Unveiling the user requirements of a cyber range for 5G security testing and training.
Anna AngelogianniIlias PolitisPier Luigi PolvanesiAntonio PastorChristos XenakisPublished in: CAMAD (2021)
Keyphrases
- user requirements
- cyber security
- end users
- cyber defense
- testing phase
- intrusion detection
- cyber crime
- wide range
- training phase
- fault injection
- information security
- training set
- test set
- security mechanisms
- network security
- security policies
- security requirements
- training process
- data sets
- test cases
- access control
- online learning
- information systems
- statistical databases
- range data
- information sharing
- key management
- security analysis
- training samples
- cyber attacks
- identity theft
- user interface