1.
Baykara, M., DaÅŸ, R., Karadogan, Ä°., “Bilgi GüvenliÄŸi Sistemlerinde Kullanılan Araçların Ä°ncelenmesiâ€Â, 1st International Symposium on Digital Forensics and Security, pp. 231-239, 20-22 May. 2013, Firat University, Elazığ-Turkey.
2.
Razzaq, A., Hur, A., Masood, M., Latif, K., Ahmad, H.F., Takahashi, H., "Foundation of Semantic Rule Engine to Protect Web Application Attacks," 10th International Symposium on Autonomous Decentralized Systems (ISADS), pp. 95-102, 23-27 March 2011.
3.
Lounis, O., Bouhouita Guermeche, S.E., Saoudi, L., Benaicha, S.E., "A new algorithm for detecting SQL injection attack in Web application," Science and Information Conference (SAI), pp. 589-594, 27-29 Aug. 2014.
4.
Liang Guangmin, "Modeling Unknown Web Attacks in Network Anomaly Detection," Third International Conference on Convergence and Hybrid Information Technology, ICCIT '08, vol.2, no., pp. 112-116, 11-13 Nov. 2008.
5.
Ludinard, R., Totel, E., Tronel, F., Nicomette, V., Kaaniche, M., Alata, E., Akrout, R., Bachy, Y., "Detecting attacks against data in web applications", 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1-8, 10-12 Oct. 2012.
6.
Zolotukhin, M., Hamalainen, T., Kokkonen, T., Siltanen, J., "Analysis of HTTP Requests for Anomaly Detection of Web Attacks," 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE, pp. 406,411, 24-27 Aug. 2014.
7.
Takcı, H., Akyuz, T., & Sogukpınar, Ä°., “Web Atakları İçin Metin Tabanlı Anormallik Tespiti (Wamtat)â€Â, Journal of The Faculty of Engineering and Architecture of Gazi University, Vol: 22, No: 2, pp. 247-253, 2007.
8.
SağıroÄŸlu, Åž., Güven, E.N., YavanoÄŸlu, U., “Zeki Saldırı Tespit Sistemi Tasarımı ve GerçekleÅŸtirilmesiâ€Â, Journal of The Faculty of Engineering and Architecture of Gazi University, Vol:26, No:2, pp. 325-340, 2011.
9.
Sancak, S., “Saldırı Tespit Sistemi Tekniklerinin KarşılaÅŸtırılmasıâ€Â, Master Thesis, Gebze Technical University, 2008.
10.
Baykara, M., “Design and Implementation of Intrusion Detection and Prevention Approaches for Information Systemsâ€Â, Ph.D Thesis, Fırat University, Graduate School of Natural and Applied Sciences, Department of Software Engineering 2016.
11.
Demirol D., Daş R., Baykara M., "SQL Enjeksiyon Saldırı Uygulaması ve Güvenlik Önerileri", 1st International Symposium on Digital Forensics and Security, 20-22 Mayıs 2013, Firat University, Elazığ.
12.
Ä°nternet: Ar, Ä°., “Nüfuz Tespit Sistemleriâ€Â, http://anibal.gyte.edu.tr/hebe/AblDrive/59669005/w/Storage/104_2010_2_673_59669005/Homeworks/lktan-ar-nufuz-tespit-sistemleri.pdf, (Access Date: 10.03.2017).
13.
Vural, Y., SağıroÄŸlu, Åž., “Kurumsal Bilgi GüvenliÄŸi ve Standartları üzerine bir Ä°ncelemeâ€Â, Journal of The Faculty of Engineering and Architecture of Gazi University, Vol: 23, No: 2, pp. 507-522, June 2008.
14.
Vural, Y., SağıroÄŸlu, Åž., “Kurumsal Bilgi GüvenliÄŸinde Güvenlik Testleri ve Önerilerâ€Â, Journal of The Faculty of Engineering and Architecture of Gazi University, Vol:26, No:1, pp. 89-103, 2011.
15.
Özhan, E., Paket ve Port Analizi İle Ağ Saldırı Tespit Sistemleri, Master Thesis, Trakya University, Graduate School of Natural and Applied Sciences, 2006.
16.
Sazli, H., M., Tanrıkulu, H., “Saldırı Tespit Sistemlerinde Yapay Sinir AÄŸlarının Kullanılmasıâ€Â, XII. Türkiye’de Ä°nternet Konferansı, 8-10 Kasım, Ankara, 2007.
17.
Huang at all, “A Multi-Agent-Based Distributed Intrusion Detection Systemâ€Â, 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010.
18.
Canbek, G., SağıroÄŸlu, Åž., “Bilgisayar Sistemlerine Yapılan Saldırılar ve Türleri: Bir Ä°ncelemeâ€Â, Erciyes University Journal of Institue of Science and Technology, 23(1-2), pp. 1-12, 2007.
19.
Patcha, A., Park, J.M., “An overview of anomaly detection techniques: Existing solutions and latest technological trendsâ€Â, Computer Networks, 51(12): pp. 3448-3470, 2007.
20.
Anderson, J.P., “Computer Security Threat Monitoring and Surveillanceâ€Â, Technical Report, James P. Anderson Co., Fort Washington, PA. 15 April 1980.
21.
Arıs, A., Oktug S. F. and Yalçın, S. B. Ö., "Nesnelerin Interneti Güvenligi: Servis Engelleme Saldırıları Internet-of-Things Security: Denial of Service Attacks", 2015.
22.
Öğretmen, F. D., Aydın, M. A. and Ahmet Sertbaş., "Saldırı Tespit Sisteminin Bulut Bilişimde Kullanımı ve Etkileri", ISC-Turkey, 30-31 October 2015.
23.
Yavuz, G., BektaÅŸ, O., Soysal, M., and YiÄŸit, S., "Sanal Ipv6 Balküpü Ağı Altyapısı: Kovanâ€Â, National IPv6 Conference 2011.
24.
Baykara, M., Das, R., “A survey on potential applications of honeypot technology in intrusion detection systemsâ€Â, International Journal of Computer Networks and Applications, 2(5), pp. 1-9, 2015.
25.
Lobato, A. G. P., da Rocha Figueiredo, U., & Duarte, O. C. M., "An Architecture for Intrusion Prevention using Software Defined Networks.", Universidade Federal do Rio de Janeiro-GTA/COPPE-Rio de Janeiro, Brazil.
26.
Raza, S., Wallgren, L., Voight, T., "SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks", 11.8: pp. 2661-2674, 2013.
27.
A. A. Gendreau and M. Moorman, "Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things," IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, pp. 84-90, 2016.