Editörler Prof. Dr. Şeref Sağıroğlu Prof. Dr. Mustafa Alkan Sağıroğlu / Alkan grafik



Yüklə 3,91 Mb.
Pdf görüntüsü
səhifə142/219
tarix20.11.2023
ölçüsü3,91 Mb.
#163459
1   ...   138   139   140   141   142   143   144   145   ...   219
siber-guvenlik-kitap-basila-04-01-2019

Kaynaklar
[1] Cohen, Fred. “Computer viruses: theory and experiments”, Computers 
& security 6.1 (1987): 22-35. 
[2] Lo, Raymond W., Karl N. Levitt, and Ronald A. Olsson. “MCF: A 
malicious code filter”, Computers & Security 14.6 (1995): 541-566.


R E F I K S A M E T - Ö M E R A S L A N
254
[3] Nazario, Jose. “Defense and Detection Strategies against Internet Worms”, 
Artech House, (2004).
[4] Szor, Peter. “The art of computer virus research and defense”, Pearson 
Education, (2005).
[5] Dag, Christoffersen. “Worm Detection Using Honeypots”, Master 
thesis, (2006).
[6] Siddiqui, Muazzam Ahmed, “Data mining methods for malware 
detection“, University of Central Florida, (2008).
[7] Lo, David, et al. “Classification of Software Behaviors for Failure 
Detection: A Discriminative Pattern Mining Approach”, Proceedings 
of the 15th ACM SIGKDD international conference on Knowledge 
discovery and data mining. ACM, (2009).
[8] Davis, Michael, Sean Bodmer, and Aaron LeMasters, “Hacking Exposed 
Malware and Rootkits”, McGraw-Hill, Inc., (2009).
[9] Fukushima, Yoshiro, et al. “A behavior based malware detection scheme 
for avoiding false positive”, Secure Network Protocols (NPSec), 
2010 6th IEEE Workshop on. IEEE, (2010).
[10] You, Ilsun, and Kangbin Yim. “Malware obfuscation techniques: A 
brief survey”, Broadband, Wireless Computing, Communication 
and Applications (BWCCA), 2010 International Conference on. 
IEEE, (2010).
[11] Pratama, Andhika, and Fauzi Adi Rafrastara. “Computer worm 
classification”, International Journal of Computer Science and 
Information Security 10.4 (2012): 21.
[12] Stallings, William, et al. “Computer security: principles and practice”, 
Pearson Education, (2012).
[13] Lachow, Irving, “Active Cyber Defense A Framework for Policymakers”, 
February (2013).
[14] Pilling, Rafe. “Global threats, cyber-security nightmares and how to 
protect against them”, Computer Fraud & Security 2013.9 (2013): 14-
18.
[15] Hahn, Katja. “Robust static analysis of portable executable 
malware”, HTWK Leipzig (2014).
[16] Jang-Jaccard, Julian, and Surya Nepal. “A survey of emerging threats 
in cybersecurity”, Journal of Computer and System Sciences 80.5 
(2014): 973-993.


K Ö T Ü A M A Ç L I YA Z I L I M L A R V E A N A L İ Z İ
255
[17] Pandey, Sudhir Kumar, and B. M. Mehtre. “A Lifecycle Based Approach 
for Malware Analysis”, Communication Systems and Network 
Technologies (CSNT), 2014 Fourth International Conference on. 
IEEE, (2014).
[18] Steve Morgan, “Cyber Security Business Report”, Aug 22, (2016).
[19] Aslan, Ömer, and Refik Samet. “Investigation of Possibilities to Detect 
Malware Using Existing Tools”, 14th ACS/IEEE International 
Conference on Computer Systems and Applications AICCSA. (2017).
[20] Aslan, Ömer. “Performance Comparison of Static Malware Analysis 
Tools Versus Antivirus Scanners To Detect Malware”, International 
Multidisciplinary Studies Congress (IMSC) on. (2017).
[21] Anonymous1 Web sitesi: https://www.webpagefx.com/blog/internet/
cost-of-computer-viruses-infographic/
[22] Anonymous2 Web sitesi: https://www.investopedia.com/financial-
edge/0512/10-of-the-most-costly-computer-viruses-of-all-time.aspx
[23] Anonymous3 Web Sitesi: https://www.gdatasoftware.com/
seccuritylabs/information/history-of-malware
[24] Dick O’Brien, “Internet Security Threat Report on Ransomware”, 
Semantec (2017).
[25] Sean Spencer, “Timeline of Computer Viruses”, https://www.mapcon.
com/us-en/timeline-of-computer-viruses.




Yüklə 3,91 Mb.

Dostları ilə paylaş:
1   ...   138   139   140   141   142   143   144   145   ...   219




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin