{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:12:51Z","timestamp":1776939171798,"version":"3.51.4"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016646","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Towards the Design of Cyber Range Training Programs for Enhanced Preparedness: Investigating the Training Needs in Critical Infrastructures"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2745-1958","authenticated-orcid":false,"given":"Evangelos","family":"Floros","sequence":"first","affiliation":[{"name":"Hellenic Mediterranean University,Department of Management Science and Technology,Ag. Nikolaos,Greece"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,Nicosia,Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9527-516X","authenticated-orcid":false,"given":"Michail","family":"Smyrlis","sequence":"additional","affiliation":[{"name":"Sphynx Technology Solutions AG,Nicosia,Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0799-7910","authenticated-orcid":false,"given":"Nikolaos","family":"Nikoloudakis","sequence":"additional","affiliation":[{"name":"Public Power Corporation S.A.,Athens,Greece"}]},{"given":"George","family":"Potamos","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,Nicosia,Cyprus"}]},{"given":"Athanasios","family":"Apostolidis","sequence":"additional","affiliation":[{"name":"ZELUS,Athens,Greece"}]},{"given":"Panagiotis","family":"Bempis","sequence":"additional","affiliation":[{"name":"Process Improvement Directorate OTE Group OTE (HTO) S.A,Athens,Greece"}]},{"given":"Athanasios","family":"Grigoriadis","sequence":"additional","affiliation":[{"name":"MINISTRY OF NATIONAL DEFENCE,Athens,Greece"}]},{"given":"Konstantinos","family":"Magkos","sequence":"additional","affiliation":[{"name":"National Cybersecurity Authority,Athens,Greece"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5300-8671","authenticated-orcid":false,"given":"Dimitris","family":"Merkouris","sequence":"additional","affiliation":[{"name":"Public Power Corporation S.A.,Athens,Greece"}]},{"given":"Georgios","family":"Spanoudakis","sequence":"additional","affiliation":[{"name":"Sphynx Technology Solutions AG,Zug,Switzerland"}]},{"given":"Stavros","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,Nicosia,Cyprus"}]},{"given":"Stelios","family":"Trikos","sequence":"additional","affiliation":[{"name":"National CSIRT-CY Digital Security Authority,Nicosia,Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8314-504X","authenticated-orcid":false,"given":"Stelios E.","family":"Papadakis","sequence":"additional","affiliation":[{"name":"Hellenic Mediterranean University,Laboratory of Data Science, Multimedia and Modelling,Department of Management Science and Technology,Ag. Nikolaos,Greece"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The ENISA Threat Landscape (ETL) Report 2024, European Union Agency for Cybersecurity"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-181r1"},{"key":"ref3","first-page":"329","article-title":"Cyber Range Architecture for Improving Cybersecurity Training and Exercise","volume-title":"Proc. 2017 European Conf. Cyber Warfare and Security (ECCWS)","author":"Mavroeidis","year":"2017"},{"key":"ref4","volume-title":"European Commission, Cybersecurity Skills Development in the EU"},{"key":"ref5","volume-title":"Cybersecurity Education and Training: Awareness Raising Initiatives in the EU, European Union Agency for Network and Information Security","year":"2014"},{"issue":"10","key":"ref6","first-page":"923","article-title":"The Evolution of the Internet of Things Industry and Market: A Cross-Sectional Analysis","volume":"42","author":"Kshetri","year":"2018","journal-title":"Telecommunications Policy"},{"key":"ref7","volume-title":"SecAwarenessTruss (GA:101128049)"},{"key":"ref8","volume-title":"Cyber Range Exercises for Industrial Control Systems Security","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.32727\/8.2023.30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.04.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.2151"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102892"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943509"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101607"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101636"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011087"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/app11115165"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08172-9_8"},{"key":"ref22","year":"2024","journal-title":"Cyber Range Features Checklist & List of European Providers"},{"key":"ref23","article-title":"Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics","author":"Albert","year":"2013","journal-title":"Newnes"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5220\/0010450204630473"},{"issue":"8","key":"ref25","first-page":"982","article-title":"Technology Acceptance Model","volume":"35","author":"Davis","year":"1989","journal-title":"J. Manag. Sci."},{"key":"ref26","volume-title":"EU Survey: The European Commission\u2019s Online Survey Management Tool"},{"key":"ref27","first-page":"1","volume-title":"General Data Protection Regulation (GDPR), Regulation (EU) 2016\/679, Official J. Eur. Union, L119","year":"2016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BESC59560.2023.10386988"},{"key":"ref29","volume-title":"Foresight Cybersecurity Threats for 2030: Update 2024 - Extended Report"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","location":"London, United Kingdom","start":{"date-parts":[[2025,4,22]]},"end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016646.pdf?arnumber=11016646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:09:37Z","timestamp":1749013777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016646","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}