User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 4
 Views 15
 Downloands 3
Gelişmiş Sürekli Tehditler
2017
Journal:  
Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi
Author:  
Abstract:

Virüsler, solucanlar ve casus yazılımlar üzerinden yapılan saldırıların yanı sıra son birkaç yıl içerisinde geliştirilen ve adına gelişmiş sürekli tehditler denilen tamamen hedefe odaklı, iyi şekilde düzenlenmiş ve organize olmuş ve en önemlisi arkasında büyük kuruluşlar, devletler veya destekler olduğu bilinen yeni bir saldırı türü ortaya çıkmıştır.  Bu çalışmada gelişmiş sürekli tehditler incelenmiş olup gelişmiş sürekli tehditlerin genel yapısı ve karakteristik özellikleri araştırılmış, geçmiş dönemde yapılan saldırılar ele alınarak, saldırı sonunda hedeflenen sonuçlara ne kadar ulaşabildiği değerlendirilmiştir. Son olarak bu tip tehditlere karşı alınabilecek önlemler sunulmuştur.

Keywords:

Continuous threats
2017
Author:  
Abstract:

In addition to the attacks through viruses, worms and spy software, a new type of attack has emerged, which has been fully targeted, well-organized and well-organized, and, most importantly, behind it is known that large organizations, states or supports have been developed and developed over the past few years.  In this study, the advanced continuous threats were studied, the general structure and characteristics of the advanced continuous threats were studied, the attacks in the past period were addressed, the assessment of how much it could reach the targeted results at the end of the attack. Finally, there are measures to be taken against such threats.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles












Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi

Field :   Mühendislik

Journal Type :   Ulusal

Metrics
Article : 202
Cite : 430
2023 Impact : 0.063
Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi