{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:04:19Z","timestamp":1750910659503,"version":"3.41.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031973161","type":"print"},{"value":"9783031973178","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97317-8_12","type":"book-chapter","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T08:21:38Z","timestamp":1750839698000},"page":"157-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Developing Adaptive AI Cyber Range Training Modules for\u00a0Critical Infrastructure Sectors"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5127-3891","authenticated-orcid":false,"given":"Christos A.","family":"Gizelis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0799-7910","authenticated-orcid":false,"given":"Nikolaos","family":"Nikoloudakis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7050-1176","authenticated-orcid":false,"given":"Dimitrios","family":"Papanikas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3089-7068","authenticated-orcid":false,"given":"Petros","family":"Panagiotidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5300-8671","authenticated-orcid":false,"given":"Dimitris","family":"Merkouris","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8932-4346","authenticated-orcid":false,"given":"Panagiotis","family":"Mpempis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bayly-Castaneda, K., Ramirez-Montoya, M.S., Morita-Alexander, A.: Crafting personalized learning paths with AI for lifelong learning: a systematic literature review. Front. Educ. 9, 1424386. Frontiers Media SA (2024)","DOI":"10.3389\/feduc.2024.1424386"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Beuran, R., et al.: Integrated framework for hands-on cybersecurity training. Comput. Secur. 78, 43\u201359 (2018)","DOI":"10.1016\/j.cose.2018.06.001"},{"key":"12_CR3","unstructured":"BIMCO: The guidelines on cyber security onboard ships, V4.0. https:\/\/www.bimco.org\/about-us-and-our-members\/publications. Accessed 15 Mar 2025"},{"key":"12_CR4","unstructured":"Bluemke, E., Collins, T., Garfinkel, B., Trask, A.: Exploring the relevance of data privacy-enhancing technologies for AI governance use cases. arXiv preprint arXiv:2303.08956 (2023)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chakraborty, A., Biswas, A., Khan, A.K.: Artificial intelligence for cybersecurity: threats, attacks and mitigation. In: Artificial intelligence for societal issues, pp. 3\u201325. Springer (2023)","DOI":"10.1007\/978-3-031-12419-8_1"},{"issue":"4","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.3390\/app11041809","volume":"11","author":"N Chouliaras","year":"2021","unstructured":"Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., Ferrag, M.A.: Cyber ranges and testbeds for education, training, and research. Appl. Sci. 11(4), 1809 (2021)","journal-title":"Appl. Sci."},{"issue":"5","key":"12_CR7","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1108\/ICS-07-2020-0121","volume":"29","author":"N Chowdhury","year":"2021","unstructured":"Chowdhury, N., Gkioulos, V.: Key competencies for critical infrastructure cyber-security: a systematic literature review. Inf. Comput. Secur. 29(5), 697\u2013723 (2021)","journal-title":"Inf. Comput. Secur."},{"issue":"20","key":"12_CR8","doi-asserted-by":"publisher","first-page":"9509","DOI":"10.3390\/app11209509","volume":"11","author":"T Cruz","year":"2021","unstructured":"Cruz, T., Sim\u00f5es, P.: Down the rabbit hole: fostering active learning through guided exploration of a Scada cyber range. Appl. Sci. 11(20), 9509 (2021)","journal-title":"Appl. Sci."},{"key":"12_CR9","unstructured":"deBeaubien, D.: Ai security essentials for business leaders (2024). https:\/\/www.sans.org\/cyber-security-courses\/ai-security-essentials-business-leaders\/. Accessed 15 March-2025"},{"key":"12_CR10","unstructured":"Dhir, N., Hoeltgebaum, H., Adams, N., Briers, M., Burke, A., Jones, P.: Prospective artificial intelligence approaches for active cyber defence. arXiv preprint arXiv:2104.09981 (2021)"},{"key":"12_CR11","unstructured":"European Parliament and Council of the European Union: Directive (EU) 2022\/2555 of the European parliament and of the council of 14 December 2022 on measures for a high common level of cybersecurity across the union (nis2 directive), https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj Accessed 15 Mar 2025"},{"key":"12_CR12","unstructured":"European Parliament and Council of the European Union: Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (general data protection regulation), https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Accessed 15 Mar 2025"},{"key":"12_CR13","unstructured":"European Union Agency for Cybersecurity (ENISA): Enisa threat landscape 2023. https:\/\/www.enisa.europa.eu\/publications. Accessed 15 Mar 2025"},{"key":"12_CR14","unstructured":"Gupta, M., Mittal, S., Abdelsalam, M.: AI assisted malware analysis: a course for next generation cybersecurity workforce. arXiv preprint arXiv:2009.11101 (2020)"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1108\/JIC-05-2019-0112","volume":"21","author":"W He","year":"2020","unstructured":"He, W., Ash, I., Anwar, M., Li, L., Yuan, X., Xu, L., Tian, X.: Improving employees\u2019 intellectual capacity for cybersecurity through evidence-based malware training. J. Intellect. Cap. 21(2), 203\u2013213 (2020)","journal-title":"J. Intellect. Cap."},{"key":"12_CR16","unstructured":"International Maritime Organization: Msc-fal.1\/circ.3: guidelines on maritime cyber risk management. https:\/\/www.imo.org\/en\/OurWork\/Security\/Pages\/Cyber-security.aspx. Accessed 15 Mar 2025"},{"key":"12_CR17","unstructured":"International Organization for Standardization: Iso\/iec 27001:2022 - information security, cybersecurity and privacy protection \u2013 in-formation security management systems \u2013 requirements, https:\/\/www.iso.org\/standard\/27001. Accessed 15 Mar 2025"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s10207-023-00680-4","volume":"22","author":"MN Katsantonis","year":"2023","unstructured":"Katsantonis, M.N., Manikas, A., Mavridis, I., Gritzalis, D.: Cyber range design framework for cyber security education and training. Int. J. Inf. Secur. 22(4), 1005\u20131027 (2023)","journal-title":"Int. J. Inf. Secur."},{"issue":"9","key":"12_CR19","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.3390\/app10093065","volume":"10","author":"A Kova\u010devi\u0107","year":"2020","unstructured":"Kova\u010devi\u0107, A., Radenkovi\u0107, S.D.: Sawit-security awareness improvement tool in the workplace. Appl. Sci. 10(9), 3065 (2020)","journal-title":"Appl. Sci."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Loupasakis, M., Potamos, G., Stavrou, E.: Revolutionizing social engineering awareness raising, education and training: generative AI-powered investigations in the maritime domain. In: International Conference on Human-Computer Interaction, pp. 70\u201383. Springer (2024)","DOI":"10.1007\/978-3-031-61382-1_5"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Macabante, C., Wei, S., Schuster, D.: Elements of cyber-cognitive situation awareness in organizations. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol.\u00a063, pp. 1624\u20131628. SAGE Publications Sage CA: Los Angeles, CA (2019)","DOI":"10.1177\/1071181319631483"},{"issue":"3","key":"12_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MSP.2021.3055032","volume":"38","author":"S Maghsudi","year":"2021","unstructured":"Maghsudi, S., Lan, A., Xu, J., van Der Schaar, M.: Personalized education in the artificial intelligence era: what to expect next. IEEE Signal Process. Mag. 38(3), 37\u201350 (2021)","journal-title":"IEEE Signal Process. Mag."},{"key":"12_CR23","unstructured":"National Institute of Standards and Technology: Framework for Improving Critical Infrastructure Cybersecurity, Version 2.0. https:\/\/www.nist.gov\/cyberframework. Accessed 15 Mar 2025"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Pang, S., Li, Y.: Artificial intelligence techniques for cyber security applications. Int. J. Adv. Inf. Comm. Technol., 89\u201394 (2020)","DOI":"10.46532\/ijaict-2020021"},{"key":"12_CR25","unstructured":"Payment Card Industry Security Standards Council: Payment Card Industry (PCI) Data Security Standard: Requirements and Security Assessment Procedures, V4.0. https:\/\/www.pcisecuritystandards.org\/document_library. Accessed 15 Mar 2025"},{"issue":"1","key":"12_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40561-019-0089-y","volume":"6","author":"H Peng","year":"2019","unstructured":"Peng, H., Ma, S., Spector, J.M.: Personalized adaptive learning: an emerging pedagogical approach enabled by a smart learning environment. Smart Learn. Environ. 6(1), 1\u201314 (2019). https:\/\/doi.org\/10.1186\/s40561-019-0089-y","journal-title":"Smart Learn. Environ."},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Potamos, G., et al.: Increase maritime cyber situational awareness at a strategic level. In: ICERI2022 Proceedings, pp. 4836\u20134845. IATED (2022)","DOI":"10.21125\/iceri.2022.1167"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Potamos, G., Theodoulou, S., Stavrou, E., Stavrou, S.: Maritime cyber threats detection framework: building capabilities. In: IFIP World Conference on Information Security Education, pp. 107\u2013129. Springer (2022)","DOI":"10.1007\/978-3-031-08172-9_8"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Potamos, G., Theodoulou, S., Stavrou, E., Stavrou, S.: Building maritime cybersecurity capacity against ransomware attacks. In: Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20\u201321 June; Wales, pp. 87\u2013101. Springer (2023)","DOI":"10.1007\/978-981-19-6414-5_6"},{"key":"12_CR30","unstructured":"Rashotte, R.: New AI-focused modules in our security awareness and training service (2025), https:\/\/www.fortinet.com\/blog\/industry-trends\/ai-focused-modules-in-our-security-awareness-and-training-service. Accessed 15 Mar 2025"},{"issue":"3","key":"12_CR31","first-page":"155","volume":"16","author":"M Roshanaei","year":"2024","unstructured":"Roshanaei, M., Khan, M.R., Sylvester, N.N.: Navigating AI cybersecurity: evolving landscape and challenges. J. Intell. Learn. Syst. Appl. 16(3), 155\u2013174 (2024)","journal-title":"J. Intell. Learn. Syst. Appl."},{"key":"12_CR32","unstructured":"SecAwarenessTruss EU Project: https:\/\/secawarenesstruss.eu\/. Accessed 15 Mar 2025"},{"key":"12_CR33","unstructured":"Security Compass: mapping security awareness training to regulatory requirements. https:\/\/www.securitycompass.com\/whitepapers\/security-awareness-training\/. Accessed 15 Mar 2025"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Seda, P., Vykopal, J., \u0160v\u00e1bensk\u1ef3, V., \u010celeda, P.: Reinforcing cybersecurity hands-on training with adaptive learning. In: 2021 IEEE Frontiers in Education Conference (FIE), pp.\u00a01\u20139. IEEE (2021)","DOI":"10.1109\/FIE49875.2021.9637252"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Somarakis, I., Smyrlis, M., Fysarakis, K., Spanoudakis, G.: Model-driven cyber range training: a cyber security assurance perspective. In: International workshop on information and operational technology security systems, pp. 172\u2013184. Springer (2019)","DOI":"10.1007\/978-3-030-42051-2_12"},{"issue":"2","key":"12_CR36","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1108\/DLO-05-2018-0058","volume":"33","author":"AK Upadhyay","year":"2019","unstructured":"Upadhyay, A.K., Khandelwal, K.: Artificial intelligence-based training learning from application. Develop. Learn. Org. Int .J. 33(2), 20\u201323 (2019)","journal-title":"Develop. Learn. Org. Int .J."},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Velasco, C.: Cybercrime and artificial intelligence. an overview of the work of international organizations on criminal justice and the international applicable instruments. In: ERA Forum, vol.\u00a023, pp. 109\u2013126. Springer (2022)","DOI":"10.1007\/s12027-022-00702-z"},{"issue":"2","key":"12_CR38","doi-asserted-by":"publisher","first-page":"679","DOI":"10.3390\/app14020679","volume":"14","author":"W Villegas-Ch","year":"2024","unstructured":"Villegas-Ch, W., Govea, J., Ortiz-Garces, I.: Developing a cybersecurity training environment through the integration of OpenAI and AWS. Appl. Sci. 14(2), 679 (2024)","journal-title":"Appl. Sci."},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Yamin, M.M., Hashmi, E., Ullah, M., Katt, B.: Applications of LLMs for generating cyber security exercise scenarios. IEEE Access (2024)","DOI":"10.21203\/rs.3.rs-3970015\/v1"},{"key":"12_CR40","first-page":"10","volume":"7","author":"T Zaid","year":"2024","unstructured":"Zaid, T., Garai, S.: Emerging trends in cybersecurity: a holistic view on current threats, assessing solutions, and pioneering new frontiers. Blockchain Healthcare Today 7, 10\u201330953 (2024)","journal-title":"Blockchain Healthcare Today"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations. AIAI 2025 IFIP WG 12.5 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97317-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T08:21:48Z","timestamp":1750839708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97317-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031973161","9783031973178"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97317-8_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}