google Scholar

Kovaci, P-D, & Iacob, N.M. (2024). Artificial Intelligence and OSINT. Considerations and Challenges. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 6(2), 45-51. Available at: https://doi.org/10.54851/v6i2y202404. Search in Google Scholar

KPMG (2024). Quantum is coming — and bringing new cybersecurity threats with it. Available at: https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-andcybersecurity.html. Search in Google Scholar

McFly, S., Peterson, J., & Reynolds, T. (2022). Distributed Energy Resource Cybersecurity Framework and Cyber Range Integration. National Renewable Energy Laboratory, NREL/TP-5R00-82545, Golden, Colorado, USA. Available at: https://www.nrel.gov/docs/fy22osti/82545.pdf. Search in Google Scholar

McKinsey (2024). What is digital-twin technology?. McKinsey & Co. Available at: https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-digital-twin-technology. Search in Google Scholar

National Institute for Standards and Technology. (2018). Cyber Ranges. Available at: https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdf. Search in Google Scholar

Pescaroli, G., & Alexander, D. (2016). Critical infrastructure, panarchies and the vulnerability paths of cascading disasters. Nat Hazards 82, 175-192. Available at: https://doi.org/10.1007/s11069-016-2186-3. Search in Google Scholar

Petcu, I., Candet, I.B., Ştefănescu, C., Gruia, C.I., & Craioveanu, V. (2021). Security Risks of Cloud Computing Services from the New Cybernetics’ Threats Perspective. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 3(1), 89-97. Search in Google Scholar

Rotună, C.I., Dumitrache, M., & Sandu, I.E. (2022). Assessment of Machine Learning algorithms for automated monitoring. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 32(3), 73-84. Available at: https://doi.org/10.33436/v32i3y202206. Search in Google Scholar

Sambucci, L., & Paraschiv, E-A. (2024). The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 34(3), 131-148. Available at: https://doi.org/10.33436/v34i3y202410. Search in Google Scholar

Schmidt, E. (coord.) (2021). Final Report - National Security Commission on Artificial Intelligence. NSCAI. Washington DC, US. Available at: https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf. Search in Google Scholar

Soviany, S., & Gheorghe, C.G. (2023). The QKD (Quantum Key Distribution) Application in Cyber Security. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 5(2), 87-101. Available at: https://doi.org/10.54851/v5i2y202309. Search in Google Scholar

Soviany, S., Gheorghe, C.G., & Gheorghe-Moisii, M. (2024). Quantum Networks and Cyber Security. A Simulation Case Study for Point-to-Point QKD Links. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 6(2), 27-43. Available at: https://doi.org/10.54851/v6i2y202403. Search in Google Scholar

Vacusta, B., & Nica, C. (2023) Blockchain and Cyber-Security: the Opportunity to Develop a National Data Analysis Platform to Ensure National Security and Financial Stability. Romanian Cyber Security Journal, Vol. 5(2), 65-74. Available at: https://rocys.ici.ro/documents/109/Art._7_ROCYS_2_2023.pdf. Search in Google Scholar

Vasuthanasub, J., Bucoveţchi, O., Stanciu, R.D., & Badea, D. (2019). Serious gaming towards learning of future city management. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 29(3), 41-50. Available at: https://doi.org/10.33436/v29i3y201904. Search in Google Scholar

Vevera, A.V., Cîrnu, C.E., & Rădulescu, C.Z. (2022). A multi-criteria approach for the calculation of a complex indicator of Cyber Security and Digital Development. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 32(4), 19-32. Available at: https://doi.org/10.33436/v32i4y202202. Search in Google Scholar