Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Offensive Cyber Operations (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/128)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Competencies required for the offensive cyber operations planners
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
HCI for Cybersecurity, Privacy and Trust : 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024Washington, DC, USA, June 29 – July 4, 2024 : Proceedings, Part II
2024
/
p. 20-39
https://doi.org/10.1007/978-3-031-61382-1_2
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Related publications
1
The Planning, Development and Execution of Cyberspace Operations in the Digital Information Environment = Küberoperatsioonide planeerimine, arendamine ja läbiviimine digitaalses infokeskkonnas
2
journal article EST
/
journal article ENG
Optimizing offensive cyber operation planner‘s development : exploring tailored training paths and framework evolution
Arik, Marko
;
Lugo, Ricardo Gregorio
;
Ottis, Rain
;
Venables, Adrian Nicholas
Frontiers in Computer Science
2024
/
art. 1400360
https://doi.org/10.3389/fcomp.2024.1400360
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
The Planning, Development and Execution of Cyberspace Operations in the Digital Information Environment = Küberoperatsioonide planeerimine, arendamine ja läbiviimine digitaalses infokeskkonnas
Number of records 2, displaying
1 - 2
keyword
124
1.
Offensive Cyber Operations
2.
cyber operations
3.
cyber operations exercises
4.
Defensive Cyber Operations
5.
maritime cyber security operations centers
6.
NATO cyber operations definitions
7.
algebraic operations
8.
buck operations
9.
Clean port operations
10.
commercial operations
11.
computer network operations
12.
cyberspace operations planning
13.
digital operations
14.
energy consumption of construction operations
15.
ferry operations
16.
influence operations
17.
Maritime Security Operations Center (M-SOC)
18.
microgrid operations
19.
Municipal Operations Center
20.
operations research
21.
Port Operations
22.
port operations efficiency
23.
predictive analytics in port operations
24.
psychological operations
25.
security operations center
26.
supply chain operations reference (SCOR)
27.
supply chain operations reference (SCOR) model
28.
Sweedler operations
29.
term operations
30.
autonomous vehicle cyber range
31.
cloud-based cyber-physical systems (C2PS)
32.
cognitive cyber warfare
33.
cyber
34.
Cyber “Maastricht”
35.
cyber architecture
36.
cyber attacks
37.
cyber battle damage assessment
38.
Cyber Bio-analytical Physical Systems (CBPSs)
39.
cyber challenge
40.
cyber command
41.
Cyber Command organisational structure
42.
cyber conflict
43.
cyber contingency
44.
cyber crime
45.
cyber crime pathways
46.
cyber crime scripting
47.
Cyber crisis management
48.
cyber defence
49.
cyber defence exercise
50.
cyber defence exercises
51.
cyber defense education
52.
cyber defense exercise
53.
cyber defense exercises
54.
cyber dependence
55.
cyber diplomacy
56.
cyber exercise
57.
cyber hygiene
58.
cyber impact assessment
59.
cyber incidents
60.
cyber insurance
61.
cyber intrusion detection
62.
cyber kill chain
63.
cyber operation
64.
cyber operation officer
65.
cyber physical energy systems
66.
cyber physical power system (CPPS)
67.
Cyber Physical Production System
68.
cyber physical production systems (CPPS)
69.
cyber physical social system
70.
cyber physical social systems (cpss)
71.
cyber physical system
72.
Cyber Planning tool
73.
cyber power Europe
74.
cyber ranges
75.
cyber red teaming
76.
cyber resilience
77.
cyber resilience at sea
78.
cyber risk
79.
cyber risk management in shipping
80.
cyber security
81.
cyber security education
82.
cyber security exercises
83.
cyber security monitoring
84.
cyber security strategies
85.
cyber situational awareness
86.
cyber stability
87.
cyber team communication
88.
cyber threat
89.
cyber threat communication
90.
Cyber Threat Intelligence
91.
cyber threats
92.
cyber war
93.
cyber warfare
94.
cyber warriors
95.
cyber weapons
96.
cyber-attack
97.
cyber-attack pathways
98.
Cyber-attacks
99.
cyber-insurance
100.
cyber-paternalism
101.
cyber-physical energy systems
102.
cyber-physical social system (CPSS)
103.
cyber-physical system
104.
Cyber-Physical System (CPS)
105.
cyber-physical system logistic robot
106.
cyber-physical systems
107.
Cyber-Physical Systems (CPS)
108.
cyber-risks
109.
cyber-security
110.
cyber-space nexus
111.
cyber-vulnerabilities
112.
EU cyber policy
113.
international cyber norms
114.
maritime cyber security
115.
military cyber
116.
mobile cyber-physical system
117.
national cyber security strategy
118.
NATO Cyber Range
119.
perceived cyber risks and threats
120.
responsive cyber defence
121.
Socio-Cyber-Physical Systems
122.
space cyber range
123.
technical cyber exercise
124.
Visualising Cyber Planning
subject term
4
1.
Cooperative Cyber Defence Centre of Excellence (CCDCOE)
2.
Cyber Battle
3.
Telia Cyber Battle of Estonia
4.
Telia Cyber Battle of Nordic-Baltics
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT