Browsing by Author "Koltuksuz, Ahmet"
Now showing 1 - 20 of 24
- Results Per Page
- Sort Options
Conference Object Citation - Scopus: 4A model of distributed key generation for industrial control systems(IFAC Secretariat Schlossplatz 12 A-2361 Laxenburg A-2361, 2012) Görkem Kılınç Soylu; Igor Nai-Fovino; Carlo Ferigato; Ahmet Hasan Koltuksuz; Fovino, Igor Nai; Kilinc, Gorkem; Ferigato, Carlo; Koltuksuz, AhmetThe cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power large geographical distribution near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of an effective key management infrastructure supporting a cryptographic layer. In this paper we describe a "model of distributed key generation for industrial control systems" we have recently implemented. The model is based on a known Distributed Key Generator protocol we have adapted to an industrial control system environment and to the related communication protocol (Modbus). To validate in a formal way selected security properties of the model we introduced a Petri Nets representation. This representation allows for modeling attacks against the protocol and understanding some potential weaknesses of its implementation in the industrial control system environment. © 2018 Elsevier B.V. All rights reserved.Conference Object A parallel cyber universe: Botnet implementations over TOR-like networks(Curran Associates Inc., 2017) Hüseyin Yaǧci; Cagatay Yucel; Ahmet Hasan Koltuksuz; Yüce, Çaǧatay; Yaǧci, Hüseyin; Koltuksuz, Ahmet; M. Scanlon , N.-A. Le-KhacThe first bot implemented in the history of computers was the Eggdrop (Fisher J 1998). The first instance of this kind was benign, it was an automated management tool for Internet Relay Chat (IRC) rooms. It wasn't much later when Internet users experienced the first botnet attack. The GTbot family was the first known malicious automated attack network on IRCs (Bächer et al. 2009) and new era for bots had begun. Botnets can be practically defined as a network of infected smart devices. As a result of the infiltration attacks made on a victim's computer with different malwares and zero-day attacks the control of the computer is confiscated without the victim being aware of it. Confiscated machines are connected to Command and Control (C&C) centers. In the case of a single infection this attack is nothing more than a data theft or privilege escalation. However when the number of the infected devices scales up to thousands the attack becomes a mass destruction weapon on global companies' networks. Amazon Spotify Twitter and many more companies were affected by DDoS attacks by the Mirai botnet in October 2016 (Allison Nixon John Costello 2016). The Mirai botnet was conducted by a malicious network utilizing the IoT devices. Moreover an even worse fact was the announcement of more similar botnet attacks after that October (Paganini 2016 Anon 2016). Today honeypot-based signature-based and host-based defenses as well as active and passive monitoring techniques are being developed against botnets (Silva et al. 2013). Botnets are fighting back for their existence by using binary obfuscation fast-flux networks domain generation algorithm (DGA) techniques and polymorphism while ciphering IP spoofing multi-hopping and email spoofing (Rodríguez-Gómez et al. 2013 Wang et al. 2016). Another important technique for botnets is to utilize The Onion Routing (TOR) networks where the communication scheme of the bot network is anonymized in the layers of the TOR scheme. The name of this network comes from a reference to the multi-layered structure of an onion. This research presents a novel implementation of a hidden botnet mechanism over like networks to The Onion Routing (TOR) ones. The focus is on creating parallel cyber universes with TOR-like structures and hiding the existence of the botnets in the blind range of the Internet. The design of such a network and the attack vector is explained in detail for the first time in the literature. © 2023 Elsevier B.V. All rights reserved.Conference Object A Programmable Threat Intelligence Framework for Containerized Clouds(ACAD CONFERENCES LTD, 2018) Cagatay Yucel; Ahmet Koltuksuz; Murat Odemis; Anas Mu'aza Kademi; Gokhan Ozbilgin; Yücel, Çağatay; Özbilgin, Gökhan; Ödemiş, Murat; Kademi, Anas Muazu; Koltuksuz, Ahmet; JS Hurley; JQ ChenContemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented.Conference Object Citation - WoS: 3An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm(IOS PRESS, 2014) Ahmet Koltuksuz; Koltuksuz, Ahmet; M EdwardsThe STUXNET worm has come into daily lexicon by accident. A very powerful piece of malware designed to target specifically Iranian nuclear facilities using certain Siemens software has shown us the possible vulnerabilities to such measures.Conference Object Citation - WoS: 1Citation - Scopus: 1An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers(ACAD CONFERENCES LTD, 2014) Cagatay Yucel; Ahmet Koltuksuz; Yucel, Cagatay; Koltuksuz, Ahmet; A Liaropoulos; G TsihrintzisSince 2008 Cyberspace is officially regarded as a distinct military domain along with land sea and air for many countries (Goel 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of warfare in cyberspace is radically different than the traditional warfare: the attacks are more remote stealthy and it may be impossible to detect the identity of the adversary (Greengard 2010). Moreover the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even if the target is at the globally farthest point possible. Therefore the power and impacts of cyber operations are limited by fast computation and transmission skills of your front. Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. With cyber intelligence of high quality nations can assess the effects of attacks, detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well-defined decisions (Rudner 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies including defensive identification methods such as incident response strategies social network analysis (Yip et al. 2012) (Benjamin and Hsinchun 2012) intrusion detection systems (Zaman and Karray 2009) and anomaly detections (Chandola et al. 2009) as well as offensive methods such as disinformation destruction of information and communication and advance persistent threats (APTs).Conference Object An authorization-based cryptographically secure mobile voting system(Curran Associates Inc., 2017) Murat Odemis; Ahmet Hasan Koltuksuz; Odemis, Murat; Koltuksuz, Ahmet; M. Scanlon , N.-A. Le-KhacGovernments and the private sector keep pace with the innovations on mobile technologies. Most countries have developed e-Government portals for their citizens which also have mobile applications. They aim to provide public services in efficient and effective manners. While the governments are administering existing duties through an electronic platform they are also trying to transform the paper-based voting into a fertile electronic method. Recent advancements in mobilebased communication networks and cryptography have made it possible to consider mobile voting as a feasible alternative for conventional elections. Mobile voting has the flexibility of allowing citizens to participate in an election no matter where they physically are. Benefits of this alternative may include a reduced cost and increased participation speed flexibility and accuracy as well as improved accessibility for disabled people. According to Chung and Wu (2012) mobile voting schemes should all have anonymity eligibility fairness mobility uniqueness verifiability uncoercibility limited transparency and appropriate location freedom. While previously published papers in the field of mobile voting has been scrutinized in this work this paper itself proposes for a reliable secure authorization-based mobile voting system which will enable instantaneous vote submissions for not only the government elections but also for institutions and meetings which currently lack such a favorable arrangement. A mobile application was also developed to prove the system. Hybrid cryptosystem is used for data security and the data gets encrypted and decrypted via AES-256. Elliptic Curve Diffie-Hellman schema called Curve25519 (Bernstein 2006) is used for the key exchange mechanism for Curve25519 provides one of the fastest results. In addition to this biometric fingerprint-scanning technology is used. One of the most important features of the system is that after user enters to the system with his institutive credential if and when under pressure voter can use the fake trapdoor. The user sets both genuine and fake character-based password and geometric pattern password to vote. The network is protected by SSL and OpenSSL is used on certification phases. The application consists of a login certification activation listing election and a voting screen. An Authorization-Based Cryptographically Secure Mobile Voting System will be introduced in this paper. © 2023 Elsevier B.V. All rights reserved.Article An information geometrical evaluation of Shannon information metrics on a discrete n-dimensional digital manifold(Elsevier Ltd, 2023) Ahmet Hasan Koltuksuz; Cagatay Yucel; Anas Maazu Kademi; Yucel, Cagatay; Maazu Kademi, Anas; Kademi, Anas Maazu; Koltuksuz, AhmetThe definition and nature of information have perplexed scientists due to its dual nature in measurements. The information is discrete and continuous when evaluated on a metric scale and the Laplace-Beltrami operator and Gauss-Bonnet Theorem can map one to another. On the other hand defining the information as a discrete entity on the surface area of an n-dimensional discrete digital manifold provides a unique way of calculating the entropy of a manifold. The software simulation shows that the surface area of the discrete n-dimensional digital manifold is an effectively computable function. Moreover it also provides the information-geometrical evaluation of Shannon information metrics. © 2023 Elsevier B.V. All rights reserved.Conference Object Clandestine cell based honeypot networks(Curran Associates Inc., 2016) Cagatay Yucel; Ahmet Hasan Koltuksuz; Hüseyin Yaǧci; Yucel, Cagatay; Yagci, Huseyin; Koltuksuz, Ahmet; R. Koch , G.D. RodosekA Clandestine Cell is a type of an intelligence organization where a cell only knows the immediate superior and the associated members of itself. This kind of organizational structure is used by intelligence agencies throughout the world to provide security against a breach thus ensuring the safety of the members. This well-known intelligence organization is applied to solve an advanced cyber security issue. A relatively new kind of a cyber threat known as an Advanced Persistent Threat (APTs) has been around for some time now Stuxnet being the very first identified. There are several points to consider when identifying the characteristics of an APT such as the aim its interactions with Internet way of collecting information operations they do disrupt and concealment mechanisms utilized. An important aspect is whether it is statistically analyzable or dynamically identifiable that its communication patterns need to be inspected to identify the characteristics. The traces of an APT might be identified this way. In this research a honeypot network with a communication policy based on a clandestine cell is introduced. Each honeypot only knows a hub. And a hub only knows the main malware analysis server. By utilizing this approach the communications are hidden from possible attackers without compromising the main server. In each honeypot server dead-ends are created and implemented in the honeypot servers. Advantages and ramifications are discussed regarding the types of malware. It is aimed to create yet another taxonomy of malware regarding the network activities as they are being trapped by our introduced honeypot network. A clandestine cell format is one of its kind within organizations. This is the very first time that such kind of format is being applied to honeypot design for APT hunting. This is the paper in which an intelligence organizational structure meets with a network architecture in order to solve a very hard to crack cyber security problem. The idea itself is a new and untried one. © 2023 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 39Citation - Scopus: 88Construction of the Turkish National Corpus (TNC)(EUROPEAN LANGUAGE RESOURCES ASSOC-ELRA, 2012) Yesim Aksan; Mustafa Aksan; Ahmet Koltuksuz; Taner Sezer; Umit Mersinli; Umut Ufuk Demirhan; Hakan Yilmazer; Ozlem Kurtoglu; Gulsum Atasoy; Seda Oz; Ipek Yildiz; Sezer, Taner; Yildiz, Ipek; Mersinli, Ümit; Koltuksuz, Ahmet; Aksan, Mustafa; Demirhan, Umut Ufuk; Aksan, Yesim; N Calzolari; K Choukri; T Declerck; MU Dogan; B Maegaard; J Mariani; J Odijk; S PiperidisThis paper addresses theoretical and practical issues experienced in the construction of Turkish National Corpus (TNC). TNC is designed to be a balanced large scale (50 million words) and general-purpose corpus for contemporary Turkish. It has benefited from previous practices and efforts for the construction of corpora. In this sense TNC generally follows the framework of British National Corpus yet necessary adjustments in corpus design of TNC are made whenever needed. All throughout the process different types of open-source software are used for specific tasks and the resulting corpus is a free resource for non-commercial use. This paper presents TNC's design features web-based corpus management system carefully planned workflow and its web-based user-friendly search interface.Article Citation - WoS: 8Citation - Scopus: 8Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System(Hindawi Limited, 2022) Murat Odemis; Cagatay Yucel; Ahmet Hasan Koltuksuz; Yucel, Cagatay; Odemis, Murat; Koltuksuz, AhmetThis research demonstrates a design of an experiment of a hacker infiltrating a server where it is assumed that the communication between the hacker and the target server is established and the hacker also escalated his rights on the server. Therefore the honeypot server setup has been designed to reveal the correlation of a hacker's actions with that of the hacker's experience personality expertise and psychology. To the best of our knowledge such a design of experiment has never been tested rigorously on a honeypot implementation except for self-reporting tests applied to hackers in the literature. However no study evaluates the actual data of these hackers and these tests. This study also provides a honeypot design to understand the personality and expertise of the hacker and displays the correlation of these data with the tests. Our Honeypsy system is composed of a Big-5 personality test a cyber expertise test and a capture-the-flag (CTF) event to collect logs with honeypot applied in this sequence. These three steps generate data on the expertise and psychology of known cyber hackers. The logs of the known hacker activities on honeypots are obtained through the CTF event that they have participated in. The design and deployment of a honeypot as well as the CTF event were specifically prepared for this research. Our aim is to predict an unknown hacker's expertise and personality by analyzing these data. By examining/analyzing the data of the known hackers it is now possible to make predictions about the expertise and personality of the unknown hackers. The same logic applies when one tries to predict the next move of the unknown hackers attacking the server. We have aimed to underline the details of the personalities and expertise of hackers and thus help the defense experts of victimized institutions to develop their cyber defense strategies in accordance with the modus operandi of the hackers. © 2022 Elsevier B.V. All rights reserved.Conference Object Dishonest node identification for key sharing systems through distributed key generation(IEEE Computer Society help@computer.org, 2013) Tugçe Kalkavan; Ahmet Hasan Koltuksuz; Kalkavan, Tugce; Koltuksuz, AhmetThe purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing systems. With the distributed key generation each node has equal responsibility for creating distributed private key thus the identification of dishonest node becomes possible. With the identification of dishonest mode comes the recognition of legitimate and/or illegitimate parties as well. © 2013 IEEE. © 2014 Elsevier B.V. All rights reserved.Conference Object Distributed and Biometric Signature-Based Identity Proofing System for the Maritime Sector(Institute of Electrical and Electronics Engineers Inc., 2023) Taylan Akbas; Ahmet Hasan Koltuksuz; Cagatay Yucel; Yucel, Cagatay; Akbas, Taylan; Koltuksuz, AhmetThe maritime sector is an industry that faces significant and various challenges related to cyber security and data management such as fraud and user authentication. Therefore there is a need for a secure solution that can effectively manage data transactions while resolving digital identity. A biometric signature application in blockchain for fighting fraud and fake identities may provide a solution in the maritime sector. This research proposes a biometric signature and an IPFS network-blockchain framework to address these challenges. This paper also discusses the proposed framework's cyber security challenges that threaten behavioral biometric security. © 2023 Elsevier B.V. All rights reserved.Article Citation - WoS: 2Dynamic Cyberspace Modeling from Network Automata(INT JOURNAL COMPUTER SCIENCE & NETWORK SECURITY-IJCSNS, 2020) Anas Mu'azu Kademi; Ahmet Koltuksuz; Kademi, Anas Mu'azu; Koltuksuz, AhmetCyberspace which is a complex system constitutes dynamic networks of various interacting entities such as cyber-physical systems and world-wide-web of information. The quest for principles underlying the structural organization and dynamics of cyberspace often uses a Top-down approach and no general framework for describing categorizing and analyzing its inherent properties has been established. This paper proposes a network cellular automata framework characterizing and modeling cyberspace derived from the intrinsic constructs of cyberspace-entities space and time. Employing network (graph) theories for spatial topology and generalized cellular automata depicting the dynamic process we provide a novel foundation for formal cyberspace modeling. Subsequently A network automata a generalization of standard Cellular automata is defined with a cyberspatial map which is a mathematical generalization of cyberspatial object characterizing the dynamic and structure of cyber-physical systems. Consequently the cyberspatial map is found to be homomorphic to the network automata.Conference Object Citation - Scopus: 1Formal characterization of cyberspace for cyber lexicon development(Curran Associates Inc., 2017) Anas Maazu Kademi; Ahmet Hasan Koltuksuz; Kademi, Anas Mu'azu; Koltuksuz, Ahmet; M. Scanlon , N.-A. Le-KhacInadequate formalisation or theoretical perspective is a sign of new domain which also holds in cyberspace and its related areas (cyber warfare etc.). The development of which could solve the problems in lexicon lack of consensus and provides a ground truth for general analysis and further development. Cyberspace is a complex domain in which the structure (topology) dynamics and the functional processes are interwoven. Hence it is no wonder that lack of consensus persists when using terms. In order to support the generalisation of cyberspace theory a formalization and a solid foundation are essential. In addition to pave a way for an introduction of a formal proofs and development of rigorous terminologies it is paramount to have a formal mathematical definition of the domain that take account of the domain's topology functional process and dynamics in time. Most complex systems even biological ones exhibit a layered structure which comes useful in deciphering the complexity at least in an understandable level. This paper pointed that cyberspace can be represented as a layered structure of entities and hierarchy of terms. This perception is chosen as the basis for a formal cyberspace framework and characterisation. Thus we offer a cyberspace formalization consisting of a topological characterisation of the domain to be guided by a set of rules. The framework is a mathematical definition presented on cellular automaton principles comprising the set of rules to be employed further. These permit the development of cyberspace ontology and lexicon. A layered model for describing the behaviour of heterogenous interacting entities whose effects unfold in cyber domain is offered-Framing a defined model of cyberspace consisting of a rule set topology configuration and a predefined assumption. Thus describing its unexplored attributes through formalisation and modeling make the case for adopting a rigorous formal model of cyberspace to overcome the contemporary conceptual representation and effective reasoning functionalities. © 2023 Elsevier B.V. All rights reserved.Article Citation - WoS: 22Citation - Scopus: 29Imaging and evaluating the memory access for malware(ELSEVIER SCI LTD, 2020) Cagatay Yucel; Ahmet Koltuksuz; Yücel, Çağatay; Koltuksuz, AhmetMalware analysis is a forensic process. After infection and the damage represented itself with the full scale then the analysis of the attack the structure of the executable and the aim of the malware can be discovered. These discoveries are converted into analysis reports and malware signatures and shared among antivirus databases and threat intelligence exchange platforms. This highly valuable information is then utilized in the detection mechanisms to prevent further dissemination and infections of malware. The types of analysis of the malware sample in this process can be grouped into two categories: static analysis and dynamic analysis. In static analysis the executable file is reverted to the source code through disassemblers and reverse engineering software and analyzed whereas dynamic analysis includes running the sample in an isolated environment and analyzing its behavior. Both static and dynamic analysis have limitations such as packing obfuscation dead code insertion sandbox detection and anti-debugging techniques. Memory operations on the other hand are not possible to hide by these limitations and inevitable for any software since the inventions of the computational models. Therefore in this research memory operations and access patterns for the malicious acts are examined and a contribution of a novel approach for extracting of memory access images is presented. In addition to extraction methods of how these images can be used for detection and comparison is introduced through an image comparison technique. (C) 2020 Elsevier Ltd. All rights reserved.Conference Object Modeling efficient multi-chained stream signature protocol using communicating sequential processeses(2010) Ahmet Hasan Koltuksuz; Murat Ozkan; Burcu Külahçioǧlu; Kulahcioglu, Burcu; Ozkan, Murat; Koltuksuz, AhmetCommunicating Sequential Processes (CSP) is a process algebra designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP each of the Efficient Multi-chained Stream Signature (EMSS) protocol messages are linked to the previous messages forming hash chains which introduces difficulties for modeling and verification. In this paper, we model the EMSS stream authentication protocol using CSP and verify its authentication properties with model checking by building an infinite state model of the protocol which is reduced into a finite state model. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.Master Thesis Otomobil güvenliği için androıd işletim sistemi üzerinde bir uygulama(2012) Yıldırım, Halil Utku; Koltuksuz, AhmetGüvenlik, günümüzde neredeyse her sektörde vazgeçilmez unsurlardan biri haline gelmiştir. Otomotiv sektörü de bu anlamda önemli bir yere sahiptir. 1995'ten günümüze kadar çeşitli yöntemler geliştirilmiştir. Bu yöntemler, başka birileri tarafından etkisiz hale getirilmesi nedeniyle sürekli olarak değişim ve gelişim göstermiştir. Bunlardan en önemlileri kart üzerinde diagnostik olarak (OBD) gerçekleştirilmiştir. Bu teknoloji ile birlikte araç ile haberleşmek daha kolay ve servislerin anlayacağı bir şekil almıştır. Daha sonra bu yeterli olmadığı için, gelişmiş birkaç sürümü daha piyasadaki yürüyen bütün araçlarla bütünleştirilmeye başlanmıştır. Araç haberleşmesinde de diğer sektörlerde olduğu gibi uluslararası standartlar izlenmiştir. Böylece üretici firmalar ürünlerini belirli bir format ile piyasaya sürmüşlerdir. Araç haberleşmesinin kolaylaşmasıyla birlikte, daha güvenilir bir sistem ihtiyacı ortaya çıkmıştır. Hırsızlığa karşı güvenlik sistemi 1998'den günümüze kadar neredeyse bütün araçlarda uygulanmıştır ancak bazen bu sistemler bile güvenliğin en büyük düşmanı ve zaafı olan insan faktörüne karşı koymakta güçlük çekmiştir. Hırsızlığa karşı 100% güvenli olduğu iddia edilerek satılan ve alınan araçlar aslında bu kadar güçlü bir güvenlik altyapısına sahip değildir çünkü aracın kontrol üniteleri immobilizer adı altında birbirleriyle haberleşmek zorundadır ve bu haberleşmeyi yorumlamak çok da zor değildir. Sonuç olarak iki kablo arasındaki konuşan üniteler her zaman izlenebilir bu yüzden bu haberleşmenin gene uluslararası yeni standartlarla korunması gerekmektedir. Aksi takdirde otomobil hırsızlığı ile baş etmek mümkün olmayacaktır. Bu çalışmamızda sizlere araçlardaki güvenlik sisteminin nasıl çalıştığını ve ne derece zayıflıklarının olduğunu gözler önüne serdik. Yöntemimiz ve uygulamamızla, aracınıza kendinizin bile yeni bir anahtar programlayabileceğinizi ve bunu nasıl yapabileceğinizi göstereceğiz. Aynı zamanda özel servis ve anahtarcı kitlelerin, yetkili servislere ihtiyaçları olmadan; geliştirmiş olduğumuz uygulamayı kullanarak, bu işi nasıl yapabileceği somut örneklerle kanıtlanacaktır.Conference Object Retrospective evaluation of cyber security strategic reports for the next two decades: From 2000 to 2030(Academic Conferences Ltd, 2013) Ahmet Hasan Koltuksuz; Koltuksuz, AhmetRetrospective taxonomical evaluation of the strategic cyber security reports of the last decade is very much important if we are to understand and to appreciate how the very concept of Cyberspace has evolved along with other and equally important concepts and definitions like cyber security cyber terrorism cyber warfare information warfare for which we seem to struggle every day. For that reason seven cyber security strategy reports, covering a decade from 2002 to 2011 evaluated compared and contrasted. Armed with the strategic cyber security reports of the last decade as the second aim of this paper we will try to examine and understand if the near future cyber security strategies will be valid with our current understandings. In order for us to do that two next decade projective papers will be put under scrutiny. Our gatherings from all of those examined plus experiences gathered in the field over the years will be provided as conclusions. © 2023 Elsevier B.V. All rights reserved.Master Thesis Siber savaş yönetimi(2017) Abdalwahıd, Shadan Mohammed Jıhad; Koltuksuz, AhmetWith the huge increase in development of computer systems and information technologies and further dependency on information technology, people are focusing on cyberspace, within cyberspace, billions of user connect with each other via the internet all over the world. The management of cyber warfare is one of the biggest challenges facing us, one of the major problems in the management of it is how to protect the system from attacks, reduce the risk of attack, and how to defend sensitive information from potential hackers. This thesis focuses on the main challenges faced in cyber warfare and presents some to avoid it. The most important measure is the need for international laws because strict laws are necessary to avoid cyber warfare. This study analyses and evaluates the risk based on some methodologies such as a Bayesian network for risk assessment that is needed in Cyber Warfare management. Key Words: cyberspace, Warfare, Cybersecurity, Computer Emergency Response Team (CERT), System Infrastructure, Cyber-attack and Defense, Cyber Crime, InternationalArticle Citation - WoS: 1Citation - Scopus: 1Software development for transitions of graphs from discrete state into the continuous state(Natural Sciences Publishing Co. amis@naturalspublishing.com, 2014) Ahmet Hasan Koltuksuz; Cagatay Yucel; Yücel, Çaǧatay; Koltuksuz, AhmetManifolds are suitable differentiable mathematical objects for information to be defined on. By their very definition they are non-Euclidean in the global view but in local scales they resemble Euclidean spaces. This property provides that the contemporary information models can also be defined within the previsioned new models of information models. One of the most basic representations of information is through graphs. They are discrete and highly computable mathematical objects. In this research the main aim is to investigate methods of embedding this simple piece of information onto manifolds. This research shows that the very fundamental data structures of computer science can be transformed into the continuous spaces and wide area of applications can be engineered such as pattern recognition or anomaly detection. The visualizations of the inspected methods are the evidence of that the graph data can carry new characteristics other than classical properties of graphs such as curvature locality or multi-dimensionality. © 2014 NSP Natural Sciences Publishing Cor. © 2014 Elsevier B.V. All rights reserved.

