Cagatay YucelAhmet Hasan KoltuksuzA.N. Liaropoulos , G.A. Tsihrintzis2025-10-0620149781912764617, 9781914587405, 9781627489089, 9781910810286, 9781912764280, 9781914587702, 9781910309247, 9781911218852, 9781910810934, 978191121843220488602, 20488610https://www.scopus.com/inward/record.uri?eid=2-s2.0-84991228605&partnerID=40&md5=dc71478bf2e347c23c9419c717b2d658https://gcris.yasar.edu.tr/handle/123456789/10004Since 2008 Cyberspace is officially regarded as a distinct military domain along with land sea and air for many countries (Goel 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of warfare in cyberspace is radically different than the traditional warfare: the attacks are more remote stealthy and it may be impossible to detect the identity of the adversary (Greengard 2010). Moreover the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even if the target is at the globally farthest point possible. Therefore the power and impacts of cyber operations are limited by fast computation and transmission skills of your front. Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of other nations and themselves. With cyber intelligence of high quality nations can assess the effects of attacks, detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well-defined decisions (Rudner 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies including defensive identification methods such as incident response strategies social network analysis (Yip et al. 2012) (Benjamin and Hsinchun 2012) intrusion detection systems (Zaman and Karray 2009) and anomaly detections (Chandola et al. 2009) as well as offensive methods such as disinformation destruction of information and communication and advance persistent threats (APTs). © 2023 Elsevier B.V. All rights reserved.EnglishCyber Intelligence, Cyber Intelligence Analysis, Cyber Operations, Cyber Warfare, Espionage, Computer Crime, Computers, Cybersecurity, Intrusion Detection, Surveys, Cybe Intelligence, Cybe Intelligence Analyse, Cyber Operations, Cyber Warfare, Cyberspaces, Espionage, Intelligence Analysis, Intelligence Officers, Military Domains, Time Parameter, Risk AssessmentComputer crime, Computers, Cybersecurity, Intrusion detection, Surveys, Cybe intelligence, Cybe intelligence analyse, Cyber operations, Cyber warfare, Cyberspaces, Espionage, Intelligence analysis, Intelligence officers, Military domains, Time parameter, Risk assessmentAn annotated bibliographical survey on cyber intelligence for cyber intelligence officersConference Object