Skip to main content

Cognitive Networked Redemption Operational Conception and Devising (CNROCD)

  • Conference paper
  • First Online:
Book cover Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 584))

  • 1217 Accesses

Abstract

Improving infrastructure, information and communication technologies to significantly increase the use of the Internet is still in use in cyber risks and network threats. Complex movements and new risks and threats systematically paved the way for the language has become a new field of land, air, sea, and space. It is quite clear that the cyber threat is likely to continue to intervene in theaters in the world of cyber year. But sometimes it is difficult to determine, first, column’s Cyber-specific threats—remotely simple computer code into cash Cyber sure that the cyber attacks, cyber terrorism, and industrial espionage. Because, combined with the price of “exponential language and complex cyber attacks, multivariate caused, it becomes a requirement for designers, how to deal with cyber activities and problems in this area in the operational planning process. In this article, we tried to achieve a continuous production flow Cyber in order to understand and visualize complex question of the complexity of cyber crime, and the scope and systematic prevention provide a standard Internet operating model. Disguised as standard, we aim to help designers understand the complex task Cyber demonstrates, the advantage of using the force of gravity analysis of the factors (COG), which is usually dealt with military decision-making (MDMP) at the end of using technicians have an understanding of business planning. Operational cyber proposal will be presented as an example in this study; there are plans to provide a comprehensive Internet-based leader.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Trade, M.I.: Master of war: classic strategic thinking. Routledge (2005)

    Google Scholar 

  2. Trade, M.I., Clausewitz, S.T.: The Art of War and the War College, the US Army Institute for Strategic Studies in Carlisle Barracks, Pennsylvania War (1991)

    Google Scholar 

  3. The brochure, A. T. R. C. (2010). TRADOC Cyberspace Operations Concept Plan 2016–2028 capabilities brochure. Washington, DC: DOD

    Google Scholar 

  4. Göztepe, K., Kilic, R., Food, A.: Depth cyber defense: design cyber security agency in Turkey. Mar. Sci. Technol. J. 10(1), 1–24 (2014)

    Google Scholar 

  5. Göztepe, K.: Based on fuzzy rules based system design expert in computer security. Int. J. Inf. Secur. Sci. 1(1), 13–19 (2012)

    Google Scholar 

  6. Singh, A.K., Sahu, R.: A better quality of internet, telephone and call center integration of e-government for all citizens. Gov. Inf. Q. 25(3), 477–490 (2008)

    Article  Google Scholar 

  7. Gungor, V.C., Falcon, D., Kocak, T., Ergūte, S., Buccella, C., Cecati, C., Hancke, G.P.: Smart Grid and communications technologies and standards. IEEE Trans. Comput. Ind. 7(4), 529–539 (2011)

    Google Scholar 

  8. Choo, K.K.R.: Organized criminal groups in cyberspace: the typology. Organized Crime Trends 11(3), 270–295 (2008)

    Article  Google Scholar 

  9. Kay M.J.: The ISIS tactic Social Media a new place in modern warfare [online]. http://techcrunch.com/2014/10/15/isis-tactics-illustrate-socialmediatonewlocation,modernwar(2014)

  10. Gray, G.: (2014) Isis and social media [online], Ankara Strategy Institute. http://www.ankarastrateji.org/haber/isis-and-social-media1399/

  11. Newman, N., Dutton, W.H., Blank, G.: Social media is changing the ecology of Britain in the fourth and fifth block. Internet Sci. Int. J. 7(1), 6–22 (2012)

    Google Scholar 

  12. Héjas, A.J., Héjas, H., Héjas, J., JA (2015) Cyber ​​war in Lebanon awareness: intelligence research. Int. J. Cyber Secur. Justice Digit. (IJCSDF) 4(4):482–497

    Google Scholar 

  13. Al-Ahmad, W.: Cyber security corporation has developed a strategy for the management of the war. Int. J. Cyber Secur. Justice Digit. (IJCSDF) 2(4), 1–9 (2013)

    Google Scholar 

  14. Liang, G., Xiangsui, W.: Free-of-war, pp. 551–563. PLA Literature and Art Publishing House, Beijing (1999)

    Google Scholar 

  15. Joint Staff, the operational model of the J-7. Planner Manual, joint and coalition warfare in Suffolk, Virginia (2011)

    Google Scholar 

  16. Lussier, J.W., Shadrick, S.B., Prevost, M.I.: Think of it as the commander of a prototype: an adaptive approach (no ARI-RP-2003–02), instruction manual. Army Research Inst. Behavioural and Social Sciences, Alexandria, VA (2003)

    Google Scholar 

  17. FM 5–0. (2010) Process Operations Defence Staff of the Army

    Google Scholar 

  18. FM 101-5. (1997) the organization and operation of the Army, Washington, DC, Headquarters Division staff

    Google Scholar 

  19. Kober, (2010), the AA Design I remove: Army military planning decision-making, coordination, the Advanced Military Studies, United States Army Command and General Staff College at Fort Leavenworth School

    Google Scholar 

  20. Grigsby Jr., W.W., Gorman, S., Marr, J., McLamb, J., Stewart, M., Schiffer, P.: Integrated planning, design, military operations in decision making. Mil. Rev. 92(4), 15 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azeem Mohammed Abdul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdul, A., Cherukuvada, S., Soujanya, A., Sridevi, G., Umar, S. (2018). Cognitive Networked Redemption Operational Conception and Devising (CNROCD). In: Pant, M., Ray, K., Sharma, T., Rawat, S., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 584. Springer, Singapore. https://doi.org/10.1007/978-981-10-5699-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5699-4_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5698-7

  • Online ISBN: 978-981-10-5699-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics