An annotated bibliographical survey on cyber intelligence for cyber intelligence officers

dc.contributor.author Cagatay Yucel
dc.contributor.author Ahmet Hasan Koltuksuz
dc.contributor.editor A.N. Liaropoulos , G.A. Tsihrintzis
dc.date.accessioned 2025-10-06T17:52:34Z
dc.date.issued 2014
dc.description.abstract Since 2008 Cyberspace is officially regarded as a distinct military domain along with land sea and air for many countries (Goel 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of warfare in cyberspace is radically different than the traditional warfare: the attacks are more remote stealthy and it may be impossible to detect the identity of the adversary (Greengard 2010). Moreover the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even if the target is at the globally farthest point possible. Therefore the power and impacts of cyber operations are limited by fast computation and transmission skills of your front. Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. With cyber intelligence of high quality nations can assess the effects of attacks, detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well-defined decisions (Rudner 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies including defensive identification methods such as incident response strategies social network analysis (Yip et al. 2012) (Benjamin and Hsinchun 2012) intrusion detection systems (Zaman and Karray 2009) and anomaly detections (Chandola et al. 2009) as well as offensive methods such as disinformation destruction of information and communication and advance persistent threats (APTs). © 2023 Elsevier B.V. All rights reserved.
dc.identifier.isbn 9781912764617, 9781914587405, 9781627489089, 9781910810286, 9781912764280, 9781914587702, 9781910309247, 9781911218852, 9781910810934, 9781911218432
dc.identifier.issn 20488602, 20488610
dc.identifier.uri https://www.scopus.com/inward/record.uri?eid=2-s2.0-84991228605&partnerID=40&md5=dc71478bf2e347c23c9419c717b2d658
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/10004
dc.language.iso English
dc.publisher Curran Associates Inc.
dc.relation.ispartof 13th European Conference on Cyber Warfare and Security ECCWS 2014
dc.source European Conference on Information Warfare and Security ECCWS
dc.subject Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operations, Cyber Warfare, Espionage, Computer Crime, Computers, Cybersecurity, Intrusion Detection, Surveys, Cybe Intelligence, Cybe Intelligence Analyse, Cyber Operations, Cyber Warfare, Cyberspaces, Espionage, Intelligence Analysis, Intelligence Officers, Military Domains, Time Parameter, Risk Assessment
dc.subject Computer crime, Computers, Cybersecurity, Intrusion detection, Surveys, Cybe intelligence, Cybe intelligence analyse, Cyber operations, Cyber warfare, Cyberspaces, Espionage, Intelligence analysis, Intelligence officers, Military domains, Time parameter, Risk assessment
dc.title An annotated bibliographical survey on cyber intelligence for cyber intelligence officers
dc.type Conference Object
dspace.entity.type Publication
gdc.coar.type text::conference output
gdc.index.type Scopus
oaire.citation.endPage 220
oaire.citation.startPage 213
person.identifier.scopus-author-id Yucel- Cagatay (56285502500), Koltuksuz- Ahmet Hasan (13408802300)
publicationvolume.volumeNumber 2014-January
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files