Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/113)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024, Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
110
1.
Offensive Cyber Operations
2.
cyber operations
3.
Defensive Cyber Operations
4.
NATO cyber operations definitions
5.
algebraic operations
6.
Clean port operations
7.
commercial operations
8.
computer network operations
9.
cyberspace operations planning
10.
digital operations
11.
energy consumption of construction operations
12.
ferry operations
13.
influence operations
14.
Municipal Operations Center
15.
operations research
16.
port operations efficiency
17.
predictive analytics in port operations
18.
psychological operations
19.
security operations center
20.
supply chain operations reference (SCOR)
21.
supply chain operations reference (SCOR) model
22.
Sweedler operations
23.
term operations
24.
autonomous vehicle cyber range
25.
cloud-based cyber-physical systems (C2PS)
26.
cognitive cyber warfare
27.
cyber
28.
Cyber “Maastricht”
29.
cyber architecture
30.
cyber attacks
31.
cyber battle damage assessment
32.
Cyber Bio-analytical Physical Systems (CBPSs)
33.
cyber challenge
34.
cyber command
35.
cyber conflict
36.
cyber contingency
37.
cyber crime
38.
cyber crime pathways
39.
cyber crime scripting
40.
Cyber crisis management
41.
cyber defence
42.
cyber defence exercise
43.
cyber defence exercises
44.
cyber defense education
45.
cyber defense exercise
46.
cyber defense exercises
47.
cyber dependence
48.
cyber diplomacy
49.
cyber exercise
50.
cyber hygiene
51.
cyber impact assessment
52.
cyber incidents
53.
cyber insurance
54.
cyber intrusion detection
55.
cyber kill chain
56.
cyber operation
57.
cyber operation officer
58.
cyber physical energy systems
59.
cyber physical power system (CPPS)
60.
Cyber Physical Production System
61.
cyber physical production systems (CPPS)
62.
cyber physical social system
63.
cyber physical social systems (cpss)
64.
cyber physical system
65.
cyber power Europe
66.
cyber ranges
67.
cyber red teaming
68.
cyber resilience
69.
cyber risk
70.
cyber security
71.
cyber security education
72.
cyber security exercises
73.
cyber security monitoring
74.
cyber security strategies
75.
cyber situational awareness
76.
cyber stability
77.
cyber team communication
78.
cyber threat
79.
cyber threat communication
80.
cyber threats
81.
cyber war
82.
cyber warfare
83.
cyber warriors
84.
cyber weapons
85.
cyber-attack
86.
cyber-attack pathways
87.
cyber-insurance
88.
cyber-paternalism
89.
cyber-physical energy systems
90.
cyber-physical social system (CPSS)
91.
cyber-physical system
92.
Cyber-Physical System (CPS)
93.
cyber-physical system logistic robot
94.
cyber-physical systems
95.
Cyber-Physical Systems (CPS)
96.
cyber-risks
97.
cyber-security
98.
cyber-space nexus
99.
cyber-vulnerabilities
100.
EU cyber policy
101.
international cyber norms
102.
military cyber
103.
mobile cyber-physical system
104.
national cyber security strategy
105.
NATO Cyber Range
106.
perceived cyber risks and threats
107.
responsive cyber defence
108.
Socio-Cyber-Physical Systems
109.
space cyber range
110.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT