1. Tyugu, E. (2011, June). Artificial intelligence in cyber defense. In Cyber Conflict (ICCC), 2011 3rd International Conference on (pp. 1–11). IEEE.
2. Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2012). Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In Cyberspace Safety and Security (pp. 441–458). Springer Berlin Heidelberg.
3. Çakır, H., & Sert, E. (2010). Bilişim Suçları ve Delillendirme Süreci. 2. Uluslararası Terörizm ve Sınıraşan Suçlar Sempozyumu Bildirisi, 143.
4. Artificial Intelligence, Wikipedia, http://en.wikipedia.org/wiki/Artificial_intelligence , (24/11/2014).
5. Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., & Abraham, A. (2014). Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Engineering Applications of Artificial Intelligence, 32, 228–241.