Kademi, Enes

Loading...
Profile Picture
Name Variants
Job Title
Dr.Öğr.Üyesi
Email Address
Main Affiliation
01.01.12.03. Yönetim Bilişim Sistemleri Bölümü
Status
Current Staff
Website
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

NO POVERTY1
NO POVERTY
0
Research Products
ZERO HUNGER2
ZERO HUNGER
0
Research Products
GOOD HEALTH AND WELL-BEING3
GOOD HEALTH AND WELL-BEING
0
Research Products
QUALITY EDUCATION4
QUALITY EDUCATION
0
Research Products
GENDER EQUALITY5
GENDER EQUALITY
0
Research Products
CLEAN WATER AND SANITATION6
CLEAN WATER AND SANITATION
0
Research Products
AFFORDABLE AND CLEAN ENERGY7
AFFORDABLE AND CLEAN ENERGY
0
Research Products
DECENT WORK AND ECONOMIC GROWTH8
DECENT WORK AND ECONOMIC GROWTH
0
Research Products
INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE
0
Research Products
REDUCED INEQUALITIES10
REDUCED INEQUALITIES
0
Research Products
SUSTAINABLE CITIES AND COMMUNITIES11
SUSTAINABLE CITIES AND COMMUNITIES
0
Research Products
RESPONSIBLE CONSUMPTION AND PRODUCTION12
RESPONSIBLE CONSUMPTION AND PRODUCTION
0
Research Products
CLIMATE ACTION13
CLIMATE ACTION
0
Research Products
LIFE BELOW WATER14
LIFE BELOW WATER
0
Research Products
LIFE ON LAND15
LIFE ON LAND
0
Research Products
PEACE, JUSTICE AND STRONG INSTITUTIONS16
PEACE, JUSTICE AND STRONG INSTITUTIONS
0
Research Products
PARTNERSHIPS FOR THE GOALS17
PARTNERSHIPS FOR THE GOALS
1
Research Products
Documents

5

Citations

17

h-index

2

Documents

0

Citations

0

Scholarly Output

5

Articles

2

Views / Downloads

0/0

Supervised MSc Theses

0

Supervised PhD Theses

0

WoS Citation Count

2

Scopus Citation Count

17

Patents

0

Projects

0

WoS Citations per Publication

0.40

Scopus Citations per Publication

3.40

Open Access Source

1

Supervised Theses

0

JournalCount
13th International Conference on Cyber Warfare and Security (ICCWS)1
13th International Conference on Cyber Warfare and Security ICCWS 20181
16th European Conference on Cyber Warfare and Security ECCWS 20171
Discover Internet of Things1
Kybernetes1
Current Page: 1 / 1

Scopus Quartile Distribution

Quartile distribution chart data is not available

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 5 of 5
  • Article
    Citation - WoS: 2
    Citation - Scopus: 2
    Cyber-physical-social-information-thinking hyperspace: a manifold of cyberspatial entities
    (Emerald Publishing, 2023) Anas Maazu Kademi; Ahmet Hasan Koltuksuz; Kademi, Anas Maazu; Koltuksuz, Ahmet Hasan
    Purpose: This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects their existence and their identification scheme while providing a connection between cyber-enabled spaces and cyberspace. It develops an avenue to quantify general philosophical and theoretical questions precisely inherently spatial basis that produces an unprecedented space–time continuum in which cyber-enabled relations evolve. Design/methodology/approach: Multidisciplinary theoretical approaches are needed to describe complex systems which in this paper are integrated in a quest for the principles underlying the structural organization and dynamics of cyberspace. A theoretic framework is presented and the spatial conception of cyber-enabled physical social information and thinking spaces and entities existence are provided. Findings: With spatial objects and spatial properties cyberspace is inherently spatial. Its basic constructs are founded on its spatial qualities and producing radical space–time compression cyber-enabled spaces in which dynamic relations develop and thrive. The cyberspatial object operations are primarily built on foundations that depend on physical space and other spatial metaphors. Information space basically missing in the literature is an important part of cyberspace. Research limitations/implications: This work suggested a novel analytical approach to describing cyberspace from broader perspectives and fields. Due to the novelty and divergence of cyber concepts an interdisciplinary study and methodology are needed. Thus more research toward theoretical direction could help many of the practical implementations of concepts. Practical implications: The research is of particular significance in cyberspatial mechanics to describe the dynamics and behavior of cyber physical systems. For example object-based analysis functions like spatial query node pattern analysis cluster analysis spatial similarity analysis and location modeling. Originality/value: Complementing the existing literature and defining information space to the research sphere a theoretical framework providing a fundamental understanding of cyberspatial objects and the general cyberspace foundation has been proposed resulting in a formalized concept of existence interactions and applications and services with respect to philosophy science and technology respectively. © 2023 Elsevier B.V. All rights reserved.
  • Conference Object
    Citation - Scopus: 1
    Formal characterization of cyberspace for cyber lexicon development
    (Curran Associates Inc., 2017) Anas Maazu Kademi; Ahmet Hasan Koltuksuz; Kademi, Anas Mu'azu; Koltuksuz, Ahmet; M. Scanlon , N.-A. Le-Khac
    Inadequate formalisation or theoretical perspective is a sign of new domain which also holds in cyberspace and its related areas (cyber warfare etc.). The development of which could solve the problems in lexicon lack of consensus and provides a ground truth for general analysis and further development. Cyberspace is a complex domain in which the structure (topology) dynamics and the functional processes are interwoven. Hence it is no wonder that lack of consensus persists when using terms. In order to support the generalisation of cyberspace theory a formalization and a solid foundation are essential. In addition to pave a way for an introduction of a formal proofs and development of rigorous terminologies it is paramount to have a formal mathematical definition of the domain that take account of the domain's topology functional process and dynamics in time. Most complex systems even biological ones exhibit a layered structure which comes useful in deciphering the complexity at least in an understandable level. This paper pointed that cyberspace can be represented as a layered structure of entities and hierarchy of terms. This perception is chosen as the basis for a formal cyberspace framework and characterisation. Thus we offer a cyberspace formalization consisting of a topological characterisation of the domain to be guided by a set of rules. The framework is a mathematical definition presented on cellular automaton principles comprising the set of rules to be employed further. These permit the development of cyberspace ontology and lexicon. A layered model for describing the behaviour of heterogenous interacting entities whose effects unfold in cyber domain is offered-Framing a defined model of cyberspace consisting of a rule set topology configuration and a predefined assumption. Thus describing its unexplored attributes through formalisation and modeling make the case for adopting a rigorous formal model of cyberspace to overcome the contemporary conceptual representation and effective reasoning functionalities. © 2023 Elsevier B.V. All rights reserved.
  • Conference Object
    A Programmable Threat Intelligence Framework for Containerized Clouds
    (ACAD CONFERENCES LTD, 2018) Cagatay Yucel; Ahmet Koltuksuz; Murat Odemis; Anas Mu'aza Kademi; Gokhan Ozbilgin; Yücel, Çağatay; Özbilgin, Gökhan; Ödemiş, Murat; Kademi, Anas Muazu; Koltuksuz, Ahmet; JS Hurley; JQ Chen
    Contemporarily one of the main challenges for information security community is the growing number of cyber threats. Large scaled globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore collection and the exchange of cyber threat intelligence is of supreme importance. The term Cyber Threat Intelligence (CTI) has emerged with the contemporary because of merging the cyber intelligence concepts with the risk and threat management in cyber space. Today a number of security companies provide cyber threat intelligence with their sensors deployed worldwide Security Information and Event Management (SIEM) software and Intrusion Detection and Prevention Systems (IDPS) working collaboratively. The collection of Cyber Threat Intelligence is the process of collecting and producing actionable information of threats and threat actors aimed at increasing awareness and operational capabilities upon recognition of attack and attempt scenarios in a timely fashion. This research aims to investigate the recent developments of SDN and Containerized Clouds with a security perspective. The implementation of a containerized cloud with a programmable network of honeypot is implemented in this research. The implementation is tested with a scenario where a propagation of a worm that is originated from an infected container image. The security mechanisms on the cloud are fed with the collected CTI and results of the experiments along with discussions are presented.
  • Article
    Citation - Scopus: 13
    An energy-aware application module for the fog-based internet of military things
    (Springer Nature, 2022) Bashir Yusuf Bichi; Saif ul Islam; Anas Maazu Kademi; Ishfaq Ahmad; Bichi, Bashir Yusuf; Islam, Saif ul; Kademi, Anas Maazu; Ahmad, Ishfaq
    Smart devices in various application areas are becoming increasingly prevalent for efficient handling of multiple critical activities. One such area of interest is high-security militarized environments. Due to military zones’ harsh and unpredictable nature monitoring devices deployed in such environments must operate without power interruption for extended time periods. Therefore it is essential to choose an appropriate application design for operating these “things” in the internet of things (IoT) environment such that energy can be conserved throughout the operating span of an application. This paper presents two application modules and analyzes their performance in terms of energy conservation considering a military-based IoT-Fog architecture. The two modules are: A sequential application module and a master-worker application module. Experimental results show that the master-worker module incurs lower energy consumption and communication overhead than the sequential application module. Significantly the master-worker module exhibits a lower delay in tuple execution by almost four milliseconds while also accounting for lower simulation time and higher network utilization. The module achieves significant savings in energy consumption making it more effective in handling smart devices. © 2024 Elsevier B.V. All rights reserved.
  • Conference Object
    Citation - Scopus: 1
    Strengthening strategic approach to counter cyberspace threats in Nigeria
    (Academic Conferences and Publishing International Limited, 2018) Anas Maazu Kademi; Kademi, Anas Mu'azu; J.S. Hurley , J.Q. Chen
    Most cyber threats and attacks on a system an organisation or a nation have significant consequences especially on missions and can affect even an unintended target. Nigeria is vulnerable to such threats the most pressing of which is cybercrime that sabotage economic prosperity and damage reputation. This cybercrime is a result of (mostly internal) cybercriminal threats exploiting weaknesses in high population lacking security consciousness inadequate low-level security controls poor governmental sustainable commitment poverty and lack of capacity. Nigerian National Cyber Security Strategy (NNCSS) needs to be optimized to consider Nigerian peculiarity and concepts critical to strategy development. For instance Nigerian electronic fraud forum (NEFF) is the only partnership scheme cutting across different sectors and is tailored towards monetary transaction. We therefore identified critical control issues in NNCSS give suggestions to strengthen NNCSS–an algorithmic step for risk based strategy development and an adjustment to the institutional setting. Considered all together a framework of a model to enhance the strategy is given. Nigeria is a strategic country––known for some cyber threats and an enhancement of its existing cyber security strategic approaches will not only ensure adequate security to the country but also others. For example cooperation a significant element of strategy fostered at various levels (international through local) strengthens the course of nations efforts to cyber security. © 2018 Elsevier B.V. All rights reserved.