Aral, Berdal (2007), “Asimetrik Saldırı Savaşları, Siyaset ve Uluslararası Hukuk”, Uluslararası İlişkiler Dergisi, 4(14), 39-83.
Arnold, Todd ve diğerleri (2013), “Professionalizing The Army’s Cyber Army’s Cyber Officer Force”, Army Cyber Center, http://www.gregconti.com/publications/pro_ cyber.pdf (13.04.2016).
Barnum, Sean (2014), “Standardizing Cyber Threat Intelligence Information with The Structured Threat Information Expression”, STIX Whitepaper, (1.1) http://stixproject.github.io/getting-started/whitepaper/ (12.04.2016).
Bayraktar, Gökhan (2015), Siber Savaş ve Ulusal Güvenlik Stratejisi, İstanbul: Yeniyüzyıl Yayınları.
Bendiek, Annegret ve Metzger, Tobias (2015), Deterrence Theory in the Cyber Security, Working Paper RD EU/Europe, Berlin: Research division/EU.
Bendrath, Ralf ve diğerleri (2007), “From ‘Cyberterrorism’ to ‘Cyberwar’, back and forth: How The United States Securitized Cyberspace”, Johan Eriksson ve Giampiero Giacomello (Ed.), International Relations and Security in The Digital Age, 1. Baskı içinde (57-83), New York: Routledge Publishing.
Bıçakçı, Salih (2012), “Yeni Savaş ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler Dergisi, 9(34), 205-226.
Brown, Gary D., Tullow, Owen W. (2012), “On the Spectrum of Cyber Space Operations”, Small War Journals, http://smallwarsjournal.com/jrnl/art/on-the-spectrum-of-cyberspace-opera... (04.02.2016).
Bucci, Steven (2009), “The Confluence of Cyber Crime and Terrorism”, Lecture#1123 on National Security and Defence, http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-a... (13.01.2016).
Burgess, Heidi ve Guy M. Burgess (1997), Encyclopedia of Conflict Resolution, California: ABC-CLIO, Santa Barbara, California.
Carr, Jeffrey (2012), Inside Cyber Warfare, 2nd Ed. Sebastopol: O’Reilly Publishing.
Caşın, Mesut Hakkı (2008), Uluslararası Terörizm, Ankara: Nobel Yayın Dağıtım.
Vahit GÜNTAY
106
Choucri, Nazli (2012), Cyberpolitics in International Relations, Cambridge: MIT Press.
Clarke, Richard A. ve Knake, Robert K. (2011), Siber Savaş: Ulusal Güvenliğe Yönelik Yeni Tehdit, (Çev. Murat Erduran), İstanbul: İKÜ Yayınevi.
Çakmak, Haydar ve Demir, Cenker Korhan (2009), “Siber Dünyadaki Tehdit ve Kavramlar”, Haydar Çakmak ve Taner Altınok (Ed.), Suç, Terör ve Savaş Üçgeninde Siber Dünya, 1. Baskı içinde (23-55), Anakara: Barış Platin Kitabevi.
Çifçi, Hasan (2013), Her Yönüyle Siber Savaş, Ankara: TÜBİTAK Bilim Kitapları.
Gallo, Giorgio ve Marzano, Arturo (2009), “The Dynamics of Asymmetric Conflicts: The Israeli-Palestinian Case”, The Journal of Conflict Studies, Volume 29.
Gray, Colin S. (2007), War, Peace and International Relations: An Introduction to Strategic History, New York: Routledge Publishing.
Gücüyener, Ayhan (2015), Enerji Güvenliğinde Yeni Bir Arayış, https://www.linkedin.com/pulse/enerji-güvenliğinde-yeni-bir-arayış-ayhan-gucuyener?forceNoSplash=true (15.06.2015).
Hayes, Richard E ve Alberts, David S. (1995), “Information Warfare and Deterrence: Appendix B. The Realm of Information Dominance: Beyond Information War”, Federation of American Scientists, http://fas.org/irp/threat/cyber/docs/iwd/appb .html (08.01.2016).
Hosein, Ian ve Eriksson, Johan (2007), “International Policy Dynamics and The Regulation of Dataflows: Bypassing Domestic Restrictions”, Johan Eriksson ve Giampiero Giacomello (Ed.), International Relations and Security in The Digital Age, 1. Baskı içinde (158-172), New York: Routledge Publishing.
İduğ Y. ve diğerleri (2013), “Siber Caydırıcılık ve Türkiye’nin İmkan ve Kabiliyeti”, 6. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı Bildiriler Kitabı, 1. Baskı içinde (287-290), Ankara: Bilgi Güvenliği Derneği.
Libicki, Martin C. (2007), Conquest in Cyberspace: National Security and Information Warfare, Cambridge: Cambridge University Press.
Libicki, Martin C. (2009), Cyberdeterrence and Cyberwar, Santa Monica: Rand Corporation.
Uluslararası Sistem ve Güvenlik Açısından Değişen Savaş Kurgusu; Siber Savaş Örneği
107
Little, Richard (2007), The Balance of Power in International Relations: Metaphors, Myths and Models, Cambridge: Cambridge University Press.
Lupovici, Amir (2011), “Cyber Warfare and Deterrence: Trends and Challenges in Research”, Military and Strategic Affairs, 3(3), 49-62.
Merrick, Kathryn ve diğerleri (2016), “A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios”, Future Internet, 8 (3), 1-29.
Nye, Joseph S. (2010), Cyber Power, Cambridge: Harvard Kennedy School, Belfer Center for Science and International Affairs.
Passeri, Paolo (2016), “June 2016 Cyber Attacks Statistics”, Hackmageddon Information Security Timelines and Statistics, http://www.hackmageddon.com/2016/07/25/16-30-june-2016-cyber-attacks-sta... (03.06.2016).
Rawnsley, Gary D. (2008), “The Laws of The Playground: Information Warfare and Propaganda Across The Taiwan Strait”, Athina Karatzogianni (Ed.), Cyber Conflict and Global Politics, 1. Baskı içinde (79-94), London: Routledge Chapman Hall.
Singer, P.W. ve Friedman, Allan (2015), Siber Güvenlik ve Siber Savaş, (Çev. Ali Atav), Ankara: Buzdağı Yayınları.
Sönmezoğlu, Faruk (2014), Uluslararası Politika ve Dış Poltika Analizi, 6. Baskı, Der İstanbul: Der Yayınları.
Stevens, Tim (2012), “A Cyberwar of Ideas? Deterrence and Norms in Cyberspace”, Contemporary Security Policy, 33(1), 148-170.
Stone, John (2012), “Cyber War will Take Place”, Journal of Strategic Studies, 36(1), 101-108.
The Statistics Portal (2016a), “Amount of Monetary Damage Caused by Reported Cyber Crime to the IC3 from 2001 to 2015”, http://www.statista.com/statistics/267132/total-damage-caused-by-by-cybe... (03.05.2016).
Toptaş, Ergüder (2009), 21. Yüzyılda Savaş, Ankara: Kripto Yayınları.
United States Government Accountability Office (2010), Briefing to the Subcommittee on Terrorism: Unconventional Threats and Capabilities, Washington DC: Committee on Armed Services, House of Representatives.
Vahit GÜNTAY
108
Varlık, Ali Bilgin (2013), “Savaşı Tanımlamak, Terminolojik Bir Yaklaşım”, Avrasya Terim Dergisi, 1(2), 114-129.
Vinnakota T. (2013), “Understanding of Cyberspace Using Cybernetics: An Imperative need for Cybersecurity of Enterprises”, IEEEXplore, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6865791 (18.01.2016).
Viotti, Paul R. ve Kauppi, Mark V. (2014), Uluslararası İlişkiler ve Dünya Siyaseti, (Çev. Ayşe Özbay Erozan), Ankara: Nobel Yayıncılık.
Walt, Stephen M. (2003), “Güvenlik Çalışmalarının Rönesansı”, Avrasya Dosyası, 9(2), 71-107.
Wiener, Norbert (1948), Cybernetics, or Control and Communication in the Animal and the Machine, Cambridge: MIT Press.
Yılmaz, Sait (2006), 21. Yüzyılda Güvenlik ve İstihbarat, İstanbul: Alfa Yayınları.
Thank you for copying data from http://www.arastirmax.com