An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers
ABSTRACT
Since 2008, Cyberspace is officially regarded as a distinct military domain, along with land, sea, and air for many countries (Goel 2011). The nature of warfare in cyberspace is radically different than traditional warfare: the attacks are more remote, stealthy, and detecting the identity of the adversary may be impossible (Greengard 2010). Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in cyberspace.
AUTHORS
Department of Computer Engineering, Yasar University
Turkey
Cağatay Yücel is a Ph.D. candidate and a Research Assistant at Yasar University. Yücel received his undergraduate Computer Engineering degree from Izmir Institute of Technology in 2009 and earned his M.S. degree in Engineering from Yasar University in 2012, with a thesis entitled “Software Development for Transitions of Graphs from Discrete State into the Continuous State”. His research interests are Information Theory, Cyber Warfare, Cyber Espionage, Cryptography, Computer Forensics, Operating Systems, and Parallel Programming.
Department of Computer Engineering College of Engineering,Yasar University
Turkey
Dr. Koltuksuz earned both his Master’s Degree (1989) and his Ph.D. (1995) from the Computer Engineering Department at Aegean University and was subsequently appointed Assistant Professor. In 1996, he moved to the Department of Computer Engineering at Izmir Institute of Technology, where he became a tenured Associate Professor in 1999. Dr. Koltuksuz established and ran the Information Systems Strategy and Security Laboratory (IS3 Lab) in Iztech. He joined the department of Computer Engineering at the College of Engineering of Yaşar University in September 2009 and is now department head. In the fall of 2012, Dr. Koltuksuz also initiated the Cyber Security Graduate level program and is currently directing it. His research interests include Cryptology, Theory of Numbers, Information Theory, Theory of Computation, Operating Systems, Multicore Architectures, Cyberspace Defense and Security, Open Sources Intelligence Analysis, and Computer Forensics
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive