Kaynaklar
[1] Cohen, Fred. “Computer viruses: theory and experiments”, Computers
& security 6.1 (1987): 22-35.
[2] Lo, Raymond W., Karl N. Levitt, and Ronald A. Olsson. “MCF: A
malicious code filter”, Computers & Security 14.6 (1995): 541-566.
R E F I K S A M E T - Ö M E R A S L A N
254
[3] Nazario, Jose. “Defense and Detection Strategies against Internet Worms”,
Artech House, (2004).
[4] Szor, Peter. “The art of computer virus research and defense”, Pearson
Education, (2005).
[5] Dag, Christoffersen. “Worm Detection Using Honeypots”, Master
thesis, (2006).
[6] Siddiqui, Muazzam Ahmed, “Data mining methods for malware
detection“, University of Central Florida, (2008).
[7] Lo, David, et al. “Classification of Software Behaviors for Failure
Detection: A Discriminative Pattern Mining Approach”, Proceedings
of the 15th ACM SIGKDD international conference on Knowledge
discovery and data mining. ACM, (2009).
[8] Davis, Michael, Sean Bodmer, and Aaron LeMasters, “Hacking Exposed
Malware and Rootkits”, McGraw-Hill, Inc., (2009).
[9] Fukushima, Yoshiro, et al. “A behavior based malware detection scheme
for avoiding false positive”, Secure Network Protocols (NPSec),
2010 6th IEEE Workshop on. IEEE, (2010).
[10] You, Ilsun, and Kangbin Yim. “Malware obfuscation techniques: A
brief survey”, Broadband, Wireless Computing, Communication
and Applications (BWCCA), 2010 International Conference on.
IEEE, (2010).
[11] Pratama, Andhika, and Fauzi Adi Rafrastara. “Computer worm
classification”, International Journal of Computer Science and
Information Security 10.4 (2012): 21.
[12] Stallings, William, et al. “Computer security: principles and practice”,
Pearson Education, (2012).
[13] Lachow, Irving, “Active Cyber Defense A Framework for Policymakers”,
February (2013).
[14] Pilling, Rafe. “Global threats, cyber-security nightmares and how to
protect against them”, Computer Fraud & Security 2013.9 (2013): 14-
18.
[15] Hahn, Katja. “Robust static analysis of portable executable
malware”, HTWK Leipzig (2014).
[16] Jang-Jaccard, Julian, and Surya Nepal. “A survey of emerging threats
in cybersecurity”, Journal of Computer and System Sciences 80.5
(2014): 973-993.
K Ö T Ü A M A Ç L I YA Z I L I M L A R V E A N A L İ Z İ
255
[17] Pandey, Sudhir Kumar, and B. M. Mehtre. “A Lifecycle Based Approach
for Malware Analysis”, Communication Systems and Network
Technologies (CSNT), 2014 Fourth International Conference on.
IEEE, (2014).
[18] Steve Morgan, “Cyber Security Business Report”, Aug 22, (2016).
[19] Aslan, Ömer, and Refik Samet. “Investigation of Possibilities to Detect
Malware Using Existing Tools”, 14th ACS/IEEE International
Conference on Computer Systems and Applications AICCSA. (2017).
[20] Aslan, Ömer. “Performance Comparison of Static Malware Analysis
Tools Versus Antivirus Scanners To Detect Malware”, International
Multidisciplinary Studies Congress (IMSC) on. (2017).
[21] Anonymous1 Web sitesi: https://www.webpagefx.com/blog/internet/
cost-of-computer-viruses-infographic/
[22] Anonymous2 Web sitesi: https://www.investopedia.com/financial-
edge/0512/10-of-the-most-costly-computer-viruses-of-all-time.aspx
[23] Anonymous3 Web Sitesi: https://www.gdatasoftware.com/
seccuritylabs/information/history-of-malware
[24] Dick O’Brien, “Internet Security Threat Report on Ransomware”,
Semantec (2017).
[25] Sean Spencer, “Timeline of Computer Viruses”, https://www.mapcon.
com/us-en/timeline-of-computer-viruses.
|