Realistic simulation of users for IT systems in cyber ranges

Open in new window