IEEE Organizations related to Cyber Terrorism

Back to Top

No organizations are currently tagged "Cyber Terrorism"



Conferences related to Cyber Terrorism

Back to Top

2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

The IEEE ICCI*CC series is a flagship conference of its field. It not only synergizes theories of modern information science, computer science, communication theories, AI, cybernetics, computational intelligence, cognitive science, intelligence science, neuropsychology, brain science, systems science, software science, knowledge science, cognitive robots, cognitive linguistics, and life science, but also promotes novel applications in cognitive computers, cognitive communications, computational intelligence, cognitive robots, cognitive systems, and the AI, IT, and software industries.

  • 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Informatics models of the brainCognitive processes of the brainThe cognitive foundation of big dataMachine consciousnessNeuroscience foundations of information processingDenotational mathematics (DM)Cognitive knowledge basesAutonomous machine learningNeural models of memoryInternal information processingCognitive sensors and networksCognitive linguisticsAbstract intelligence (aI)Cognitive information theoryCognitive information fusionCognitive computersCognitive systemsCognitive man-machine communicationCognitive InternetWorld-Wide Wisdoms (WWW+)Mathematical engineering for AICognitive vehicle systems Semantic computingDistributed intelligenceMathematical models of AICognitive signal processingCognitive image processing Artificial neural netsGenetic computingMATLAB models of AIBrain-inspired systemsNeuroinformaticsNeurological foundations of the brainSoftware simulations of the brainBrain-system interfacesNeurocomputingeBrain models

  • 2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Cognitive Informatics is a transdisciplinary field that studies the internal information processing mechanisms of the brain, the underlying abstract intelligence theories and denotational mathematics, and their engineering applications in cognitive computing, computational intelligence, and cognitive systems. Cognitive Computing is a cutting-edge paradigm of intelligent computing methodologies and systems based on CI, which implements computational intelligence by autonomous inferences and perceptions mimicking the mechanisms of the brain. CI and CC not only synergize theories of modern information science, computer science, communication theories, AI, cybernetics, computational intelligence, cognitive science, intelligence science, neuropsychology, brain science, systems science, software science, knowledge science, cognitive robots, cognitive linguistics, and life science, but also reveal exciting applications in cognitive computers, cognitive robots, and computational intelligence.

  • 2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Cognitive Informatics (CI) is a transdisciplinary field that studies the internal information processing mechanisms of the brain, the underlying abstract intelligence (¿I) theories and denotational mathematics, and their engineering applications in cognitive computing, computational intelligence, and cognitive systems. Cognitive Computing (CC) is a cutting-edge paradigm of intelligent computing methodologies and systems based on cognitive informatics, which implements computational intelligence by autonomous inferences and perceptions mimicking the mechanisms of the brain.

  • 2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    The scope of the conference covers cognitive informatics, cognitive computing, cognitive communications, computational intelligence, and computational linguitics.

  • 2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Cognitive informatics, cognitive computing, cognitive science, cognitive robots, artificial intelligence, computational intelligence

  • 2013 12th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Cognitive Informatics (CI) is a cutting-edge and multidisciplinary research field that tackles the fundamental problems shared by modern informatics, computing, AI, cybernetics, computational intelligence, cognitive science, intelligence science, neuropsychology, brain science, systems science, software engineering, knowledge engineering, cognitive robots, scientific philosophy, cognitive linguistics, life sciences, and cognitive computing.

  • 2012 11th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Cognitive informatics and Cognitive Computing are a transdisciplinary enquiry on the internal information processing mechanisms and processes of the brain and their engineering applications in cognitive computers, computational intelligence, cognitive robots, cognitive systems, and in the AI, IT, and software industries. The 11th IEEE Int l Conference on Cognitive Informatics and Cognitive Computing (ICCI*CC 12) focuses on the theme of e-Brain and Cognitive Computers.

  • 2011 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)

    Cognitive Informatics and Cognitive Computing are a transdisciplinary enquiry on the internal information processing mechanisms and processes of the brain and their engineering applications in cognitive computers, computational intelligence, cognitive robots, cognitive systems, and in the AI, IT, and software industries. The 10th IEEE Int l Conference on Cognitive Informatics and Cognitive Computing (ICCI*CC 11) focuses on the theme of Cognitive Computers and the e-Brain.

  • 2010 9th IEEE International Conference on Cognitive Informatics (ICCI)

    Cognitive Informatics (CI) is a cutting-edge and transdisciplinary research area that tackles the fundamental problems shared by modern informatics, computing, AI, cybernetics, computational intelligence, cognitive science, neuropsychology, medical science, systems science, software engineering, telecommunications, knowledge engineering, philosophy, linguistics, economics, management science, and life sciences.

  • 2009 8th IEEE International Conference on Cognitive Informatics (ICCI)

    The 8th IEEE International Conference on Cognitive Informatics (ICCI 09) focuses on the theme of Cognitive Computing and Semantic Mining. The objectives of ICCI'09 are to draw attention of researchers, practitioners, and graduate students to the investigation of cognitive mechanisms and processes of human information processing, and to stimulate the international effort on cognitive informatics research and engineering applications.

  • 2008 7th IEEE International Conference on Cognitive Informatics (ICCI)

    The 7th IEEE International Conference on Cognitive Informatics (ICCI 08) focuses on the theme of Cognitive Computers and Computational Intelligence. The objectives of ICCI 08 are to draw attention of researchers, practitioners and graduate students to the investigation of cognitive mechanisms and processes of human information processing, and to stimulate the international effort on cognitive informatics research and engineering applications.

  • 2007 6th IEEE International Conference on Cognitive Informatics (ICCI)

  • 2006 5th IEEE International Conference on Cognitive Informatics (ICCI)

  • 2005 4th IEEE International Conference on Cognitive Informatics (ICCI)


2019 IEEE Aerospace Conference

The international IEEE Aerospace Conference is organized to promote interdisciplinaryunderstanding of aerospace systems, their underlying science, and technology


2019 National Conference on Communications (NCC)

The National Conference on Communications is the premier conference on communications and signal processing that is organized in India every year jointly by the Indian Institutes of Technology (IITs) and the Indian Institute of Science (IISc). The conference will feature three symposia in the following areas: Communications, Networks, and Signal Processing. It provides a forum for researchers from academia, research laboratories, and industry to come together to share and learn about current developments in emerging areas. This will be the twenty-fifth (silver jubilee) in the series of annual events being organized in India. Information about the past NCCs is available at http://www.ncc.org.in/.

  • 2018 Twenty Fourth National Conference on Communications (NCC)

    The National Conference on Communications (NCC) is the flagship conference of India in the area of Communications, Signal Processing and Networking. The conference includes the following specific topics under the broad areas listed above: Communications: communications theory and systems including 5G communications; cognitive radio; security in communications; optical and underwater communication systems; RF and antennas; information theory; coding theory and techniques.Signal Processing: array signal processing; biomedical signal processing; audio, image and video signal processing; compressed sensing; natural language processing; pattern recognition; machine learning; deep learning; and detection and estimation.Networking: cyber-physical systems; internet of things; SDN/NFV; security and privacy; cellular, vehicular and sensor networks; social, ad-hoc and data center networks; optical and underwater networks.

  • 2017 Twenty-third National Conference on Communications (NCC)

    The National Conference on Communications (NCC) is the flagship conference of India in the area of Communications, Signal Processing and Networks. It has been organized every year, starting from the year 1995, by the Joint Telematics Group (JTG) of the Indian Institutes of Technology and the Indian Institute of Science.

  • 2016 Twenty Second National Conference on Communication (NCC)

    The conference will feature technical paper sessions, poster sessions, tutorials, workshops and invited talks by eminent researchers from around the world. The original unpublished research papers are invited in three tracks: Communications, Networks, and Signal Processing. Accepted and presented papers in NCC 2016 will be published in the conference proceedings. The papers are also likely to be submitted to IEEE Xplore as well as other abstracting and indexing databases.

  • 2015 Twenty First National Conference on Communications (NCC)

    The twenty first national conference on communications is the premier Indian conference in the areas of Communication, Signal Processsing and Networking. The conference has three symposia in these lines, with topics including wireline and wireless communications, information and coding theory, network design, social networks, audio and video processing, computer networks and protocols, scaling laws etc. The conference attracts original contributions in theoretical as well as experimental studies in these areas.

  • 2014 Twentieth National Conference on Communications (NCC)

    The Twentieth National Conference on Communications (NCC-2014) is the premierconference in India in the area of Communications, Networking, and Signal Processing.Combined three symposia include topics from wireline and wireless communications,information and coding theory, network design, social networks, statistical signal processing,image and video processing, detection & estimation, etc. The conference will have originalcontributions based on theoretical, experimental, design, development, simulation,application, test, measurement, and similar studies.

  • 2013 National Conference on Communications (NCC)

    Original contributions in the fields of communications, networking, and signal processing, based on theoretical, experimental, design, development, simulation, application, test, measurement and similar studies are solicited for presentation at NCC-2013.

  • 2012 National Conference on Communications (NCC)

    The conference will provide a forum for researchers in the areas of communication, signal processing and networking to publish their previously unpublished works. It will also feature some plenary talks and tutorials on emerging topics in the above areas.

  • 2011 National Conference on Communications (NCC)

    The conference will provide a forum for researchers in the areas of communications, networking, and signal processing to present their previously unpublished works. It will also feature three plenary talks by eminent experts surveying broad research areas, and several tutorials on emerging research topics in the above areas.

  • 2010 National Conference on Communications (NCC)

    NCC2010 is India's premier conference in the area of communications and networking. The conference features research-oriented and industry-oriented tutorials, plenary talks by well-known researchers, and a special session on Indian contributions to international telecommunications standards. The conference presents original research in three symposia on Communications, Networks and Signal Processing respectively.


2018 10th International Conference on Cyber Conflict (CyCon)

Conflict and actors in cyberspaceCyber capabilitiesTechnical challenges, innovations and requirementsInternet of thingsInternational law and normsInternational cooperation

  • 2017 9th International Conference on Cyber Conflict (CyCon)

    International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation

  • 2016 8th International Conference on Cyber Conflict (CyCon)

    In today’s increasingly complex cyberspace we see a variety of actors struggling to gain or maintain their position. The ubiquitous use of information and communication technologies has had a profound influence on how these actors pursue their goals and interests. The 8th International Conference on Cyber Conflict (CyCon 2016) will focus on ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace. Both ‘hard’ and ‘soft power’ are being employed to achieve strategic and political goals through technical, legal and economic means. But how can we assess such power? How can we ensure that such power remains in the right hands? How can we ensure or enforce ‘cyber power’ without risking conflict escalation? How can we respond to exercises of this power with the right tools and measures? Is there a way to maintain a balance of power in cyberspace?

  • 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace(CyCon)

    International cooperation and international relations with regards to cyberspace;Technical challenges and requirements;Conflict in cyberspace;Regulations and standards;Virtualisation

  • 2014 6th International Conference on Cyber Conflict (CyCon)

    The International Conference on Cyber Conflict is CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts . The theme of the conference is Active Cyber Defence.

  • 2013 5th International Conference on Cyber Conflict (CyCon)

    Technical, strategic and legal implications of using automaticmethods to manage cyber conflicts. Conceptual Framework of Cyber ConflictsConcepts for using automatic methods in cyber conflictActors in cyber conflictAutomation of Tactical, Operational and Strategic Procedures in Cyber ConflictsCase Studies, Experiments and SystemsCyber Conflict ModelsReasoning and Attribution in Cyber Conflict targeting and Cyber Attack Impact Assessment

  • 2012 4th International Conference on Cyber Conflict (CYCON)

    The 4th International Conference on Cyber Conflict 2012 (CYCON 2012) will provide a multi-disciplinary forum for scholars, researchers, analysts and practitioners to discuss issues related to cyber conflict and warfare. The conference aspires to advance scientific knowledge and understanding and to support the development of related policies, models and systems.

  • 2011 3rd International Conference on Cyber Conflict (ICCC)

    The International Conference on Cyber Conflict is the CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts (see http://www.ccdcoe.org/ICCC). In 2011 the conference will focus on combination of defensive and offensive aspects of Cyber Forces and will combine different views on cyber defence and operations in the current and envisaged threat environments. This shall not be limited to military perspective. Legal, strategic and tec


More Conferences

Periodicals related to Cyber Terrorism

Back to Top

No periodicals are currently tagged "Cyber Terrorism"


Most published Xplore authors for Cyber Terrorism

Back to Top

Xplore Articles related to Cyber Terrorism

Back to Top

Applications of Stream Data Mining on the Internet of Things: A Survey

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

In the era of the Internet of Things (IoT), enormous amount of sensing devices collect and/or generate various sensory data over time for a wide range of fields and applications. Based on the nature of the application, these devices result in big or fast/real time data streams. The analytics technique on the subject matter used to discover new information, anticipate ...


Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

Compared to the past, developments in computer and communication technologies have provided extensive and advanced changes. The usage of new technologies provide great benefits to individuals, companies, and governments, however, it causes some problems against them. For example, the privacy of important information, security of stored data platforms, availability of knowledge etc. Depending on these problems, cyber terrorism is one ...


On the Performance Analysis of Map-Reduce Programming Model on In-Memory NoSQL Storage Platforms: A Case Study

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

The financial data analysis, which is the road map of the future and at the same time the mirror of today, is of vital importance for many institutions. Therefore, it is common to apply statistical analysis on financial data. In such cases, data size becomes very important when performing financial data analysis. While analyzing the financial data, as the size ...


Fighting Cyber Terrorism: Comparison of Turkey and Russia

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about ...


Steganography Application for UTF8 Encoded Texts

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

Encryption is the most common method used to protect the texts from being read by the individuals or systems other than the sender and receiver. In encrypted communication, third parties and supervisors can easily realize that a closed information is transmitted. Although this content cannot be resolved immediately, it can be marked as suspicious. Closed text can also be protected ...


More Xplore Articles

Educational Resources on Cyber Terrorism

Back to Top

IEEE.tv Videos

Fragility of Interconnected Cyber-Physical Systems - Marios M. Polycarpou - WCCI 2016
Toward Cyber-Physical/Human Systems that are Responsive and Scalable - Jing Li - IEEE Sarnoff Symposium, 2019
Opening Chat: Rod Beckstrom and Xiaodong Lee - ETAP Beijing 2016
Cyber-Physical ICT for Smart Cities: Emerging Requirements in Control and Communications - Ryogo Kubo
Keynote Isaac Ben-Israel - ETAP Forum Tel Aviv 2016
Cyber Security Awareness (CSA) in Africa: Basie von Solms - ETAP Forum Namibia, Africa 2017
Hausi Muller: Models At Runtime and Networked Control for Smart Cyber Physical Systems: WF IoT 2016
Abstraction and Modeling of Cyber Security tutorial, Part 2
Abstraction and Modeling of Cyber Security tutorial, Part 1
Keynote: Greg Austin - ETAP Beijing 2016
Cyber Security: Why It’s Everyone’s Business - Panel at IEEE WIE Forum USA East 2017
Achieving a Secure and Resilient Cyber Ecosystem - Homeland Security's Tom Ruoff
CommunicAsia 2017 - Cyber Security (Collaboration with IEEE ComSoc)
Parry Aftab of Cybersafety India at Internet Inclusion: Advancing Solutions, Delhi, 2016
Managing Risks of the Future IoT - Kayne McGladrey - VIC Summit 2019
Ivan Ruchkin: Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems: WF IoT 2016
Risk Prevention for Industrial Controls: IECON 2018
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Industrial Standards and IoT Use Cases - Talk One: IECON 2018
Jacopo Cassina: The Scorpius Roadmap for Cyber, Physical and System - WF-IoT 2015

IEEE-USA E-Books

  • Applications of Stream Data Mining on the Internet of Things: A Survey

    In the era of the Internet of Things (IoT), enormous amount of sensing devices collect and/or generate various sensory data over time for a wide range of fields and applications. Based on the nature of the application, these devices result in big or fast/real time data streams. The analytics technique on the subject matter used to discover new information, anticipate future predictions and make decisions on important issues makes IoT technology valuable for both the business world and the quality of everyday life. In this study, first of all, the concept of IoT and its architecture and relation with big and streaming data are emphasized. Information discovery process applied to the IoT streaming data is investigated and deep learning frameworks covered by this process are described comparatively. Finally, the most commonly used tools for analyzing IoT stream data are introduced and their characteristics are revealed.

  • Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms

    Compared to the past, developments in computer and communication technologies have provided extensive and advanced changes. The usage of new technologies provide great benefits to individuals, companies, and governments, however, it causes some problems against them. For example, the privacy of important information, security of stored data platforms, availability of knowledge etc. Depending on these problems, cyber terrorism is one of the most important issues in todays world. Cyber terror, which caused a lot of problems to individuals and institutions, has reached a level that could threaten public and country security by various groups such as criminal organizations, professional persons and cyber activists. Thus, Intrusion Detection Systems (IDS) have been developed to avoid cyber attacks. In this study, deep learning and support vector machine (SVM) algorithms were used to detect port scan attempts based on the new CICIDS2017 dataset and 97.80%, 69.79% accuracy rates were achieved respectively.

  • On the Performance Analysis of Map-Reduce Programming Model on In-Memory NoSQL Storage Platforms: A Case Study

    The financial data analysis, which is the road map of the future and at the same time the mirror of today, is of vital importance for many institutions. Therefore, it is common to apply statistical analysis on financial data. In such cases, data size becomes very important when performing financial data analysis. While analyzing the financial data, as the size and variety of data and increase, one can achieve the most accurate financial data analysis outcome. However, the increase in data size also brings some disadvantages such as performance-loss due to processing large-scale data. These disadvantages occur in both query performance and various functions that are used in data analysis. In this respect, it is necessary to examine the data storage platforms comparatively, which will investigate the performance of query and statistical functions, used in financial data analysis, at the highest level for large-scale financial data sets. For this purpose, the first step of this study was to compare the performance of the query on the Relational and Non-SQL-based storage environments, and to compare the performance of the query in the single-node and double-node in-memory NoSQL data storage environment. To facilitate testing of these platforms; as the SQL database system, MSSQL was selected and as the distributed in-memory NoSQL database system, Hazelcast was selected. For different data sizes on these platforms, the run times of the query and statistical functions were measured. In order to examine the ability of the in-memory NoSQL data storage platforms, to manage and manipulate the data, map-reduce programming model was used. Performance tests on single nodes and multiple nodes show that in-memory NoSQL platforms are very successful compared to relational database systems. In addition, it has been found that in-memory NoSQL storage platforms provide higher performance gains when using the map-reduce programming model.

  • Fighting Cyber Terrorism: Comparison of Turkey and Russia

    In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about which attacks should be called terrorist attacks. The purpose of this study is to analyze cyber terrorism according to Turkish Law and Russian Law. In the first part of the study Russian and Turkish legislation about cyber terrorism are discussed separately. The second part contains comparison between these two countries and the conclusion.

  • Steganography Application for UTF8 Encoded Texts

    Encryption is the most common method used to protect the texts from being read by the individuals or systems other than the sender and receiver. In encrypted communication, third parties and supervisors can easily realize that a closed information is transmitted. Although this content cannot be resolved immediately, it can be marked as suspicious. Closed text can also be protected by using a hidden method instead of using an encryption method. The hidden text could be attributed “innocent” without notice by the third parties or systems. Recognizing the hidden text will become more difficult when it is included in everyday conversations. In this study, the work of hiding another text within a text encoded in the UTF-8 standard has been made for everyday communication applications. The method used in the study has been controlled by using instant messaging softwares which are widely used.

  • Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form

    In this paper, hardware efficient diffusion layers are generated. Non- involutory and new 8×8 MDS matrices over GF(28) with the best-known XOR counts are constructed by using a new matrix form, which is developed by circulant matrix form and the idea used in developing Generalised Hadamard (GHadamard) matrix form. Then, it is shown that the proposed matrix form is a subset of Toeplitz matrix form.

  • YOLO Approach in Digital Object Definition in Military Systems

    Today, as surveillance systems are widely used for indoor and outdoor monitoring applications, there is a growing interest in real-time generation detection and there are many different applications for real-time generation detection and analysis. Two-dimensional videos; It is used in multimedia content-based indexing, information acquisition, visual surveillance and distributed cross-camera surveillance systems, human tracking, traffic monitoring and similar applications. It is of great importance for the development of systems for national security by following a moving target within the scope of military applications. In this research, a more efficient solution is proposed in addition to the existing methods. Therefore, we present YOLO, a new approach to object detection for military applications.

  • Static and Dynamic Analysis of Third Generation Cerber Ransomware

    Cyber criminals have been extensively using malicious Ransomware software for years. Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motives for such attacks are not only limited to economical scumming. Illegal attacks on official databases may also target people with political or social power. Although billions of dollars have been spent for preventing or at least reducing the tremendous amount of losses, these malicious Ransomware attacks have been expanding and growing. Therefore, it is critical to perform technical analysis of such malicious codes and, if possible, determine the source of such attacks. It might be almost impossible to recover the affected files due to the strong encryption imposed on such files, however the determination of the source of Ransomware attacks have been becoming significantly important for criminal justice. Unfortunately, there are only a few technical analysis of real life attacks in the literature. In this work, a real life Ransomware attack on an official institute is investigated and fully analyzed. The analysis have been performed by both static and dynamic methods. The results show that the source of the Ransomware attack has been shown to be traceable from the server's whois information.

  • Technical Analysis on Financial Time Series Data Based on Map-Reduce Programming Model: A Case Study

    Technical analysis is a widely used method for forecasting the price direction on the financial time series data. This method requires the use of different number and types of analysis algorithms (technical indicators) together. Although these algorithms show successful performance on small-scale financial time series data, significant performance decreases are detected when the size of data increased. On the large-scale financial time series data, it is necessary to implement these algorithms based on the Map-Reduce programming model and examine the performance of the algorithms which are implemented based on this model comparatively. For this purpose, seven different indicators are studied within the scope of this study, new versions of these indicators are implemented using Map-Reduce parallel data processing model and performance comparisons are made with these algorithms. As a result of these comparisons on single-node and multi-node, significant performance gains have been obtained using Map-Reduce programming model.

  • Awareness Qualification Level Measurement Model

    To be able to talk about effective information security against all types of attacks, from a simple cyber attack to cyber terrorism and even cyber warfare, awareness must be defined as a problem, not a solution. To solve this problem “You can not manage what you can not measure!” point of view must be the starting point. Information security problem can be solved if security awareness level can be measured accurately and raising the awareness level according to the measurements. After studies in the literature are examined, it is seen that there is no dynamic model for measuring the cyber security awareness, score based leveling, survey and focus area based approaches are used, measurements are made for certain levels/groups and do not have a certain leveling standardization. In this study, a “capability based dynamic model” has been proposed for the first time in order to measure awareness level. It is seen that the proposed model is superior to the models in literature by these specifications; designed in a stepped structure with leveling standardization, applicable to all groups/levels and capability based approach used. It is considered that the developed model will contribute to the increase of cyber security awareness.



Standards related to Cyber Terrorism

Back to Top

No standards are currently tagged "Cyber Terrorism"


Jobs related to Cyber Terrorism

Back to Top