Duqu: A Stuxnetlike Malware Found in the Wild, Laboratory of Cryptography and System Security, 2011. ,
The Cyber Attack on Saudi Aramco, Survival, vol.55, issue.2, pp.81-96, 2013. ,
DOI : 10.1080/00396338.2013.784468
National Strategy to Secure Cyberspace, The White House, 2003. ,
How ISIS is spreading its message online, BBC News, 2014. ,
Responding to Zero Day Threats (www.sans.org/reading-room/ whitepapers/incident/responding-zero-day-threats-33709), 2011. ,
Comparative analysis of the cyber attacks on Estonia, Georgia and Kyrgyzstan, European Scientific Journal, vol.3, pp.237-245, 2014. ,
Cyberpower and national security: Policy recommendations for a strategic framework, National Defense University Press and Potomac Books, pp.3-23, 2009. ,
The Sony hack: How it happened, who is responsible, and what we've learned, Vox, 2014. ,
APT1: Exposing One of China's Cyber Espionage Units, p.2013 ,
Soft Power, Foreign Policy, issue.80, 2004. ,
DOI : 10.2307/1148580
International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World, The White House ,
Hunting for Syrian hackers' chain of command, 2013. ,
The anatomy of a cyber power, International Journal of Critical Infrastructure Protection, vol.7, issue.1, pp.3-11, 2014. ,
DOI : 10.1016/j.ijcip.2014.01.001
Whither cyberpower?, International Journal of Critical Infrastructure Protection, vol.7, issue.2, pp.124-137, 2014. ,
DOI : 10.1016/j.ijcip.2014.04.001
Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013. ,
DOI : 10.1017/CBO9781139169288
Who is Anonymous: 10 key facts, Information Week ? Dark Reading, 2012. ,
Deciphering cyberpower: Strategic purpose in peace and war, Strategic Studies Quarterly, vol.5, issue.2, pp.95-112, 2011. ,
Cybersecurity and Cyberwar: What Everyone Needs to Know ,
What you need to know, Abingdon, United Kingdom (www.sophos.com/en-us/security-news-trends/sec urity-trends/operation-aurora, 2010. ,
Highly Sophisticated and Discreet Threat Targets the Middle East, Mountain View, California (www.symantec .com/connect/blogs/flamer-highly-sophisticated-and-discreetthreat-targets-middle-east ), 2012. ,
Mountain View, California (www.symantec. com/security_response/writeup.jsp?, 2010. ,
Syrian Electronic Army Homepage (www.sea.sy), 2015. ,
Cyber Security Strategy: Protecting and Promoting the U.K. in a Digital World, 2011. ,