“…In term of hardware based environments, works in[73,65,69,7,88,90,5,39,42] use actual hardware cyber security scenario execution, these scenarios are mostly relate to IoT, SCADA and critical infrastructure. Works in[44,115,10,56,66,67,106,8] use different simulation and modeling techniques for cyber security scenario execution. Details of different event generation tools, like traffic and user behavior, are presented in section 4.4.6 and 4.4.7.Figure8indicates the type of the run time environment that are used in cyber ranges and security testbeds in the last 15 years.…”