{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:32:09Z","timestamp":1773329529212,"version":"3.50.1"},"reference-count":103,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:00Z","timestamp":1749686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Cyber ranges have become essential platforms for realistic cybersecurity training, research, and development. Existing taxonomies often describe the functional aspects of cyber ranges\u2014scenario design, team configurations, and evaluation metrics\u2014 focusing less on the underlying technologies that enable modern training. In this paper, we highlight the current trends and persistent gaps in the existing literature and propose a taxonomy that decouples functional capabilities from the enabling infrastructure, adding a dedicated Technology dimension. We derived and refined this taxonomy through an iterative literature mapping process, culminating in a proposed taxonomy that highlights key emerging trends such as cyber\u2013physical integration, federation across multiple sites, and AI-driven orchestration. Key findings include the identification of clear convergences and divergences in existing taxonomies and concrete recommendations for future research directions, such as integrating socio-technical considerations and conducting systematic empirical validation. Our framework aims to guide researchers, developers, and practitioners in designing, implementing, and comparing cyber range solutions. An online Taxonomy Mapping Toolkit is developed to allow the cyber ranges research community to take advantage of the proposed taxonomy and build upon it as new advancements emerge.<\/jats:p>","DOI":"10.3390\/fi17060259","type":"journal-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T11:47:07Z","timestamp":1749728827000},"page":"259","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Systematic Review of Cyber Range Taxonomies: Trends, Gaps, and a Proposed Taxonomy"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7003-5175","authenticated-orcid":false,"given":"Pilleriin","family":"Lillemets","sequence":"first","affiliation":[{"name":"DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark"}]},{"given":"Nabaa","family":"Bashir Jawad","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark"}]},{"given":"Joseph","family":"Kashi","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark"}]},{"given":"Ahmad","family":"Sabah","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-2990","authenticated-orcid":false,"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[{"name":"DTU Compute, Technical University of Denmark, 2800 Kongens Lyngby, Denmark"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,12]]},"reference":[{"key":"ref_1","unstructured":"National Institute of Standards and Technology (2018). Cyber Rages, National Institute of Standards and Technology. Technical Report."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Chouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., and Ferrag, M.A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Appl. Sci., 11.","DOI":"10.3390\/app11041809"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., Jones, K., Hallaq, B., Nicholson, A., Smith, R., and Maglaras, L. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS\/SCADA Systems, 1, IGI Global Scientific Publishing.","DOI":"10.4018\/978-1-5225-5634-3.ch033"},{"key":"ref_4","first-page":"1032","article-title":"Cybersecurity of Cyber Ranges: Threats and Mitigations","volume":"12","author":"Noponen","year":"2022","journal-title":"Int. J. Inf. Secur. Res. (IJISR)"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"103383","DOI":"10.1016\/j.cose.2023.103383","article-title":"A systematic literature review on wireless security testbeds in the cyber-physical realm","volume":"133","author":"Kampourakis","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Nurcan, S., Opdahl, A.L., Mouratidis, H., and Tsohou, A. (2023, January 23\u201326). Secure Infrastructure for Cyber-Physical Ranges. Proceedings of the Research Challenges in Information Science: Information Science and the Connected World, Corfu, Greece.","DOI":"10.1007\/978-3-031-33080-3"},{"key":"ref_7","first-page":"103917","article-title":"A step-by-step definition of a reference architecture for cyber ranges","volume":"88","author":"Kampourakis","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_8","unstructured":"Davis, J., and Magrath, S. (2013). A Survey of Cyber Ranges and Testbeds, Cyber Electronic Warfare Division DSTO Defence Science and Technology Organisation. Technical Report."