Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/121)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024 : Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
The Planning, Development and Execution of Cyberspace Operations in the Digital Information Environment = Küberoperatsioonide planeerimine, arendamine ja läbiviimine digitaalses infokeskkonnas
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The Planning, Development and Execution of Cyberspace Operations in the Digital Information Environment = Küberoperatsioonide planeerimine, arendamine ja läbiviimine digitaalses infokeskkonnas
Number of records 2, displaying
1 - 2
keyword
118
1.
Offensive Cyber Operations
2.
cyber operations
3.
cyber operations exercises
4.
Defensive Cyber Operations
5.
NATO cyber operations definitions
6.
algebraic operations
7.
buck operations
8.
Clean port operations
9.
commercial operations
10.
computer network operations
11.
cyberspace operations planning
12.
digital operations
13.
energy consumption of construction operations
14.
ferry operations
15.
influence operations
16.
Municipal Operations Center
17.
operations research
18.
Port Operations
19.
port operations efficiency
20.
predictive analytics in port operations
21.
psychological operations
22.
security operations center
23.
supply chain operations reference (SCOR)
24.
supply chain operations reference (SCOR) model
25.
Sweedler operations
26.
term operations
27.
autonomous vehicle cyber range
28.
cloud-based cyber-physical systems (C2PS)
29.
cognitive cyber warfare
30.
cyber
31.
Cyber “Maastricht”
32.
cyber architecture
33.
cyber attacks
34.
cyber battle damage assessment
35.
Cyber Bio-analytical Physical Systems (CBPSs)
36.
cyber challenge
37.
cyber command
38.
Cyber Command organisational structure
39.
cyber conflict
40.
cyber contingency
41.
cyber crime
42.
cyber crime pathways
43.
cyber crime scripting
44.
Cyber crisis management
45.
cyber defence
46.
cyber defence exercise
47.
cyber defence exercises
48.
cyber defense education
49.
cyber defense exercise
50.
cyber defense exercises
51.
cyber dependence
52.
cyber diplomacy
53.
cyber exercise
54.
cyber hygiene
55.
cyber impact assessment
56.
cyber incidents
57.
cyber insurance
58.
cyber intrusion detection
59.
cyber kill chain
60.
cyber operation
61.
cyber operation officer
62.
cyber physical energy systems
63.
cyber physical power system (CPPS)
64.
Cyber Physical Production System
65.
cyber physical production systems (CPPS)
66.
cyber physical social system
67.
cyber physical social systems (cpss)
68.
cyber physical system
69.
Cyber Planning tool
70.
cyber power Europe
71.
cyber ranges
72.
cyber red teaming
73.
cyber resilience
74.
cyber risk
75.
cyber security
76.
cyber security education
77.
cyber security exercises
78.
cyber security monitoring
79.
cyber security strategies
80.
cyber situational awareness
81.
cyber stability
82.
cyber team communication
83.
cyber threat
84.
cyber threat communication
85.
Cyber Threat Intelligence
86.
cyber threats
87.
cyber war
88.
cyber warfare
89.
cyber warriors
90.
cyber weapons
91.
cyber-attack
92.
cyber-attack pathways
93.
Cyber-attacks
94.
cyber-insurance
95.
cyber-paternalism
96.
cyber-physical energy systems
97.
cyber-physical social system (CPSS)
98.
cyber-physical system
99.
Cyber-Physical System (CPS)
100.
cyber-physical system logistic robot
101.
cyber-physical systems
102.
Cyber-Physical Systems (CPS)
103.
cyber-risks
104.
cyber-security
105.
cyber-space nexus
106.
cyber-vulnerabilities
107.
EU cyber policy
108.
international cyber norms
109.
military cyber
110.
mobile cyber-physical system
111.
national cyber security strategy
112.
NATO Cyber Range
113.
perceived cyber risks and threats
114.
responsive cyber defence
115.
Socio-Cyber-Physical Systems
116.
space cyber range
117.
technical cyber exercise
118.
Visualising Cyber Planning
subject term
3
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT