Anas Muazu KademiYaşar University · Management Information system
Anas Muazu Kademi
PhD.
About
10
Publications
1,587
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Introduction
Anas Muaz Kademi currently works at the computer engineering, Yasar University. Anas does research in strategic Cybersecurity, cyberspace modeling, network modeling, cellular automata models. Their most recent publication is 'Formal Perspectives on Conceptualization of Cyberspace’.
Publications
Publications (10)
The definition and nature of information have perplexed scientists due to its dual nature in measurements. The information is discrete and continuous when evaluated on a metric scale, and the Laplace-Beltrami operator and Gauss-Bonnet Theorem can map one to another. On the other hand, defining the information as a discrete entity on the surface are...
Smart devices in various application areas are becoming increasingly prevalent for efficient handling of multiple critical activities. One such area of interest is high-security militarized environments. Due to military zones’ harsh and unpredictable nature, monitoring devices deployed in such environments must operate without power interruption fo...
Purpose
This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing a connection between cyber-enabled spaces and cyberspace. It develops an avenue to quantify general philosophical and theoretical questions, precisely, inherently...
Cyberspace, which is a complex system, constitutes dynamic networks of various interacting entities such as cyber-physical systems and world-wide-web of information. The quest for principles underlying the structural organization and dynamics of cyberspace often uses a Top-down approach, and no general framework for describing, categorizing, and an...
Fog computing has got great attention due to its importance especially in Internet of Things (IoT) environment where computation at the edge of the network is most desired. Due to the geographical proximity of resources, Fog computing exhibits lower latency compared to cloud; however, inefficient resource allocation in Fog environment can result in...
Contemporarily, one of the main challenges for information security community is the growing number of cyber threats. Large scaled, globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore, collection and the exchange of cyber threat intelligence is of supreme importance. The...
Most cyber threats and attacks on a system, an organisation or a nation have significant consequences, especially
on missions, and can affect even an unintended target. Nigeria is vulnerable to such threats, the most pressing of which is
cybercrime that sabotage economic prosperity and damage reputation. This cybercrime is a result of (mostly inter...
Inadequate formalisation or theoretical perspective is a sign of new domain which also holds in cyberspace and its
related areas (cyber warfare, etc.). The development of which could solve the problems in lexicon, lack of consensus and
provides a ground truth for general analysis and further development. Cyberspace is a complex domain in which the...
As cloud computing is gaining more recognition to the public, request for services to a given
task within the virtual environment of the cloud also increases. This paper proposed a maxmin algorithm liked technique with the aim of developing a new framework that tends to
balance the load that may be experienced due to the high demand of resources by...