Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/132)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024 : Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
The Planning, Development and Execution of Cyberspace Operations in the Digital Information Environment = Küberoperatsioonide planeerimine, arendamine ja läbiviimine digitaalses infokeskkonnas
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The Planning, Development and Execution of Cyberspace Operations in the Digital Information Environment = Küberoperatsioonide planeerimine, arendamine ja läbiviimine digitaalses infokeskkonnas
Number of records 2, displaying
1 - 2
keyword
128
1.
Offensive Cyber Operations
2.
cyber operations
3.
cyber operations exercises
4.
Defensive Cyber Operations
5.
maritime cyber security operations centers
6.
NATO cyber operations definitions
7.
algebraic operations
8.
buck operations
9.
Clean port operations
10.
commercial operations
11.
computer network operations
12.
cyberspace operations planning
13.
digital operations
14.
energy consumption of construction operations
15.
ferry operations
16.
influence operations
17.
maritime operations
18.
Maritime Security Operations Center (M-SOC)
19.
microgrid operations
20.
Municipal Operations Center
21.
operations research
22.
Port Operations
23.
port operations efficiency
24.
predictive analytics in port operations
25.
psychological operations
26.
security operations center
27.
supply chain operations reference (SCOR)
28.
supply chain operations reference (SCOR) model
29.
Sweedler operations
30.
term operations
31.
automated cyber defense
32.
autonomous vehicle cyber range
33.
cloud-based cyber-physical systems (C2PS)
34.
cognitive cyber warfare
35.
cyber
36.
Cyber “Maastricht”
37.
cyber architecture
38.
cyber attacks
39.
cyber battle damage assessment
40.
Cyber Bio-analytical Physical Systems (CBPSs)
41.
cyber challenge
42.
cyber command
43.
Cyber Command organisational structure
44.
cyber conflict
45.
cyber contingency
46.
cyber crime
47.
cyber crime pathways
48.
cyber crime scripting
49.
Cyber crisis management
50.
cyber defence
51.
cyber defence exercise
52.
cyber defence exercises
53.
cyber defense education
54.
cyber defense exercise
55.
cyber defense exercises
56.
cyber dependence
57.
cyber diplomacy
58.
cyber exercise
59.
cyber hygiene
60.
cyber impact assessment
61.
cyber incidents
62.
cyber insurance
63.
cyber intrusion detection
64.
cyber kill chain
65.
cyber operation
66.
cyber operation officer
67.
cyber physical energy systems
68.
cyber physical power system (CPPS)
69.
Cyber Physical Production System
70.
cyber physical production systems (CPPS)
71.
cyber physical social system
72.
cyber physical social systems (cpss)
73.
cyber physical system
74.
Cyber Planning tool
75.
cyber power Europe
76.
cyber ranges
77.
cyber red teaming
78.
cyber resilience
79.
cyber resilience at sea
80.
cyber risk
81.
cyber risk management in shipping
82.
cyber security
83.
cyber security education
84.
cyber security exercises
85.
cyber security monitoring
86.
cyber security monitoring in maritime
87.
cyber security strategies
88.
cyber situational awareness
89.
cyber stability
90.
cyber team communication
91.
cyber threat
92.
cyber threat communication
93.
Cyber Threat Intelligence
94.
cyber threats
95.
cyber war
96.
cyber warfare
97.
cyber warriors
98.
cyber weapons
99.
cyber-attack
100.
cyber-attack pathways
101.
Cyber-attacks
102.
cyber-insurance
103.
cyber-paternalism
104.
cyber-physical energy systems
105.
cyber-physical social system (CPSS)
106.
cyber-physical system
107.
Cyber-Physical System (CPS)
108.
cyber-physical system logistic robot
109.
cyber-physical system security
110.
cyber-physical systems
111.
Cyber-Physical Systems (CPS)
112.
cyber-risks
113.
cyber-security
114.
cyber-space nexus
115.
cyber-vulnerabilities
116.
EU cyber policy
117.
international cyber norms
118.
maritime cyber security
119.
military cyber
120.
mobile cyber-physical system
121.
national cyber security strategy
122.
NATO Cyber Range
123.
perceived cyber risks and threats
124.
responsive cyber defence
125.
Socio-Cyber-Physical Systems
126.
space cyber range
127.
technical cyber exercise
128.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT