B. Bencsath, G. Pek, L. Buttyan, and M. Felegyhazi, Duqu: A Stuxnetlike Malware Found in the Wild, Laboratory of Cryptography and System Security, 2011.

C. Bronk, The Cyber Attack on Saudi Aramco, Survival, vol.55, issue.2, pp.81-96, 2013.
DOI : 10.1080/00396338.2013.784468

G. Bush, National Strategy to Secure Cyberspace, The White House, 2003.

F. Irshaid, How ISIS is spreading its message online, BBC News, 2014.

A. Kliarsky, Responding to Zero Day Threats (www.sans.org/reading-room/ whitepapers/incident/responding-zero-day-threats-33709), 2011.

A. Kozlowski, Comparative analysis of the cyber attacks on Estonia, Georgia and Kyrgyzstan, European Scientific Journal, vol.3, pp.237-245, 2014.

F. Kramer, Cyberpower and national security: Policy recommendations for a strategic framework, National Defense University Press and Potomac Books, pp.3-23, 2009.

T. Lee, The Sony hack: How it happened, who is responsible, and what we've learned, Vox, 2014.

. Mandiant, APT1: Exposing One of China's Cyber Espionage Units, p.2013

J. Nye, Soft Power, Foreign Policy, issue.80, 2004.
DOI : 10.2307/1148580

B. Obama, International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World, The White House

N. Perlroth, Hunting for Syrian hackers' chain of command, 2013.

J. Rowland, M. Rice, and S. Shenoi, The anatomy of a cyber power, International Journal of Critical Infrastructure Protection, vol.7, issue.1, pp.3-11, 2014.
DOI : 10.1016/j.ijcip.2014.01.001

J. Rowland, M. Rice, S. Shenoi, and W. Cyberpower, Whither cyberpower?, International Journal of Critical Infrastructure Protection, vol.7, issue.2, pp.124-137, 2014.
DOI : 10.1016/j.ijcip.2014.04.001

M. Schmitt, Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013.
DOI : 10.1017/CBO9781139169288

M. Schwartz, Who is Anonymous: 10 key facts, Information Week ? Dark Reading, 2012.

J. Sheldon, Deciphering cyberpower: Strategic purpose in peace and war, Strategic Studies Quarterly, vol.5, issue.2, pp.95-112, 2011.

P. Singer and A. Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know

O. Sophos and . Aurora, What you need to know, Abingdon, United Kingdom (www.sophos.com/en-us/security-news-trends/sec urity-trends/operation-aurora, 2010.

F. Symantec, Highly Sophisticated and Discreet Threat Targets the Middle East, Mountain View, California (www.symantec .com/connect/blogs/flamer-highly-sophisticated-and-discreetthreat-targets-middle-east ), 2012.

W. Symantec and . Stuxnet, Mountain View, California (www.symantec. com/security_response/writeup.jsp?, 2010.

A. Syrian-electronic, Syrian Electronic Army Homepage (www.sea.sy), 2015.

U. K. Office and U. K. The, Cyber Security Strategy: Protecting and Promoting the U.K. in a Digital World, 2011.