Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Permanent URI for this collectionhttps://hdl.handle.net/11147/7148
Browse
3 results
Search Results
Conference Object Citation - WoS: 3Citation - Scopus: 4Recent Cyberwar Spectrum and Its Analysis(Curran Associates, 2012) Aslanoğlu, Rabia; Tekir, SelmaWar is an organized, armed, and often prolonged conflict that is carried on between states, nations or other parties. Every war instance includes some basic components like rising conditions, battlespace, weapons, strategy, tactics, and consequences. Recent developments in the information and communication technologies have brought about changes on the nature of war. As a consequence of this change, cyberwar became the new form of war. In this new form, the new battlespace is cyber space and the contemporary weapons are constantly being renovated viruses, worms, trojans, denial-of-service, botnets, and advanced persistent threat. In this work, we present recent cyberwar spectrum along with its analysis. The spectrum is composed of the Estonia Attack, Georgia Attack, Operation Aurora, and Stuxnet Worm cases. The methodology for analysis is to identify reasons, timeline, effects, responses, and evaluation of each individual case. Moreover, we try to enumerate the fundamental war components for each incident. The analysis results put evidences to the evolution of the weapons into some new forms such as advanced persistent threat. Another outcome of the analysis is that when approaching to the end, confidentiality and integrity attributes of information are being compromised in addition to the availability. Another important observation is that in the last two cases, the responsive actions were not possible due to the lack of the identities of the offending parties. Thus, attribution appears as a significant concern for the modern warfare. The current sophistication level of the cyber weapons poses critical threats to society. Particularly developed countries that have high dependence on information and communication technologies are potential targets since the safety of the critical infrastructures like; healthcare, oil and gas production, water supply, transportation and telecommunication count on the safety of the computer networks. Being aware of this fact, every nation should attach high priorities to cyber security in his agenda and thus behave proactively.Article Citation - WoS: 17Citation - Scopus: 162-D Analysis of Ge Implanted Sio2 Surfaces by Laser-Induced Breakdown Spectroscopy(Elsevier Ltd., 2008) Yalçın, Şerife; Örer, Sabiha; Turan, Raşit2-D elemental distribution of Ge in silicon oxide substrates with differing implantation doses of between 3 × 1016 cm- 2 and 1.5 × 1017 cm- 2 has been investigated by Laser-Induced Breakdown Spectroscopy (LIBS). Spectral emission intensity has been optimized with respect to time, crater size, ablation depth and laser energy. Atomic Force Microscopy (AFM) and Scanning Electron Microscopy (SEM) coupled with Energy-Dispersive X-Ray Spectroscopy (EDX) have been utilized to obtain crater depth, morphology and elemental composition of the sample material, respectively. LIBS spectral data revealed the possibility of performing 2-D distribution analysis of Ge atoms in silicon oxide substrate. EDX analysis results confirmed that LIBS is capable to detect Ge atoms at concentrations lower than 0.2% (atomic). LIBS as a fast semi-quantitative analysis method with 50 μm lateral and 800 nm depth resolution has been evaluated. Results illustrate the potential use of LIBS for rapid, on-line assessment of the quality of advanced technology materials during the manufacturing process. © 2008 Elsevier B.V. All rights reserved.Conference Object Citation - WoS: 3Citation - Scopus: 6Phase-Based Methods for Voice Source Analysis(Springer Verlag, 2007) D’Alessandro, Christophe; Bozkurt, Barış; Doval, Boris; Dutoit, Thierry; Henrich, Nathalie; Tuan, Vu Ngoc; Sturmel, NicolasVoice source analysis is an important but difficult issue for speech processing. In this talk, three aspects of voice source analysis recently developed at LIMSI (Orsay, France) and FPMs (Mons, Belgium) are discussed. In a first part, time domain and spectral domain modelling of glottal flow signals are presented. It is shown that the glottal flow can be modelled as an anticausal filter (maximum phase) before the glottal closing, and as a causal filter (minimum phase) after the glottal closing. In a second part, taking advantage of this phase structure, causal and anticausal components of the speech signal are separated according to the location in the Z-plane of the zeros of the Z-Transform (ZZT) of the windowed signal. This method is useful for voice source parameters analysis and source-tract deconvolution. Results of a comparative evaluation of the ZZT and linear prediction for source/tract separation are reported. In a third part, glottal closing instant detection using the phase of the wavelet transform is discussed. A method based on the lines of maximum phase in the time-scale plane is proposed. This method is compared to EGG for robust glottal closing instant analysis.
