Kaynaklar
[1] Anonim,http://www.dijitalajanslar.com/internet-ve-sosyal-medya-kullanici-
istatistikleri-2017/, (Son Erişim Tarihi: 16.08.2018).
[2] Anonim, https://webrazzi.com/2017/05/23/akilli-telefon-satislari-2017nin-
ilk-ceyreginde-yuzde-9-artti/, (Son Erişim Tarihi: 16.08.2018).
[3] Razak, M.F., Anuar, N.B., Salleh, R., Firdaus, A.,“The rise of malware:
bibliometric analysis of malware study”, Journal of Network and
Computer Applications 75, pp. 58-76, Elsevier, 2016.
[4] GSMA, Global Mobile Trends, Eylül 2018.
[5] Google, Mobile Operating Systems Market Share (Son erişim: 23.09.2018)
[6] Anonim, https://www.statista.com/statistics/271496/global-market-share-
held-by-smartphone-vendors-since-4th-quarter-2009/ (Son erişim:
23.09.2018)
M O B İ L C İ H A Z L A R D A S İ B E R G Ü V E N L İ K
343
[7] Anonim, https://www.statista.com/statistics/271644/worldwide-free-
and-paid-mobile-app-store-downloads/ , (Son erişim: 23.09.2018)
[8] US Department of Homeland Security, Study on Mobile Device Security
Report, Nisan 2017.
[9] Milosevic, N., Dehghantana, A., Choo, K.K.R.,“Machine learning
aided android malware classification”, Computers and Electrical
Engineering Journal, Elsevier, 2017.
[10] Alkhateeb, E.M.,“Dynamic Malware Detection using API Similarity”,
2017 IEEE International Conference on Computer and Information
Technology.
[11] Polla M.L., Martinelli F., Sgandurra D., A Survey on Security for Mobile
Devices, IEEE Communications Surveys&Tutorials, 2012.
[12] Dawson M., Wright J., Omar M., Mobile Devices: The Case for Cyber
Security Hardened Systems, Selected Works, Ocak 2016.
[13] Damopoulos D., Kambourakis G., Gritzalis S., iSAM: An iPhone Stealth
Airborne Malware, http://www.icsd.aegean.gr/publication_files/
conference/462488002.pdf (Son erişim: 22.09.2018)
[14] Yao M.L., Chuang M.C., Hsu C.C., The Kano model analysis of features
for mobile security applications, Elsevier, Computer&Security 78,
336-346, 2018.
[15] Vasco J.V., Best Practices in Mobile Security, Biometric Technology
Today, Mart 2016.
[16] Pang J.H.J., Chua C.L., Chan G.H., Lim S.L., Challenges in Mobile
Security, DSTA Horizon, 2016.
[17] Şenol, S.K., “Mobil Akıllı Cihazlar İçin Zararlı Yazılım Uygulamaları
ve Güvenlik Çözümleri” Gazi Üniversitesi Fen Bilimleri Enstitüsü
Elektrik-Elektronik Mühendisliği Anabilim Dalı, Doktora Tezi,
Ocak 2018.
[18] GSMA, Safety, privacy and security across the mobile ecosystem: key
issues and policy implications, 2017.
[19] Dua L., Bansal D., Taxonomy: Mobile Malware Threats and Detection
Techniques, CS&IT CSCP 2014, pp. 213-221.
[20] Zaidi, S.F.A., Shah M.A., Kamran M., Javaid Q., Zhang S., A Survey on
Security for Smartphone Device, International Journal of Advanced
Computer Science and Applivations, Vol. 7, No:4, 2016.
[21] Anonim, https://www.welivesecurity.com/2016/11/01/history-mobile-
malware-cabir-sms-thief/ (Son erişim: 22.09.2018)
MUSTAFA ALKAN - İ. ALPER DOĞRU - MURAT DÖRTERLER - RAMİ URFALIOĞLU - ÇAĞRI SÜMER
344
[22] Niemala J., Symbian Malware What it is and How handle it, F-secure
Coorpartion,
http://www.blackhat.com/presentations/bh-
federal-06/BH-Fed-06-Niemela/BH-Fed-06-Niemela-Symbian.
pdf (Son erişim: 22.09.2018)
[23] Anonim, http://malware.wikia.com/wiki/Ikee , (Son erişim: 23.09.2018)
[24] Anonim, https://securelist.com/zeus-in-the-mobile-for-
android-10/29258/, (Son erişim: 23.09.2018)
[25] Anonim, https://www.webopedia.com/TERM/D/droiddream.html,
(Son erişim: 23.09.2018)
[26]
Anonim,https://www.symantec.com/security-center/
writeup/2013-060301-4418-99 , (Son erişim: 22.09.2018)
[27] Nokia Security Center Berlin, Nokia Threat Intelligence Report, 2016.
[28] Anonim, https://www.securityweek.com/xbot-android-trojan-steals-
banking-info-encrypts-devices , (Son erişim: 23.09.2018)
[29] Anonim, https://citizenlab.ca/2018/09/hide-and-seek-tracking-
nso-groups-pegasus-spyware-to-operations-in-45-countries/,
(Son erişim: 24.09.2018)
[30] Anonim,https://securelist.com/it-threat-evolution-q2-2018-
statistics/87170/ , (Son erişim: 23.09.2018)
[31] Popov, I.,“Malware detection using machine learning based on
word2vec embeddings of machine code instructions”, 2017 SSDSE,
IEEE, 2017.
[32] Damodaran, A., Troia, F. D.,Corrado,V. A., Austin,T. H., Stamp, M.,“A
Comparison of Static, Dynamic, and Hybrid Analysis for Malware
Detection”, Journal of Computer Virology and Hacking Techniques,
pp. doi:10.1007/s11416-015-0261-z, 2015.
[33] Li, Q., Li, X.,“Android malware detection based on static analysis of
characteristic tree”, Cyber-Enabled Distributed Computing and
Knowledge Discovery (CyberC), pp. 84-91, 2015.
[34] Schmith, A., Clausen, J., Camtepe, A.,“Detecting symbian OS malware
through static function call analysis”, Proceeding 4
th
International
Conference malicious and unwanted software, pp. 15-22, 2009.
[35] Shen, T, Zhongyang Y., Xin, Z., Mao, B., Huang, H.,“Detect android
malware variants using component based topology graph”, 2014
IEEE 13
th
International Conference on Trust, Security and Privacy in
computing and communications, pp. 406-413, 2014.
M O B İ L C İ H A Z L A R D A S İ B E R G Ü V E N L İ K
345
[36] Wang, W., Wang, X., Feng, D., Liu, J., Han Z., Zhang, X.,“Exploring
permission induced risk in android applications for malicious
application detection”, IEEE Trans. Inf. Forensic Security, pp. 1869-
1882, 2014.
[37] Moser, A.,Kruegel, C., Kirda, E.,“Limits of static analysis formalware
detection”, IEEE Computer security applications conference,
ACSAC 2007. Twenty-third annual,pp. 421–430, 2007.
[38] Kabakuş, A.T., Doğru, İ.A., Çetin, A., “Android kötücül yazılım tespit
ve koruma sistemleri” Erciyes, Fen Bilimleri Enstitüsü Dergisi,
31(1):9-16, 2015.
[39] Utku, A., Doğru, İ.A., Android kötücül yazılımlar için izin tabanlı
tespit sistemi, Gazi Üniversitesi MMF Dergisi, 2017
[40] Willems, C., Holz, T., Freiling, F.,“Toward automated dynamicmalware
analysis using cwsandbox”, IEEE Security & Privacy, vol. 5,no. 2,
2007.
[41] Balaji, B., Ralusca, A., “A study of android malware detection
techniques and machine learning”, Proceedings of the 27
th
modern
artificial intelligence and cognitive science conference, pp. 15-23.
[42] Diri B., Doç. Dr., Yıldız Teknik Üniversitesi Bilgisayar Mühendisliği,
Makine Öğrenmeye Giriş, 2014.
[43] Çayıroğlu İ., İleri Algoritma Analizi-5, Yapay Sinir Ağları, Karabük
Üniversitesi, Mühendislik Fakültesi.
[44] Anonim, https://en.wikipedia.org/wiki/Mobile_device_management,
(Son erişim: 24.09.2018)
[45] Anonim, https://mobilemacsters.com/mdm/ , (Son erişim: 24.09.2018)
[46] Anonim, https://www.gartner.com/doc/2757817/magic-quadrant-
enterprise-mobility-management , (Son erişim: 24.09.2018)
|