Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/117)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024 : Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
114
1.
Offensive Cyber Operations
2.
cyber operations
3.
cyber operations exercises
4.
Defensive Cyber Operations
5.
NATO cyber operations definitions
6.
algebraic operations
7.
Clean port operations
8.
commercial operations
9.
computer network operations
10.
cyberspace operations planning
11.
digital operations
12.
energy consumption of construction operations
13.
ferry operations
14.
influence operations
15.
Municipal Operations Center
16.
operations research
17.
Port Operations
18.
port operations efficiency
19.
predictive analytics in port operations
20.
psychological operations
21.
security operations center
22.
supply chain operations reference (SCOR)
23.
supply chain operations reference (SCOR) model
24.
Sweedler operations
25.
term operations
26.
autonomous vehicle cyber range
27.
cloud-based cyber-physical systems (C2PS)
28.
cognitive cyber warfare
29.
cyber
30.
Cyber “Maastricht”
31.
cyber architecture
32.
cyber attacks
33.
cyber battle damage assessment
34.
Cyber Bio-analytical Physical Systems (CBPSs)
35.
cyber challenge
36.
cyber command
37.
Cyber Command organisational structure
38.
cyber conflict
39.
cyber contingency
40.
cyber crime
41.
cyber crime pathways
42.
cyber crime scripting
43.
Cyber crisis management
44.
cyber defence
45.
cyber defence exercise
46.
cyber defence exercises
47.
cyber defense education
48.
cyber defense exercise
49.
cyber defense exercises
50.
cyber dependence
51.
cyber diplomacy
52.
cyber exercise
53.
cyber hygiene
54.
cyber impact assessment
55.
cyber incidents
56.
cyber insurance
57.
cyber intrusion detection
58.
cyber kill chain
59.
cyber operation
60.
cyber operation officer
61.
cyber physical energy systems
62.
cyber physical power system (CPPS)
63.
Cyber Physical Production System
64.
cyber physical production systems (CPPS)
65.
cyber physical social system
66.
cyber physical social systems (cpss)
67.
cyber physical system
68.
cyber power Europe
69.
cyber ranges
70.
cyber red teaming
71.
cyber resilience
72.
cyber risk
73.
cyber security
74.
cyber security education
75.
cyber security exercises
76.
cyber security monitoring
77.
cyber security strategies
78.
cyber situational awareness
79.
cyber stability
80.
cyber team communication
81.
cyber threat
82.
cyber threat communication
83.
Cyber Threat Intelligence
84.
cyber threats
85.
cyber war
86.
cyber warfare
87.
cyber warriors
88.
cyber weapons
89.
cyber-attack
90.
cyber-attack pathways
91.
cyber-insurance
92.
cyber-paternalism
93.
cyber-physical energy systems
94.
cyber-physical social system (CPSS)
95.
cyber-physical system
96.
Cyber-Physical System (CPS)
97.
cyber-physical system logistic robot
98.
cyber-physical systems
99.
Cyber-Physical Systems (CPS)
100.
cyber-risks
101.
cyber-security
102.
cyber-space nexus
103.
cyber-vulnerabilities
104.
EU cyber policy
105.
international cyber norms
106.
military cyber
107.
mobile cyber-physical system
108.
national cyber security strategy
109.
NATO Cyber Range
110.
perceived cyber risks and threats
111.
responsive cyber defence
112.
Socio-Cyber-Physical Systems
113.
space cyber range
114.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT