Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/119)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024 : Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
116
1.
Offensive Cyber Operations
2.
cyber operations
3.
cyber operations exercises
4.
Defensive Cyber Operations
5.
NATO cyber operations definitions
6.
algebraic operations
7.
buck operations
8.
Clean port operations
9.
commercial operations
10.
computer network operations
11.
cyberspace operations planning
12.
digital operations
13.
energy consumption of construction operations
14.
ferry operations
15.
influence operations
16.
Municipal Operations Center
17.
operations research
18.
Port Operations
19.
port operations efficiency
20.
predictive analytics in port operations
21.
psychological operations
22.
security operations center
23.
supply chain operations reference (SCOR)
24.
supply chain operations reference (SCOR) model
25.
Sweedler operations
26.
term operations
27.
autonomous vehicle cyber range
28.
cloud-based cyber-physical systems (C2PS)
29.
cognitive cyber warfare
30.
cyber
31.
Cyber “Maastricht”
32.
cyber architecture
33.
cyber attacks
34.
cyber battle damage assessment
35.
Cyber Bio-analytical Physical Systems (CBPSs)
36.
cyber challenge
37.
cyber command
38.
Cyber Command organisational structure
39.
cyber conflict
40.
cyber contingency
41.
cyber crime
42.
cyber crime pathways
43.
cyber crime scripting
44.
Cyber crisis management
45.
cyber defence
46.
cyber defence exercise
47.
cyber defence exercises
48.
cyber defense education
49.
cyber defense exercise
50.
cyber defense exercises
51.
cyber dependence
52.
cyber diplomacy
53.
cyber exercise
54.
cyber hygiene
55.
cyber impact assessment
56.
cyber incidents
57.
cyber insurance
58.
cyber intrusion detection
59.
cyber kill chain
60.
cyber operation
61.
cyber operation officer
62.
cyber physical energy systems
63.
cyber physical power system (CPPS)
64.
Cyber Physical Production System
65.
cyber physical production systems (CPPS)
66.
cyber physical social system
67.
cyber physical social systems (cpss)
68.
cyber physical system
69.
cyber power Europe
70.
cyber ranges
71.
cyber red teaming
72.
cyber resilience
73.
cyber risk
74.
cyber security
75.
cyber security education
76.
cyber security exercises
77.
cyber security monitoring
78.
cyber security strategies
79.
cyber situational awareness
80.
cyber stability
81.
cyber team communication
82.
cyber threat
83.
cyber threat communication
84.
Cyber Threat Intelligence
85.
cyber threats
86.
cyber war
87.
cyber warfare
88.
cyber warriors
89.
cyber weapons
90.
cyber-attack
91.
cyber-attack pathways
92.
Cyber-attacks
93.
cyber-insurance
94.
cyber-paternalism
95.
cyber-physical energy systems
96.
cyber-physical social system (CPSS)
97.
cyber-physical system
98.
Cyber-Physical System (CPS)
99.
cyber-physical system logistic robot
100.
cyber-physical systems
101.
Cyber-Physical Systems (CPS)
102.
cyber-risks
103.
cyber-security
104.
cyber-space nexus
105.
cyber-vulnerabilities
106.
EU cyber policy
107.
international cyber norms
108.
military cyber
109.
mobile cyber-physical system
110.
national cyber security strategy
111.
NATO Cyber Range
112.
perceived cyber risks and threats
113.
responsive cyber defence
114.
Socio-Cyber-Physical Systems
115.
space cyber range
116.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT