An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers

dc.contributor.author Cagatay Yucel
dc.contributor.author Ahmet Koltuksuz
dc.contributor.author Yucel, Cagatay
dc.contributor.author Koltuksuz, Ahmet
dc.contributor.editor A Liaropoulos
dc.contributor.editor G Tsihrintzis
dc.coverage.spatial Univ Piraeus Piraeus GREECE
dc.date.accessioned 2025-10-06T16:20:03Z
dc.date.issued 2014
dc.description.abstract Since 2008 Cyberspace is officially regarded as a distinct military domain along with land sea and air for many countries (Goel 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of warfare in cyberspace is radically different than the traditional warfare: the attacks are more remote stealthy and it may be impossible to detect the identity of the adversary (Greengard 2010). Moreover the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even if the target is at the globally farthest point possible. Therefore the power and impacts of cyber operations are limited by fast computation and transmission skills of your front. Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. With cyber intelligence of high quality nations can assess the effects of attacks, detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well-defined decisions (Rudner 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies including defensive identification methods such as incident response strategies social network analysis (Yip et al. 2012) (Benjamin and Hsinchun 2012) intrusion detection systems (Zaman and Karray 2009) and anomaly detections (Chandola et al. 2009) as well as offensive methods such as disinformation destruction of information and communication and advance persistent threats (APTs).
dc.identifier.isbn 978-1-910309-25-4
dc.identifier.isbn 9781910309254
dc.identifier.isbn 9781910309247
dc.identifier.issn 2048-8602
dc.identifier.scopus 2-s2.0-84991228605
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/6156
dc.language.iso English
dc.publisher ACAD CONFERENCES LTD
dc.relation.ispartof 13th European Conference on Cyber Warfare and Security (ECCWS)
dc.rights info:eu-repo/semantics/closedAccess
dc.source PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014)
dc.subject cyber intelligence, cyber warfare, espionage, cyber intelligence analysis, cyber operations
dc.subject Cyber Operations
dc.subject Espionage
dc.subject Cyber Warfare
dc.subject Cyber Intelligence Analysis
dc.subject Cyber Intelligence
dc.title An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers
dc.type Conference Object
dspace.entity.type Publication
gdc.author.scopusid 56285502500
gdc.author.scopusid 13408802300
gdc.author.wosid koltuksuz, ahmet/AAJ-5658-2021
gdc.coar.type text::conference output
gdc.description.department
gdc.description.departmenttemp [Yucel, Cagatay; Koltuksuz, Ahmet] Yasar Univ, Izmir, Turkey
gdc.description.endpage 220
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
gdc.description.startpage 213
gdc.description.volume 2014-January
gdc.description.woscitationindex Conference Proceedings Citation Index - Science
gdc.identifier.wos WOS:000361692300027
gdc.index.type WoS
gdc.index.type Scopus
gdc.scopus.citedcount 1
gdc.virtual.author Yücel, Çağatay
gdc.virtual.author Koltuksuz, Ahmet Hasan
gdc.wos.citedcount 1
oaire.citation.endPage 220
oaire.citation.startPage 213
relation.isAuthorOfPublication 516a87df-891f-458d-994e-b459294fda36
relation.isAuthorOfPublication 0a146451-eb5a-43c9-bfca-979da9ee51d7
relation.isAuthorOfPublication.latestForDiscovery 516a87df-891f-458d-994e-b459294fda36
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files