1. Boyd, B. L. (2009). Cyber warfare: Armageddon in a Teacup?. Army Command and General Staff Coll Fort Leavenworth KS.
2. Cisco Annual Internet Report, 2018–2023 (https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html) [Erişim Tarihi: 30.06.2022]
3. Damar, M., & Coşkun, E. (2017). Üniversitelerde bilgi işlemden yönetim bilişim sistemlerine geçiş: Mevcut durum ve beklentiler. Bilişim Teknolojileri Dergisi, 10(1), 21.
4. Darwish, M., Ouda, A., & Capretz, L. F. (2013, June). Cloud-based DDoS attacks and defens-es. In International Conference on Information Society (i-Society 2013) (pp. 67-71). IEEE.
5. Fakeeh, K. A. (2016). An overview of DDoS attacks detection and prevention in the cloud. International Journal of Applied Information Systems (IJAIS), 11(7).