[
Abelian. (2024). Comprehensive Guide to Post-Quantum Cryptography: Types and Applications. Medium. Available at: https://pqabelian.medium.com/comprehensive-guide-to-post-quantum-cryptography-types-and-applications-32dabd971c84.
]Search in Google Scholar
[
Alexandru, A., Vevera, V., & Ciupercă, E.M. (2019). National security and critical infrastructure protection. International Conference Knowledge-Based Organization, Vol. 25, No. 1, 8-13. DOI:10.2478/kbo-2019-0001.
]Search in Google Scholar
[
Badea, D., Constantinescu, M., Ranf, D.E., & Bucoveţchi, O. (2022). Resilience of critical cultural urban infrastructures (CCUI) in the framework of digital transformations. Some managerial markers. Journal of Defense Resources Management, 13(2), 77-88.
]Search in Google Scholar
[
Badea, D., Halmaghi, E.E., Ranf, D.E., & Bucoveţchi, O. (2023). Transforming Urban Resilience. FAIMA Business & Management Journal, 11(3), 30-40.
]Search in Google Scholar
[
Bucoveţchi, O., Georgescu, A., Gheorghe, A.V., & Popescu, G. (2024). Understanding Resilience – a Conceptual Framework. Proceedings of the International Conference on Business Excellence, Vol. 18, No. 1, 2377-2385. Sciendo.
]Search in Google Scholar
[
Bucoveţchi, O., & Simion, P.C. (2015). Importance of Interdependencies in Critical Infrastructures’ protection. UPB Sci. Bull., Ser. C, 77(1), 301-309.
]Search in Google Scholar
[
Cîrnu, C.E., Rotună, C.I., Vevera, A.V., & Boncea, R. (2018). Measures to Mitigate Cybersecurity Risks and Vulnerabilities in Service-Oriented Architecture. Studies in Informatics and Control, ISSN 1220-1766, Vol. 27(3), 359-368. Available at: https://doi.org/10.24846/v27i3y201811.
]Search in Google Scholar
[
CyberArk (2024). Infosec’s Guide to Post-Quantum Readiness. Available at: https://www.cyberark.com/resources/ebooks/infosecs-guide-to-post-quantum-readiness.
]Search in Google Scholar
[
CybExer (2023). Cyber ranges and Digital Twins. CybExer. Available at: https://cybexer.com/blog/cyber-ranges-and-digital-twins.
]Search in Google Scholar
[
CyberSec4Europe Project. (n.d.). Available at: https://cybersec4europe.eu/.
]Search in Google Scholar
[
CYRESRANGE Project. (n.d.). Available at: https://cyresrange.net/.
]Search in Google Scholar
[
Dargan. (2024). Quantum Cybersecurity Explained: Comprehensive Guide. The Quantum Insider. Available at: https://thequantuminsider.com/2024/03/13/quantum-cybersecurity-explained-comprehensive-guide/.
]Search in Google Scholar
[
Dinu, A., & Cîrnu, C.E. (2024). Empowering National Cybersecurity: The CYRESRANGE Project. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 6(1), 75-83. Available at: https://doi.org/10.54851/v6i1y202408.
]Search in Google Scholar
[
Dinu, A., Vasile, P.C., & Georgescu, A. (2024). AI-driven solutions for cybersecurity: comparative analysis and ethical aspects. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 34(3), 35-48. Available: https://doi.org/10.33436/v34i3y202403.
]Search in Google Scholar
[
Dumitrache, M., Sandu, I.E., Rotună, C-I, & Cohal, A. (2022). Blockchain-era eGovernment services. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 32(1), 7-18. Available at: https://doi.org/10.33436/v32i1y202201.
]Search in Google Scholar
[
European Cyber Security Organization ‒ ECSO. (2020). WG5 PAPER Understanding Cyber Ranges: From Hype to Reality. SWG 5.1 Cyber Range Environments and Technical Exercises. Available at: https://ecs-org.eu/ecso-uploads/2023/05/2020_SWG-5.1_paper_UnderstandingCyberRanges_final_v1.0-update.pdf.
]Search in Google Scholar
[
ECHO Project. (n.d.). Available at: https://www.echonetwork.eu/.
]Search in Google Scholar
[
Gambetta, J. (2022). Expanding the IBM Quantum roadmap to anticipate the future of quantum-centric supercomputing. IBM website. Available at: https://www.ibm.com/quantum/blog/ibm-quantum-roadmap-2025.
]Search in Google Scholar
[
Georgescu, A., & Cîrnu, C.E. (2019). Blockchain and Critical Infrastructures -Challenges and Opportunities. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 1(1), 93-100.
]Search in Google Scholar
[
Gheorghe, A.V., & Polinpapilinho F.K. (2023). Gamification for Resilience: Resilient Informed Decision Making. John Wiley & Sons, 2023.
]Search in Google Scholar
[
Gheorghe, A., Vamanu, D.V., Katina, P., & Pulfer, R. (2018). Critical Infrastructures, Key Resources, Key Assets: Risk, Vulnerability, Resilience, Fragility, and Perception Governance, Topics in Safety, Risk, Reliability and Quality. Springer International Publishing. Available at: https://doi.org/10.1007/978-3-319-69224-1.
]Search in Google Scholar
[
Immersive (2024). Immersive Labs Unveils GenAI-Powered Cyber Exercise Creator to Rapidly Prepare Workforces for Threats. Immersive. Available at: https://www.immersivelabs.com/resources/press/ai-scenario-generator.
]Search in Google Scholar
[
Ji, Y., Wang, R., Ngo, K., Dubrova, E., & Backlund, L. (2023). A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber. 2023 IEEE European Test Symposium (ETS), Venice, Italy, 1-5. DOI: 10.1109/ETS56758.2023.10174000.
]Search in Google Scholar
[
Kianpour, M., Kowalski, S., Zoto, E., Frantz, C., & Øverby, H. (2019). Designing Serious Games for Cyber Ranges: A Socio-technical Approach. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 85-93. DOI: 10.1109/EuroSPW.2019.00016.
]Search in Google Scholar
[
Kovaci, P-D, & Iacob, N.M. (2024). Artificial Intelligence and OSINT. Considerations and Challenges. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 6(2), 45-51. Available at: https://doi.org/10.54851/v6i2y202404.
]Search in Google Scholar
[
KPMG (2024). Quantum is coming — and bringing new cybersecurity threats with it. Available at: https://kpmg.com/xx/en/our-insights/ai-and-technology/quantum-andcybersecurity.html.
]Search in Google Scholar
[
McFly, S., Peterson, J., & Reynolds, T. (2022). Distributed Energy Resource Cybersecurity Framework and Cyber Range Integration. National Renewable Energy Laboratory, NREL/TP-5R00-82545, Golden, Colorado, USA. Available at: https://www.nrel.gov/docs/fy22osti/82545.pdf.
]Search in Google Scholar
[
McKinsey (2024). What is digital-twin technology?. McKinsey & Co. Available at: https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-digital-twin-technology.
]Search in Google Scholar
[
National Institute for Standards and Technology. (2018). Cyber Ranges. Available at: https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdf.
]Search in Google Scholar
[
Pescaroli, G., & Alexander, D. (2016). Critical infrastructure, panarchies and the vulnerability paths of cascading disasters. Nat Hazards 82, 175-192. Available at: https://doi.org/10.1007/s11069-016-2186-3.
]Search in Google Scholar
[
Petcu, I., Candet, I.B., Ştefănescu, C., Gruia, C.I., & Craioveanu, V. (2021). Security Risks of Cloud Computing Services from the New Cybernetics’ Threats Perspective. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 3(1), 89-97.
]Search in Google Scholar
[
Rotună, C.I., Dumitrache, M., & Sandu, I.E. (2022). Assessment of Machine Learning algorithms for automated monitoring. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 32(3), 73-84. Available at: https://doi.org/10.33436/v32i3y202206.
]Search in Google Scholar
[
Sambucci, L., & Paraschiv, E-A. (2024). The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 34(3), 131-148. Available at: https://doi.org/10.33436/v34i3y202410.
]Search in Google Scholar
[
Schmidt, E. (coord.) (2021). Final Report - National Security Commission on Artificial Intelligence. NSCAI. Washington DC, US. Available at: https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf.
]Search in Google Scholar
[
Soviany, S., & Gheorghe, C.G. (2023). The QKD (Quantum Key Distribution) Application in Cyber Security. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 5(2), 87-101. Available at: https://doi.org/10.54851/v5i2y202309.
]Search in Google Scholar
[
Soviany, S., Gheorghe, C.G., & Gheorghe-Moisii, M. (2024). Quantum Networks and Cyber Security. A Simulation Case Study for Point-to-Point QKD Links. Romanian Cyber Security Journal, ISSN 2668-6430, Vol. 6(2), 27-43. Available at: https://doi.org/10.54851/v6i2y202403.
]Search in Google Scholar
[
Vacusta, B., & Nica, C. (2023) Blockchain and Cyber-Security: the Opportunity to Develop a National Data Analysis Platform to Ensure National Security and Financial Stability. Romanian Cyber Security Journal, Vol. 5(2), 65-74. Available at: https://rocys.ici.ro/documents/109/Art._7_ROCYS_2_2023.pdf.
]Search in Google Scholar
[
Vasuthanasub, J., Bucoveţchi, O., Stanciu, R.D., & Badea, D. (2019). Serious gaming towards learning of future city management. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 29(3), 41-50. Available at: https://doi.org/10.33436/v29i3y201904.
]Search in Google Scholar
[
Vevera, A.V., Cîrnu, C.E., & Rădulescu, C.Z. (2022). A multi-criteria approach for the calculation of a complex indicator of Cyber Security and Digital Development. Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, Vol. 32(4), 19-32. Available at: https://doi.org/10.33436/v32i4y202202.
]Search in Google Scholar