Editörler Prof. Dr. Şeref Sağıroğlu Prof. Dr. Mustafa Alkan Sağıroğlu / Alkan grafik



Yüklə 3,91 Mb.
Pdf görüntüsü
səhifə152/219
tarix20.11.2023
ölçüsü3,91 Mb.
#163459
1   ...   148   149   150   151   152   153   154   155   ...   219
siber-guvenlik-kitap-basila-04-01-2019

Kaynaklar
[1] Kim, J., Park, S., Hyuni T., “An Inquiry into International Countermeasures 
against Cyberterrorism”, The 7th International Conference on Advance 
Communication Technology, pp. 432-435, 2005. 
[2] Lim, Y.W., Ryu, H.R., Choi, K.S., Park, C.W., Park, W.H., Kook, K.H., “A 
Study on Malware Detection System Model Based on Correlation 
Analysis using Live Response Techniques”, International Conference 
on Information Science and Applications, pp. 1-6, 2012.
[3] Av-Test, Malware Statistics, https://www.av-test.org/en/statistics/
malware, 2018.


S İ B E R T E R Ö R , T E R Ö R İ Z M V E M Ü C A D E L E
279
[4] Sadeghi, A.R., “Games without Frontiers: Whither Information Security 
and Privacy?”, IEEE Security & Privacy, vol. 14(1), pp. 3-5, 2016.
[5] Lapayese, M.J.G., “Terrorism and Its Transition to Cyberspace”, IEEE 
European Intelligence and Security Informatics Conference, pp. 178, 
2015.
[6] Morgan, S., “2017 Cybercrime Report”, Cybersecurity Ventures, 
Herjavec Group, pp. 1-24, 2017.
[7] Weimann, G., “Terror on the Internet: The New Arena, the New 
Challenges”, United State Institute of Peace, Washington DC, 2006.
[8] Dewan, P., Kumaragru, P., “Towards Automatic Real Time Identification 
of Malicious Posts on Facebook”, 13th Annual Conference on 
Privacy, Security and Trust (PST), pp. 85-92, 2015.
[9] Zech, M. “17 Spam Scams on Facebook, Twitter”, https://nltimes.nl/ 
2014/07/22/flight-17-spam-scams-facebook-twitter/, 2014.
[10] Berghel, A., “Farewall to Air Gaps, Part 2”, IEEE Computers & 
Magazines, vol. 48(7), pp. 59-63, 2015.
[11] Hoffman, B., “Inside Terrorism”, New York: Columbia University 
Press, 2006.
[12] Post, J. “The Mind of Terrorist: The Psychology of Terrorism from IRA 
to al-Qaeda”, New York: Palgrave Macmillian, 2007.
[13] Kilger, M., “Integrating Human Behavior into the Development 
of Future Cyberterrorism Scenarios”, IEEE 10th International 
Conference on Availability, Reliability and Security, pp. 693-700, 
2015.
[14] Silke, A., “Terrorists, Victims and Society: Psychological Perspectives 
on Terrorism and its Consequences (The Psychology of Cyber-
terrorism)”, John Wiley & Sons, 2003.
[15] Canetti, D., Gross, M.L., Waismel-Manor, I., “Binary Bullets: The Ethics 
of Cyberwarfare (Immune from Cyberfire?)”, Oxford University 
Press, 2016.
[16] Cuevas ve Rennison, “The Psychology of Violence (The Psychology of 
Cyberviolence)”, Wiley-Blackwell, 2016.
[17] Bosco, F., “The New Cybercriminals HPP: Hacker Profiling Project”, 
SECURE 2012, Poland, 2012.
[18] DARPA: Defense Advanced Research Projects Agency, “Proposal 
for R&D Support of DARPA Cyber Genome Program”, General 


Y I L D I R A Y Y A L M A N
280
Dynamics Advanced Information Systems, Virgiia, USA, pp. 1-45, 
2010.
[19] Cho, H., Lee, S., Kim, B., Shin, Y., Lee, T., “The Study of Prediction of 
Same Attack Group by Comparing Similarity Domain”, International 
Conference on Information and Communication Technology 
Convergence (ICTC), pp. 1220-1222, 2015. 
[20] Blazic, B.J., Klobucar, T., “Missing Solutions in the Fight against 
Cybercrime and Cyberterrorism – the New EU Research Agenda”, 
European Intelligence and Security Informatics Conference, pp. 128-
131, 2016.
[21] TÜİK, http://www.tuik.gov.tr/HbPrint.do?id=24862, 2017.
[22] Kara, M. “Türkiye’de yazılım/donanım güvenliği değerlendirme 
çalışmaları”, TÜBİTAK-UEKAE, 2009.
[23] Yalman, Y. Yesilyurt, M., “Information Security Threats and Information 
Assurance”, TEM Journal - Technology, Education, Management, 
Informatics, vol. 2(3), pp. 247–252, 2013.
[24] Kam, H.J., Katerattanakul, P., “Diversifying Cybersecurity Education: 
A Non-Technical Approach to Technical Studies”, IEEE Frontiers on 
Education Conference, pp. 1-4, 2014.
[25] Page, E.J., Allen, L.A., Gray, J.P., Bateman, S.M., “Development 
and Description of an Interdisciplinary Course on the Science of 
Terrorism”, IEEE 3rd Integrated STEM Education Conference, pp. 
1-4, 2013. 



Yüklə 3,91 Mb.

Dostları ilə paylaş:
1   ...   148   149   150   151   152   153   154   155   ...   219




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin