Repository logoGCRIS
  • English
  • Türkçe
  • Русский
Log In
New user? Click here to register. Have you forgotten your password?
Home
Communities
Browse GCRIS
Entities
Overview
GCRIS Guide
  1. Home
  2. Browse by Author

Browsing by Author "Kademi, Anas Mu'azu"

Filter results by typing the first few letters
Now showing 1 - 4 of 4
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Article
    Citation - WoS: 2
    Dynamic Cyberspace Modeling from Network Automata
    (INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS, 2020) Anas Mu'azu Kademi; Ahmet Koltuksuz; Kademi, Anas Mu'azu; Koltuksuz, Ahmet
    Cyberspace which is a complex system constitutes dynamic networks of various interacting entities such as cyber-physical systems and world-wide-web of information. The quest for principles underlying the structural organization and dynamics of cyberspace often uses a Top-down approach and no general framework for describing categorizing and analyzing its inherent properties has been established. This paper proposes a network cellular automata framework characterizing and modeling cyberspace derived from the intrinsic constructs of cyberspace-entities space and time. Employing network (graph) theories for spatial topology and generalized cellular automata depicting the dynamic process we provide a novel foundation for formal cyberspace modeling. Subsequently A network automata a generalization of standard Cellular automata is defined with a cyberspatial map which is a mathematical generalization of cyberspatial object characterizing the dynamic and structure of cyber-physical systems. Consequently the cyberspatial map is found to be homomorphic to the network automata.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 1
    Formal characterization of cyberspace for cyber lexicon development
    (Curran Associates Inc., 2017) Anas Maazu Kademi; Ahmet Hasan Koltuksuz; Kademi, Anas Mu'azu; Koltuksuz, Ahmet; M. Scanlon , N.-A. Le-Khac
    Inadequate formalisation or theoretical perspective is a sign of new domain which also holds in cyberspace and its related areas (cyber warfare etc.). The development of which could solve the problems in lexicon lack of consensus and provides a ground truth for general analysis and further development. Cyberspace is a complex domain in which the structure (topology) dynamics and the functional processes are interwoven. Hence it is no wonder that lack of consensus persists when using terms. In order to support the generalisation of cyberspace theory a formalization and a solid foundation are essential. In addition to pave a way for an introduction of a formal proofs and development of rigorous terminologies it is paramount to have a formal mathematical definition of the domain that take account of the domain's topology functional process and dynamics in time. Most complex systems even biological ones exhibit a layered structure which comes useful in deciphering the complexity at least in an understandable level. This paper pointed that cyberspace can be represented as a layered structure of entities and hierarchy of terms. This perception is chosen as the basis for a formal cyberspace framework and characterisation. Thus we offer a cyberspace formalization consisting of a topological characterisation of the domain to be guided by a set of rules. The framework is a mathematical definition presented on cellular automaton principles comprising the set of rules to be employed further. These permit the development of cyberspace ontology and lexicon. A layered model for describing the behaviour of heterogenous interacting entities whose effects unfold in cyber domain is offered-Framing a defined model of cyberspace consisting of a rule set topology configuration and a predefined assumption. Thus describing its unexplored attributes through formalisation and modeling make the case for adopting a rigorous formal model of cyberspace to overcome the contemporary conceptual representation and effective reasoning functionalities. © 2023 Elsevier B.V. All rights reserved.
  • Loading...
    Thumbnail Image
    Master Thesis
    Milli siber güvenlik stratejisi: Nijerya için bir model
    (2014) Kademi, Anas Mu'azu; Koltuksuz, Ahmet Hasan
    The society's and individual's harnessing of the power of information and communication technology has inevitably become part of daily routine. The resulting ease, success and the productivity came with a price; breach of security. The prolific system interconnection, increasing linkage between infrastructures, and growing dependence on digital technologies further increased the varieties, volume and velocity of threats and risks. Coupled with that fact, information systems were engineered with less consideration on security but ultimate performance, interoperability and connectivity. The technical solutions are bypassed and themselves need to be sub-guarded. These and the increase of different actors group with advance persisted threats to individuals, organizations and a country as a whole makes it necessary for national government to take steps to adopt strategic measures, procedures and acquire tools to improve the way that technological and cyber-risks are managed: the National Cyber Security Strategy (NCSS). It is a high-level top-down approach that articulates the nation's peculiar context, principles and achievable objectives. Strengthening security by collaboration, coordination and cooperation with proper deployment of legal, procedural, organizational and tactical measures. It will be hinted a necessity for all nation states to inaugurate the strategic dealing with cyber security as it is crucial for national security, economic prosperity and other national developmental goals. Nigeria is typically desperate for NCSS, a more comprehensive national-led approach toward cyber security to provide human and institutional capacity building, coordination and reshape the legislation policies to deter, detect, investigate and prosecute.
  • Loading...
    Thumbnail Image
    Conference Object
    Citation - Scopus: 1
    Strengthening strategic approach to counter cyberspace threats in Nigeria
    (Academic Conferences and Publishing International Limited, 2018) Anas Maazu Kademi; Kademi, Anas Mu'azu; J.S. Hurley , J.Q. Chen
    Most cyber threats and attacks on a system an organisation or a nation have significant consequences especially on missions and can affect even an unintended target. Nigeria is vulnerable to such threats the most pressing of which is cybercrime that sabotage economic prosperity and damage reputation. This cybercrime is a result of (mostly internal) cybercriminal threats exploiting weaknesses in high population lacking security consciousness inadequate low-level security controls poor governmental sustainable commitment poverty and lack of capacity. Nigerian National Cyber Security Strategy (NNCSS) needs to be optimized to consider Nigerian peculiarity and concepts critical to strategy development. For instance Nigerian electronic fraud forum (NEFF) is the only partnership scheme cutting across different sectors and is tailored towards monetary transaction. We therefore identified critical control issues in NNCSS give suggestions to strengthen NNCSS–an algorithmic step for risk based strategy development and an adjustment to the institutional setting. Considered all together a framework of a model to enhance the strategy is given. Nigeria is a strategic country––known for some cyber threats and an enhancement of its existing cyber security strategic approaches will not only ensure adequate security to the country but also others. For example cooperation a significant element of strategy fostered at various levels (international through local) strengthens the course of nations efforts to cyber security. © 2018 Elsevier B.V. All rights reserved.
Repository logo
Collections
  • Scopus Collection
  • WoS Collection
  • TrDizin Collection
  • PubMed Collection
Entities
  • Research Outputs
  • Organizations
  • Researchers
  • Projects
  • Awards
  • Equipments
  • Events
About
  • Contact
  • GCRIS
  • Research Ecosystems
  • Feedback
  • OAI-PMH

Log in to GCRIS Dashboard

GCRIS Mobile

Download GCRIS Mobile on the App StoreGet GCRIS Mobile on Google Play

Powered by Research Ecosystems

  • Privacy policy
  • End User Agreement
  • Feedback