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1057\/ejis.2012.26","article-title":"A method for taxonomy development and its application in information systems","volume":"22","author":"Nickerson","year":"2013","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_10","unstructured":"Bailey, K.D. (2003). Typologies and Taxonomies: An Introduction to Classification Techniques, Sage Publ. [nachdr. ed.]. Number 102 in Sage University Papers Quantitative Applicatons in the Social SCIENCES."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"101636","DOI":"10.1016\/j.cose.2019.101636","article-title":"Cyber ranges and security testbeds: Scenarios, functions, tools and architecture","volume":"88","author":"Yamin","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ukwandu, E., Farah, M.A.B., Hindy, H., Brosset, D., Kavallieros, D., Atkinson, R., Tachtatzis, C., Bures, M., Andonovic, I., and Bellekens, X. (2020). A Review of Cyber-Ranges and Test-Beds: Current and Future Trends. Sensors, 20.","DOI":"10.3390\/s20247148"},{"key":"ref_13","unstructured":"Casola, V., De Benedictis, A., and Rak, M. (2020, January 9\u201311). Enabling Next-Generation Cyber Ranges with Mobile Security Components. Proceedings of the Testing Software and Systems, Naples, Italy."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Rouquette, R., Beau, S., Yamin, M.M., Mohib, U., and Katt, B. (2023, January 14\u201316). Automatic and Realistic Traffic Generation In A Cyber Range. Proceedings of the 2023 10th International Conference on Future Internet of Things and Cloud (FiCloud), Marrakesh, Morocco.","DOI":"10.1109\/FiCloud58648.2023.00058"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103202","DOI":"10.1016\/j.cose.2023.103202","article-title":"DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range","volume":"129","author":"Du","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Doussau, A., Souyris, C.C.P., Yamin, M.M., Katt, B., and Ullah, M. (2023, January 8\u201310). Intelligent Contextualized Network Traffic Generator in a Cyber Range. Proceedings of the 2023 17th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, Thailand.","DOI":"10.1109\/SITIS61268.2023.00012"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Saito, T., Takahashi, S., Sato, J., Matsunoki, M., Kanmachi, T., Yamada, S., and Yajima, K. (2023, January 18\u201319). Development of Cyber Ranges for Operational Technology. Proceedings of the 2023 8th International Conference on Business and Industrial Research (ICBIR), Bangkok, Thailand.","DOI":"10.1109\/ICBIR57571.2023.10147612"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.procs.2024.08.012","article-title":"Securing MQTT: Unveiling vulnerabilities and innovating cyber range solutions","volume":"241","author":"Kombate","year":"2024","journal-title":"Procedia Comput. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shin, Y., Kwon, H., Jeong, J., and Shin, D. (2024). A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats. Electronics, 13.","DOI":"10.3390\/electronics13193867"},{"key":"ref_20","unstructured":"Keil, S., Lasch, R., Lindner, F., and Lohmer, J. Training the Human-in-the-Loop in Industrial Cyber Ranges. Proceedings of the Digital Transformation in Semiconductor Manufacturing."},{"key":"ref_21","first-page":"287","article-title":"Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber\/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience","volume":"53","author":"Sharkov","year":"2022","journal-title":"Inf. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G., and Ioannidis, S. (2020, January 14\u201318). Towards the Monitoring and Evaluation of Trainees\u2019 Activities in Cyber Ranges. Proceedings of the Model-Driven Simulation and Training Environments for Cybersecurity (MSTEC), Guildford, UK.","DOI":"10.1007\/978-3-030-62433-0"},{"key":"ref_23","unstructured":"Ciuperca, E., Stanciu, A., and C\u00eernu, C. (2021, January 8\u20139). Postmodern Education and Technological Development. Cyber Range as a Tool for Developing Cyber Security Skills. Proceedings of the INTED2021 Proceedings, 15th International Technology, Education and Development Conference 2021, Online Conference."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Oh, S.K., Stickney, N., Hawthorne, D., and Matthews, S.J. (2020, January 7\u20139). Teaching Web-Attacks on a Raspberry Pi Cyber Range. Proceedings of the 21st Annual Conference on Information Technology Education (SIGITE\u201920), Virtual.","DOI":"10.1145\/3368308.3415364"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shangting, M., and Quan, P. (2021, January 22\u201324). Industrial cyber range based on QEMU-IOL. Proceedings of the 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), Shenyang, China.","DOI":"10.1109\/ICPECA51329.2021.9362692"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"n160","DOI":"10.1136\/bmj.n160","article-title":"PRISMA 2020 explanation and elaboration: Updated guidance and exemplars for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Okoli, C. (2015). A Guide to Conducting a Standalone Systematic Literature Review. Commun. Assoc. Inf. Syst., 37.","DOI":"10.17705\/1CAIS.03743"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1080\/10749039.2000.9677652","article-title":"Invisible Mediators of Action: Classification and the Ubiquity of Standards","volume":"7","author":"Bowker","year":"2000","journal-title":"Mind Cult. Act."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Wohlin, C. (2014, January 13\u201314). Guidelines for snowballing in systematic literature studies and a replication in software engineering. Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, London, UK. (EASE\u201914).","DOI":"10.1145\/2601248.2601268"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G., and Ioannidis, S. (2020, January 14\u201318). Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems. Proceedings of the Model-Driven Simulation and Training Environments for Cybersecurity, Guildford, UK. Second International Workshop (MSTEC 2020).","DOI":"10.1007\/978-3-030-62433-0"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Glas, M., Vielberth, M., and Pernul, G. (2023, January 23\u201328). Train as you Fight: Evaluating Authentic Cybersecurity Training in Cyber Ranges. Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI\u201923), Hamburg, Germany.","DOI":"10.1145\/3544548.3581046"},{"key":"ref_32","unstructured":"Bergan, S., and Ruud, E.M. (2021). Otnetic: A Cyber Range Training Platform Developed for the Norwegian Energy Sector. [Master\u2019s Thesis, University of Agder]."},{"key":"ref_33","first-page":"149","article-title":"Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities","volume":"50","author":"Pavlova","year":"2021","journal-title":"Inf. Secur."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Oruc, A., Gkioulos, V., and Katsikas, S. (2022). Towards a Cyber-Physical Range for the Integrated Navigation System (INS). J. Mar. Sci. Eng., 10.","DOI":"10.3390\/jmse10010107"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ear, E., Remy, J.L.C., and Xu, S. (August, January 31). Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy.","DOI":"10.1109\/CSR57506.2023.10224940"},{"key":"ref_36","first-page":"1173","article-title":"Architectural development of a cyber-physical manufacturing range","volume":"35","author":"Evans","year":"2023","journal-title":"Manuf. Lett."},{"key":"ref_37","unstructured":"P\u00e4ij\u00e4nen, J. (2023). Pre-assessing Cyber Range-Based Event Participants\u2019mNeeds and Objectives, 2023. [Master\u2019s Thesis, JAMK: University of Applied Sciences]. Available online: http:\/\/www.theseus.fi\/handle\/10024\/816339."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bistene, J.V., Chagas, C.E.d., Santos, A.F.P.d., and Salles, R.M. (2024). Modeling Network Traffic Generators for Cyber Ranges: A Systematic Literature Review, ACM.","DOI":"10.21203\/rs.3.rs-4041751\/v1"},{"key":"ref_39","unstructured":"Shamaya, N., and Tarcheh, G. (2024). Strengthening Cyber Defense: A Comparative Study of Smart Home Infrastructure for Penetration Testing and National Cyber Ranges, KTH School of Engineering Sciences in Chemistry, Biotechnology and Health."},{"key":"ref_40","unstructured":"Bostr\u00f6m, A., and Hylander, A. (2024). Selecting Better Attacks for Cyber Defense Exercises: Criteria to Enhance Cyber Range Content, Link\u00f6ping University, Department of Computer and Information Science."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Stamatopoulos, D., Katsantonis, M., Fouliras, P., and Mavridis, I. (2024). Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. Future Internet, 16.","DOI":"10.3390\/fi16070231"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ni, T., Zhang, X., Zuo, C., Li, J., Yan, Z., Wang, W., Xu, W., Luo, X., and Zhao, Q. (2023, January 22\u201324). Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. Proceedings of the 2023 IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA.","DOI":"10.1109\/SP46215.2023.10179322"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"11549","DOI":"10.1109\/TMC.2024.3401096","article-title":"Manipulating Voice Assistants Eavesdropping via Inherent Vulnerability Unveiling in Mobile Systems","volume":"23","author":"Huang","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_44","unstructured":"Ni, T., Lan, G., Wang, J., Zhao, Q., and Xu, W. (2023, January 9\u201311). Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting. Proceedings of the 32nd USENIX Security Symposium, Anaheim, CA, USA."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Ni, T., Zhang, X., and Zhao, Q. (2023, January 26\u201330). Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS), Copenhagen, Denmark.","DOI":"10.1145\/3576915.3623153"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1109\/TMC.2022.3216851","article-title":"MagSign: Harnessing Dynamic Magnetism for User Authentication on IoT Devices","volume":"23","author":"Cao","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"4874","DOI":"10.1109\/TIFS.2025.3563069","article-title":"Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism","volume":"20","author":"Cao","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TMC.2022.3216868","article-title":"HandKey: Knocking-Triggered Robust Vibration Signature for Keyless Unlocking","volume":"23","author":"Cao","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"7215","DOI":"10.1109\/JIOT.2022.3228819","article-title":"LiveProbe: Exploring Continuous Voice Liveness Detection via Phonemic Energy Response Patterns","volume":"10","author":"Cao","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1007\/s10207-023-00680-4","article-title":"Cyber range design framework for cyber security education and training","volume":"22","author":"Katsantonis","year":"2023","journal-title":"Int. J. Inf. Secur."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Lieskovan, T., and Hajn\u00fd, J. (2021, January 17\u201320). Building Open Source Cyber Range To Teach Cyber Security. Proceedings of the Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES\u201921), Vienna, Austria.","DOI":"10.1145\/3465481.3469188"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"102635","DOI":"10.1016\/j.cose.2022.102635","article-title":"Modeling and executing cyber security exercise scenarios in cyber ranges","volume":"116","author":"Yamin","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Drevin, L., Miloslavskaya, N., Leung, W.S., and von Solms, S. (2022). ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics. Information Security Education\u2014Adapting to the Fourth Industrial Revolution, Springer. WISE 2022.","DOI":"10.1007\/978-3-031-08172-9"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Balto, K.E., Yamin, M.M., Shalaginov, A., and Katt, B. (2023). Hybrid IoT Cyber Range. Sensors, 23.","DOI":"10.3390\/s23063071"},{"key":"ref_55","unstructured":"Priyadarshini, I. (2018). Features and Architecture of The Modern Cyber Range: A Qualitative Analysis and Survey. [Ph.D. Thesis, Cornell University]."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Yang, H., Chen, T., Bai, Y., Li, F., Li, M., and Yang, R. (2021, January 17\u201319). Research and Implementation of User Behavior Simulation Technology Based on Power Industry Cyber Range. Proceedings of the 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), Chongqing, China.","DOI":"10.1109\/ICIBA52610.2021.9688007"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Smyrlis, M., Somarakis, I., Spanoudakis, G., Hatzivasilis, G., and Ioannidis, S. (2021). CYRA: A Model-Driven CYber Range Assurance Platform. Appl. Sci., 11.","DOI":"10.3390\/app11115165"},{"key":"ref_58","first-page":"5","article-title":"AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes","volume":"50","author":"Tagarev","year":"2021","journal-title":"Inf. Secur."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Russo, E., Ribaudo, M., Orlich, A., Longo, G., and Armando, A. (2023, January 4). Cyber Range and Cyber Defense Exercises: Gamification Meets University Students. Proceedings of the 2nd International Workshop on Gamification in Software Development, Verification, and Validation (Gamify 2023), San Francisco, CA, USA.","DOI":"10.1145\/3617553.3617888"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Diakoumakos, J., Chaskos, E., Kolokotronis, N., and Lepouras, G. (2021, January 26\u201328). Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527972"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Chaskos, E., Diakoumakos, J., Kolokotronis, N., Lepouras, G., Chaskos, E., Diakoumakos, J., Kolokotronis, N., and Lepouras, G. (2022). Gamification Mechanisms in Cyber Range and Cyber Security Training Environments: A Review, 1, IGI Global Scientific Publishing.","DOI":"10.1145\/3538969.3543819"},{"key":"ref_62","unstructured":"Tizio, G.D., Massacci, F., Allodi, L., Dashevskyi, S., and Mirkovic, J. (2020, January 7\u201311). An Experimental Approach for Estimating Cyber Risk: A Proposal Building upon Cyber Ranges and Capture the Flags. Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Stephanidis, C., Kurosu, M., Chen, J.Y.C., Fragomeni, G., Streitz, N., Konomi, S., Degen, H., and Ntoa, S. (2021, January 22\u201327). Toward AI-Based Scenario Management for Cyber Range Training. Proceedings of the HCI International 2021\u2014Late Breaking Papers: Multimodality, eXtended Reality, and Artificial Intelligence, Gothenburg, Sweden.","DOI":"10.1007\/978-3-030-90963-5"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Abie, H., Gkioulos, V., Katsikas, S., and Pirbhulal, S. (2024, January 25). Methodology for Automating Attacking Agents in Cyber Range Training Platforms. Proceedings of the Secure and Resilient Digital Transformation of Healthcare, Bergen, Norway.","DOI":"10.1007\/978-3-031-85558-0"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/s00502-023-01146-0","article-title":"Cyber range scenario for smart grid security training","volume":"140","author":"Lieskovan","year":"2023","journal-title":"Elektrotech. Inftech."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Mekhilef, S., Shaw, R.N., and Siano, P. (2022, January 8\u20139). CRaaS: Cyber Range as a Service. Proceedings of the Innovations in Electrical and Electronic Engineering, New Delhi, India.","DOI":"10.1007\/978-981-19-1742-4"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Damianou, A., Mazi, M.S., Rizos, G., Voulgaridis, A., and Votis, K. (2024, January 2\u20134). Situational Awareness Scoring System in Cyber Range Platforms. Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK.","DOI":"10.1109\/CSR61664.2024.10679451"},{"key":"ref_68","unstructured":"Lazarov, W., Janek, S., Martinasek, Z., and Fujdiak, R. (August, January 30). Event-based Data Collection and Analysis in the Cyber Range Environment. Proceedings of the 19th International Conference on Availability, Reliability and Security (ARES\u201924), Vienna, Austria."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Park, M., Lee, H., Kim, Y., Kim, K., and Shin, D. (2022). Design and Implementation of Multi-Cyber Range for Cyber Training and Testing. Appl. Sci., 12.","DOI":"10.3390\/app122412546"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-030-24268-8_42","article-title":"High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range","volume":"Volume 11635","author":"Sun","year":"2019","journal-title":"Artificial Intelligence and Security"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TLT.2021.3091904","article-title":"Cyber Range for Research-Inspired Learning of \u201cAttack Defense by Pretense\u201d Principle and Practice","volume":"14","author":"Vekaria","year":"2021","journal-title":"IEEE Trans. Learn. Technol."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G., Ioannidis, S., Smyrlis, M., Spanoudakis, G., Frati, F., Braghin, C., Damiani, E., Koshutanski, H., Tsakirakis, G., and Hildebrandt, T. (2021, January 26\u201328). The THREAT-ARREST Cyber Range Platform. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527963"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Serrano, M.A., Fern\u00e1ndez-Medina, E., Alcaraz, C., Castro, N.D., and Calvo, G. (2021). Exploring the Affordances of Multimodal Data to Improve Cybersecurity Training with Cyber Range Environments. Colecci\u00f3n Jornadas y Congresos, Ediciones de la Universidad de Castilla-La Mancha.","DOI":"10.18239\/jornadas_2021.34.00"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Karjalainen, M., and Kokkonen, T. (2020, January 16\u201318). Comprehensive Cyber Arena; The Next Generation Cyber Range. Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy.","DOI":"10.1109\/EuroSPW51379.2020.00011"},{"key":"ref_75","first-page":"129","article-title":"A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber\/Hybrid Exercising","volume":"50","author":"Sharkov","year":"2021","journal-title":"Inf. Secur."},{"key":"ref_76","unstructured":"Linardos, V. (2021). Development of a Cyber Range Platform. [Master\u2019s Thesis, University of Piraeus]."},{"key":"ref_77","unstructured":"H\u00e4tty, N. (2019). Representing Attacks in a Cyber Range. [Master\u2019s Thesis, Link\u00f6ping University]."},{"key":"ref_78","unstructured":"Wang, Y. (2023). An Attribution Method for Alerts in an Educational Cyber Range Based on Graph Database. [Master\u2019s Thesis, Kth Royal Institute of Technology]."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Orbinato, V. (2021, January 25\u201328). A next-generation platform for Cyber Range-as-a-Service. Proceedings of the 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Wuhan, China.","DOI":"10.1109\/ISSREW53611.2021.00094"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.sysarc.2019.04.004","article-title":"Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios","volume":"97","author":"Ficco","year":"2019","journal-title":"J. Syst. Archit."},{"key":"ref_81","first-page":"36","article-title":"Automating Cyber-Range Virtual Networks Deployment Using Open-Source Technologies (Chef Software)","volume":"20","year":"2020","journal-title":"Econ. Inform."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Kim, I., Park, M., Lee, H.J., Jang, J., Lee, S., and Shin, D. (2024). A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework. Information, 15.","DOI":"10.3390\/info15010018"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-030-70852-8_12","article-title":"Cyber Range Automation Overview with a Case Study of CRATE","volume":"Volume 12556","author":"Asplund","year":"2021","journal-title":"Secure IT Systems"},{"key":"ref_84","unstructured":"Luise, A., Perrone, G., Perrotta, C., and Romano, S.P. (2022, January 7\u20139). On-demand deployment and orchestration of Cyber Ranges in the Cloud. Proceedings of the ITASEC 2021: Italian Conference on Cyber Security, Online."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Guerrero, G., Betarte, G., and Campo, J.D. (2024, January 18\u201320). Tectonic: An Academic Cyber Range. Proceedings of the 2024 IEEE Biennial Congress of Argentina (ARGENCON), San Nicol\u00e1s de los Arroyos, Argentina.","DOI":"10.1109\/ARGENCON62399.2024.10735713"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"61","DOI":"10.58346\/JOWUA.2022.I4.004","article-title":"Automating the Generation of Cyber Range Virtual Scenarios with VSDL","volume":"13","author":"Costa","year":"2022","journal-title":"JOWUA"},{"key":"ref_87","unstructured":"Jadu\u0161, B. (2021). Web Interface for Adaptive Training at the KYPO Cyber Range Platform. [Master\u2019s Thesis, Masaryk University]."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MIM.2022.9847127","article-title":"Detecting Cyber Attacks through Measurements: Learnings from a Cyber Range","volume":"25","author":"Mahmoud","year":"2022","journal-title":"IEEE Instrum. Meas. Mag."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Oikonomou, N., Mengidis, N., Spanopoulos-Karalexidis, M., Voulgaridis, A., Merialdo, M., Raisr, I., Hanson, K., de La Vallee, P., Tsikrika, T., and Vrochidis, S. (2021, January 26\u201328). ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527985"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"101837","DOI":"10.1016\/j.cose.2020.101837","article-title":"Building next generation Cyber Ranges with CRACK","volume":"95","author":"Russo","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_91","unstructured":"Thampi, S.M., Wang, G., Rawat, D.B., Ko, R., and Fan, C.I. (2020, January 14\u201317). Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. Proceedings of the Security in Computing and Communications, Online."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Vir\u00e1g, C., \u010cegan, J., Lieskovan, T., and Merialdo, M. (2021, January 26\u201328). The Current State of The Art and Future of European Cyber Range Ecosystem. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527931"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"He, Y., Yan, L., Liu, J., Bai, D., Chen, Z., Yu, X., Gao, D., and Zhu, J. (2019, January 21\u201324). Design of Information System Cyber Security Range Test System for Power Industry. Proceedings of the 2019 IEEE Innovative Smart Grid Technologies\u2014Asia (ISGT Asia), Chengdu, China.","DOI":"10.1109\/ISGT-Asia.2019.8881739"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Capone, D., Caturano, F., Delicato, A., Perrone, G., and Romano, S.P. (2022, January 20\u201322). Dockerized Android: A container-based platform to build mobile Android scenarios for Cyber Ranges. Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic.","DOI":"10.1109\/ICECET55527.2022.9872834"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Katsikas, S., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Ugarelli, R., Pra\u00e7a, I., Li, W., Meng, W., and Furnell, S. (2023, January 25\u201329). Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms. Proceedings of the Computer Security. ESORICS 2023 International Workshops, The Hague, The Netherlands.","DOI":"10.1007\/978-3-031-54129-2"},{"key":"ref_96","unstructured":"Farhat, H. (2021). Design and Development of the Back-End Software Architecture for a Hybrid Cyber Range. [Master\u2019s Thesis, Politecnico di Torino]."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Beuran, R., Zhang, Z., and Tan, Y. (2022, January 6\u201310). AWS EC2 Public Cloud Cyber Range Deployment. Proceedings of the 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy.","DOI":"10.1109\/EuroSPW55150.2022.00051"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Fu, Y., Han, W., and Yuan, D. (2022, January 18\u201320). Orchestrating Heterogeneous Cyber-range Event Chains With Serverless-container Workflow. Proceedings of the 2022 30th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Nice, France.","DOI":"10.1109\/MASCOTS56607.2022.00021"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Akhgar, B., Kavallieros, D., and Sdongos, E. (2021). Cyber Ranges: The New Training Era in the Cybersecurity and Digital Forensics World. Technology Development for Security Practitioners, Springer International Publishing.","DOI":"10.1007\/978-3-030-69460-9"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Ciurea, C., Pocatilu, P., and Filip, F.G. (2022, January 26\u201327). Cyber Range Technology Stack Review. Proceedings of the Education, Research and Business Technologies, Bucharest, Romania.","DOI":"10.1007\/978-981-19-6755-9"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Chng, B., Ng, B., Roomi, M.M., Mashima, D., and Lou, X. (2024, January 17\u201320). CRaaS: Cloud-based Smart Grid Cyber Range for Scalable Cybersecurity Experiments and Training. Proceedings of the 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Oslo, Norway.","DOI":"10.1109\/SmartGridComm60555.2024.10738051"},{"key":"ref_102","unstructured":"Dracotus, X. (2021). Automated Cloud Cyber Range Deployments. [Master\u2019s Thesis, University of Aegean, Department of Information and Communication Systems Engineering]."},{"key":"ref_103","unstructured":"Seem, J.A. (2020). Towards a Scenario Ontology for the Norwegian Cyber Range. [Master\u2019s Thesis, NTNU]."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/6\/259\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/6\/259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,12]]},"references-count":103,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["fi17060259"],"URL":"https:\/\/doi.org\/10.3390\/fi17060259","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,12]]}}}