{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:19:20Z","timestamp":1767212360103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031202148"},{"type":"electronic","value":"9783031202155"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20215-5_3","type":"book-chapter","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T11:33:37Z","timestamp":1665747217000},"page":"21-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sector-Specific Training - A Federated Maritime Scenario"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0407-1071","authenticated-orcid":false,"given":"Paloma","family":"de La Vall\u00e9e","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Iosifidis","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Dri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0696-8093","authenticated-orcid":false,"given":"Wim","family":"Mees","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,15]]},"reference":[{"key":"3_CR1","unstructured":"NTT: 2021 Global Threat Intelligence Report. Technical report. https:\/\/services.global.ntt\/en-gb\/insights\/2021-global-threat-intelligence-report"},{"key":"3_CR2","unstructured":"ENISA: ENISA Threat Landscape 2021. Technical report. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2021"},{"key":"3_CR3","unstructured":"Endsley, M.: Situation awareness global assessment technique (SAGAT). In: Proceedings of the IEEE 1988 National Aerospace and Electronics Conference, pp. 789\u2013795 (1988)"},{"issue":"1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"M Endsley","year":"1995","unstructured":"Endsley, M.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37(1), 32\u201364 (1995)","journal-title":"Hum. Factors"},{"issue":"2","key":"3_CR5","first-page":"123","volume":"43","author":"K Aaltola","year":"2019","unstructured":"Aaltola, K., Taitto, P.: Utilising experiential and organizational learning theories to improve human performance in cyber training. Inf. Secur. 43(2), 123\u2013133 (2019)","journal-title":"Inf. Secur."},{"key":"3_CR6","unstructured":"Davis, J., Magrath, S.: A survey of cyber ranges and testbeds. Technical Report Defence Science and Technology, Cyber and Electronic Warfare Division, Australia (2013)"},{"key":"3_CR7","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1007\/978-3-030-44038-1_96","volume-title":"Web, Artificial Intelligence and Network Applications","author":"O Darwish","year":"2020","unstructured":"Darwish, O., Stone, C.M., Karajeh, O., Alsinglawi, B.: Survey of educational cyber ranges. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) WAINA 2020. AISC, vol. 1150, pp. 1037\u20131045. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44038-1_96"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Yamin, M.M., Katt, B., Gkioulos, V.: Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 88, 101636 (2020)","DOI":"10.1016\/j.cose.2019.101636"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., Ferrag, M.: Cyber ranges and TestBeds for education, training, and research. Appl. Sci. 11, 1809 (2021)","DOI":"10.3390\/app11041809"},{"key":"3_CR10","unstructured":"ECSO, WG5 paper: Understanding Cyber Ranges: From Hype to Reality, March 2020. https:\/\/www.ecs-org.eu\/documents\/uploads\/understanding-cyber-ranges-from-hype-to-reality.pdf"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"7148","DOI":"10.3390\/s20247148","volume":"20","author":"E Ukwandu","year":"2020","unstructured":"Ukwandu, E., et al.: A review of cyber-ranges and test-beds: current and future trends. Sensors 20, 7148 (2020)","journal-title":"Sensors"},{"key":"3_CR12","unstructured":"CyberSec4Europe: Cyber Range Federation - The Real Benefits (2021). https:\/\/cybersec4europe.eu\/cyber-range-federation-the-real-benefits\/"},{"key":"3_CR13","unstructured":"EDA: Cyber Ranges Federation Project reaches new milestone (2018). https:\/\/eda.europa.eu\/news-and-events\/news\/2018\/09\/13\/cyber-ranges-federation-project-reaches-new-milestone"},{"key":"3_CR14","unstructured":"Piispanen J.: Technical specification for federation of cyber ranges. Master thesis, JAMK University of Applied Sciences (2018)"},{"key":"3_CR15","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-64758-2_9","volume-title":"Selected Papers from the 12th International Networking Conference","author":"A Peratikou","year":"2021","unstructured":"Peratikou, A., Louca, C., Shiaeles, S., Stavrou, S.: On federated cyber range network interconnection. In: Ghita, B., Shiaeles, S. (eds.) INC 2020. LNNS, vol. 180, pp. 117\u2013128. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-64758-2_9"},{"key":"3_CR16","unstructured":"Nicod\u00e8me, B.: Federated cyber range challenges. Master thesis, Universit\u00e9 Libre de Bruxelles (2020)"},{"key":"3_CR17","unstructured":"Graziano, A.: About federation of cyber ranges, market places and technology innovation (2020). https:\/\/www.linkedin.com\/pulse\/federation-cyber-ranges-market-places-technology-almerindo-graziano"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Varag, C., Cegan, J., Lieskovan, T., Merialdo, M.: The current state of the art and future of European Cyber Range Ecosystem. In: 2021 IEEE International Conference on Cyber Security and Resilience, pp. 390\u2013395 (2021)","DOI":"10.1109\/CSR51186.2021.9527931"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Oikonomou, N., et al.: ECHO federated cyber range: towards next-generation scalable cyber ranges. In: 2021 IEEE International Conference on Cyber Security and Resilience, pp. 403\u2013408 (2021)","DOI":"10.1109\/CSR51186.2021.9527985"},{"key":"3_CR20","unstructured":"European Network of Cybersecurity Centres and Competence Hub for Innovation and Operations (ECHO). https:\/\/echonetwork.eu\/"},{"key":"3_CR21","unstructured":"Fitton, O., Prince, D., Germond, B., Lacy, M.: The future of maritime cyber security. Lancaster University (2015). https:\/\/ssg.lancs.ac.uk\/wp-content\/uploads\/oliver-the-maritime.pdf"},{"key":"3_CR22","unstructured":"Loomis, W., Singh, V., Kessler, G., Bellekens, X.: Signaling for cooperation on maritime cybersecurity. Atlantic Council, Cyber Statecraft Initiative (2021). https:\/\/www.atlanticcouncil.org\/in-depth-research-reports\/report\/cooperation-on-maritime-cybersecurity-a-system-of-systems\/"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Meland, P.H., Bernsmed, K., Wille, E., R\u00f8dseth, \u00d8., Nesheim, D.A.: A retrospective analysis of maritime cyber security incidents. TransNav Int. J. Marine Navig. Saf. Sea Transp. 15, 519\u2013530 (2021)","DOI":"10.12716\/1001.15.03.04"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/BF01867871","volume":"8","author":"JM Teal","year":"1984","unstructured":"Teal, J.M., Howarth, R.W.: Oil spill studies: a review of ecological effects. Environ. Manag. 8, 27\u201343 (1984)","journal-title":"Environ. Manag."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Galierikov\u00e1, A., D\u00e1ivid, A., Materna, M., Mako, P.: Study of maritime accidents with hazardous substances involved: comparison of HNS and oil behaviours in marine environment. Transp. Res. Proc. 55, 1050\u20131064 (2021)","DOI":"10.1016\/j.trpro.2021.07.182"},{"key":"3_CR26","first-page":"1073","volume":"55","author":"A Deja","year":"2021","unstructured":"Deja, A., Ulewicz, R., Kyrychenko, Y.: Analysis and assessment of environmental threats in maritime transport. Transp. Res. Proc. 55, 1073\u20131080 (2021)","journal-title":"Transp. Res. Proc."},{"key":"3_CR27","unstructured":"ENISA: Critical Infrastructures and Services - Maritime. https:\/\/www.enisa.europa.eu\/topics\/critical-information-infrastructures-and-services\/maritime"},{"key":"3_CR28","unstructured":"International Maritime Organization: Maritime cyber risk management in safety management systems (2017). https:\/\/wwwcdn.imo.org\/localresources\/en\/OurWork\/Security\/Documents\/Resolution%20MSC.428(98).pdf"},{"key":"3_CR29","unstructured":"BIMCO et al.: Guidelines to cyber security onboard ships (2020). https:\/\/wwwcdn.imo.org\/localresources\/en\/OurWork\/Security\/Documents\/ANNEX%20Guidelines%20on%20Cyber%20Security%20Onboard%20Ships%20v.4.pdf"},{"key":"3_CR30","unstructured":"ISSA: The Life and Times of Cybersecurity Professionals 2021 (2021). https:\/\/www.issa.org\/cybersecurity-skills-crisis-continues-for-fifth-year-perpetuated-by-lack-of-business-investment\/"},{"key":"3_CR31","unstructured":"Fortinet: 2022 Cybersecurity Skills Gap (2022). https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/reports\/report-2022-skills-gap-survey.pdf?utm_source=pr&utm_campaign=report-2022-skills-gap-survey"},{"key":"3_CR32","unstructured":"ENISA: Addressing skills shortage and gap through higher education (2021). https:\/\/www.enisa.europa.eu\/publications\/addressing-skills-shortage-and-gap-through-higher-education\/@@download\/fullReport"},{"issue":"1","key":"3_CR33","first-page":"16","volume":"3","author":"K Tam","year":"2021","unstructured":"Tam, K., Moara-Nkwe, K., Jones, K.: The use of cyber ranges in the maritime context: assessing maritime-cyber risks, raising awareness, and providing training. Maritime Technol. Res. 3(1), 16\u201330 (2021)","journal-title":"Maritime Technol. Res."},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Potamos, G., Peratikou, A., Stavrou, S.: Towards a maritime cyber range training environment. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 180\u2013185 (2021)","DOI":"10.1109\/CSR51186.2021.9527904"},{"key":"3_CR35","unstructured":"Cyber-Mar: Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain. https:\/\/www.cyber-mar.eu\/"},{"key":"3_CR36","unstructured":"Echo Federated Autumn School. https:\/\/echonetwork.eu\/echo-federated-autumn-school\/"},{"key":"3_CR37","unstructured":"Iosifidis, G., Varbanov, P.: Detection of and response to an attack against the ECDIS on a passenger ship. Course Blueprint, ECHO internal deliverable D2.7 - Annex 3 (2021)"},{"key":"3_CR38","unstructured":"RHEA group. https:\/\/www.rheagroup.com\/document\/citef-pdf-brochure\/"},{"key":"3_CR39","unstructured":"Varbanov, P., et al.: ECHO Cyberskill Framework (2021). https:\/\/echonetwork.eu\/d2-6-hopp\/"},{"issue":"2","key":"3_CR40","doi-asserted-by":"publisher","first-page":"52","DOI":"10.33175\/mtr.2020.190782","volume":"2","author":"V Bertram","year":"2020","unstructured":"Bertram, V., Plowman, T.: Digital training solutions in the maritime context: options and costs. Maritime Technol. Res. 2(2), 52\u201368 (2020)","journal-title":"Maritime Technol. Res."}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20215-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T11:46:56Z","timestamp":1665748016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20215-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031202148","9783031202155"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20215-5_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Communications, Services and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krak\u00f3w","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcss-mult2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mcss2022.kt.agh.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EquinOCS system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}