Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/110)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024, Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
107
1.
Offensive Cyber Operations
2.
cyber operations
3.
Defensive Cyber Operations
4.
algebraic operations
5.
Clean port operations
6.
commercial operations
7.
computer network operations
8.
cyberspace operations planning
9.
digital operations
10.
energy consumption of construction operations
11.
ferry operations
12.
influence operations
13.
Municipal Operations Center
14.
operations research
15.
port operations efficiency
16.
predictive analytics in port operations
17.
psychological operations
18.
security operations center
19.
supply chain operations reference (SCOR)
20.
supply chain operations reference (SCOR) model
21.
Sweedler operations
22.
term operations
23.
autonomous vehicle cyber range
24.
cloud-based cyber-physical systems (C2PS)
25.
cognitive cyber warfare
26.
cyber
27.
Cyber “Maastricht”
28.
cyber architecture
29.
cyber attacks
30.
cyber battle damage assessment
31.
Cyber Bio-analytical Physical Systems (CBPSs)
32.
cyber challenge
33.
cyber command
34.
cyber conflict
35.
cyber contingency
36.
cyber crime
37.
cyber crime pathways
38.
cyber crime scripting
39.
Cyber crisis management
40.
cyber defence
41.
cyber defence exercise
42.
cyber defence exercises
43.
cyber defense education
44.
cyber defense exercise
45.
cyber defense exercises
46.
cyber dependence
47.
cyber diplomacy
48.
cyber exercise
49.
cyber hygiene
50.
cyber impact assessment
51.
cyber incidents
52.
cyber insurance
53.
cyber intrusion detection
54.
cyber kill chain
55.
cyber operation
56.
cyber operation officer
57.
cyber physical energy systems
58.
cyber physical power system (CPPS)
59.
Cyber Physical Production System
60.
cyber physical production systems (CPPS)
61.
cyber physical social system
62.
cyber physical social systems (cpss)
63.
cyber physical system
64.
cyber power Europe
65.
cyber ranges
66.
cyber red teaming
67.
cyber resilience
68.
cyber risk
69.
cyber security
70.
cyber security education
71.
cyber security exercises
72.
cyber security monitoring
73.
cyber security strategies
74.
cyber situational awareness
75.
cyber stability
76.
cyber team communication
77.
cyber threat
78.
cyber threat communication
79.
cyber threats
80.
cyber war
81.
cyber warfare
82.
cyber warriors
83.
cyber weapons
84.
cyber-attack
85.
cyber-attack pathways
86.
cyber-insurance
87.
cyber-paternalism
88.
cyber-physical energy systems
89.
cyber-physical social system (CPSS)
90.
cyber-physical system
91.
Cyber-Physical System (CPS)
92.
cyber-physical system logistic robot
93.
cyber-physical systems
94.
Cyber-Physical Systems (CPS)
95.
cyber-risks
96.
cyber-security
97.
cyber-vulnerabilities
98.
EU cyber policy
99.
international cyber norms
100.
military cyber
101.
mobile cyber-physical system
102.
national cyber security strategy
103.
NATO Cyber Range
104.
perceived cyber risks and threats
105.
responsive cyber defence
106.
Socio-Cyber-Physical Systems
107.
technical cyber exercise
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT