Anas Muazu Kademi

Anas Muazu Kademi
Yaşar University · Management Information system

PhD.

About

10
Publications
1,587
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24
Citations
Introduction
Anas Muaz Kademi currently works at the computer engineering, Yasar University. Anas does research in strategic Cybersecurity, cyberspace modeling, network modeling, cellular automata models. Their most recent publication is 'Formal Perspectives on Conceptualization of Cyberspace’.

Publications

Publications (10)
Article
Full-text available
The definition and nature of information have perplexed scientists due to its dual nature in measurements. The information is discrete and continuous when evaluated on a metric scale, and the Laplace-Beltrami operator and Gauss-Bonnet Theorem can map one to another. On the other hand, defining the information as a discrete entity on the surface are...
Article
Full-text available
Smart devices in various application areas are becoming increasingly prevalent for efficient handling of multiple critical activities. One such area of interest is high-security militarized environments. Due to military zones’ harsh and unpredictable nature, monitoring devices deployed in such environments must operate without power interruption fo...
Article
Purpose This paper aims to establish a theoretic framework to provide a fundamental understanding of cyberspatial objects, their existence and their identification scheme while providing a connection between cyber-enabled spaces and cyberspace. It develops an avenue to quantify general philosophical and theoretical questions, precisely, inherently...
Article
Cyberspace, which is a complex system, constitutes dynamic networks of various interacting entities such as cyber-physical systems and world-wide-web of information. The quest for principles underlying the structural organization and dynamics of cyberspace often uses a Top-down approach, and no general framework for describing, categorizing, and an...
Conference Paper
Full-text available
Fog computing has got great attention due to its importance especially in Internet of Things (IoT) environment where computation at the edge of the network is most desired. Due to the geographical proximity of resources, Fog computing exhibits lower latency compared to cloud; however, inefficient resource allocation in Fog environment can result in...
Conference Paper
Contemporarily, one of the main challenges for information security community is the growing number of cyber threats. Large scaled, globally orchestrated and constantly evolving attacks are affecting our information systems and technologies every day. Therefore, collection and the exchange of cyber threat intelligence is of supreme importance. The...
Conference Paper
Most cyber threats and attacks on a system, an organisation or a nation have significant consequences, especially on missions, and can affect even an unintended target. Nigeria is vulnerable to such threats, the most pressing of which is cybercrime that sabotage economic prosperity and damage reputation. This cybercrime is a result of (mostly inter...
Conference Paper
Inadequate formalisation or theoretical perspective is a sign of new domain which also holds in cyberspace and its related areas (cyber warfare, etc.). The development of which could solve the problems in lexicon, lack of consensus and provides a ground truth for general analysis and further development. Cyberspace is a complex domain in which the...
Conference Paper
Full-text available
As cloud computing is gaining more recognition to the public, request for services to a given task within the virtual environment of the cloud also increases. This paper proposed a maxmin algorithm liked technique with the aim of developing a new framework that tends to balance the load that may be experienced due to the high demand of resources by...

Network

Cited By