An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers

ABSTRACT

Since 2008, Cyberspace is officially regarded as a distinct military domain, along with land, sea, and air for many countries (Goel 2011). The nature of warfare in cyberspace is radically different than traditional warfare: the attacks are more remote, stealthy, and detecting the identity of the adversary may be impossible (Greengard 2010). Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in cyberspace.


AUTHORS

Department of Computer Engineering, Yasar University
Turkey

Cağatay Yücel is a Ph.D. candidate and a Research Assistant at Yasar University. Yücel received his undergraduate Computer Engineering degree from Izmir Institute of Technology in 2009 and earned his M.S. degree in Engineering from Yasar University in 2012, with a thesis entitled “Software Development for Transitions of Graphs from Discrete State into the Continuous State”. His research interests are Information Theory, Cyber Warfare, Cyber Espionage, Cryptography, Computer Forensics, Operating Systems, and Parallel Programming.

Department of Computer Engineering College of Engineering,Yasar University
Turkey

Dr. Koltuksuz earned both his Master’s Degree (1989) and his Ph.D. (1995) from the Computer Engineering Department at Aegean University and was subsequently appointed Assistant Professor. In 1996, he moved to the Department of Computer Engineering at Izmir Institute of Technology, where he became a tenured Associate Professor in 1999. Dr. Koltuksuz established and ran the Information Systems Strategy and Security Laboratory (IS3 Lab) in Iztech. He joined the department of Computer Engineering at the College of Engineering of Yaşar University in September 2009 and is now department head. In the fall of 2012, Dr. Koltuksuz also initiated the Cyber Security Graduate level program and is currently directing it. His research interests include Cryptology, Theory of Numbers, Information Theory, Theory of Computation, Operating Systems, Multicore Architectures, Cyberspace Defense and Security, Open Sources Intelligence Analysis, and Computer Forensics

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com