منابع:
- · قرآن کریم
- بیانات حضرت امام خمینی (ره)
- بیانات حضرت امام خامنهای (مدظلهالعالی)
- ابلاغی مقام معظم رهبری، (1384)، سند چشم انداز ۲۰ ساله.
- دفتر امور زیربنایی فناوری اطلاعات، معاونت فناوری اطلاعات، (1386)، سند راهبردی امنیت فضای تبادل اطلاعات کشور، وزارت ارتباطات و فناوری اطلاعات.
- رامک، مهراب؛ امیرلی، حسین؛ قربانی، ولیاله؛ حقی، مجید، (1394)، طراحی نظام دفاع سایبری مطالعه گروهی، دانشکده امنیت ملی، دانشگاه عالی دفاع ملی.
- سازمان پدافند غیر عامل، (1389)، سیاستهای کلی نظام در پدافند غیرعامل.
- مجلس شورای اسلامی، (1388 الف)، قانون انتشار و دسترسی آزاد به اطلاعات، مجلس شورای اسلامی.
- مجلس شورای اسلامی، (1388 ب)، قانون جرائم رایانهای.
- A Draft Apocryphal and Anthropocentric Cyberspace،Translated from the original web page in France،alliancegeostrategique.org (2012). /2010/10/04/une-ebauche-apocryphe-etanthropocentrique-du-cyberespace
- Abdallah، Saber. (2006). Towards a Framework for Enterprise Architecture Frameworks Comparison And Selection (Faculty of Computers and Information Cairo University(
- Anderson، James M. (2003). Why we need a new definition of information security. Computers & Security. 22(4)، 308–313. http://www.sciencedirect.com/science/article/pii/S0167404803004073
- Australian Government, "Australia Cyber Security Strategy", 2009
- Bernsmed Karin و Jaatun Martin Gilje. (2011). Security SLAs for federated cloud services. در Proceedings of the 6th international conference on availability، reliability and security.
- Clark، David. (2010). Characterizing cyberspace: past، present and future. Retrieved from: Massachusetts Institute of Technology website: http://web. mit. edu/ecir/pdf/clark-cyberspace. pdf. http://web.mit.edu/ecir/pdf/clark-cyberspace.pdf
- Cyberinfrastructure. (2012). wikipedia. https://en.wikipedia.org/wiki/Cyberinfrastructure. Retrieved from https://en.wikipedia.org/wiki/Cyberinfrastructure
- Copublished by the IEEE Computer and Reliability Societies March/April2015،Gaining an Edge in Cyberspace with Advanced Situational Awareness.
- Carlisle Barracks, "U.S Army war college guide to national security issues", Volume I: Theory of war and strategy, 5th Edition, June 2012
- DoD. (2010). Department of Defense Dictionary of Military and Associated Terms.pdf (No. Joint Publication 1-02).
- Eastwest Institute and the Information Security Institute of Moscow State University, "Russia-U.S. Bilateral on cybersecurity - critical terminology foundations", Issue I, April 2011
- European Network and Information Security Agency (ENISA), "National Cyber Security Strategies Practical Guide on Development and Execution", 2012
- European Network and Information Security Agency (ENISA), "An evaluation Framework for National Cyber Security Strategies", 2014
- Federal Ministry of the Interior, "Cyber Security Strategy for Germany", February 2011
- Government of Canada, "Canada's Cyber Security Strategy", 2010
- Gary Waters, Desmond Ball and Ian Dudgeon, "Australia and Cyber-warfare", The Australian National University Press, 2008
- Heylighen. (1994). cyberspace,principia cybernetica. http://pespmc1.vub.ac.be/cybspace.html.
- Homeland Security Enterprise Architecture. (2003). http://www.slideshare.net/Aamir97/homeland-security-enterprise-architecture.
- ITU-T, "ITU National Cybersecurity Strategy Guide", Geneva: ITU, 2011
- ISO/IEC 27001 Standard, "Information technology-Security techniques- Information security management systems – Requirements", 2013
- ITU, "ITU National Cybersecurity Strategy Guide", (Geneva: ITU, 2011), http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
- ITU-T X.805 Recommendation, " Security architecture for systems providing end-to-end communications", Geneva: ITU, 2003
- k.f.rauscher & v.yaschenko. (2011). Cybersecurity Critical Terminology Foundations (p. 48). Information Security Institute MoscownState University.
- Libicki، Martin C. (2009). Cyberdeterrence and cyberwar. Santa Monica، CA: RAND.
- McAFEE. (2012). http://www.homelandsecuritynewswire.com/ srinfrastructure20120206-ranking-countries-cyberattack-preparedness.
- NIST Special Publication 800-160, "Systems Security Engineering - An Integrated Approach to Building Trustworthy Resilient Systems", 2014
- NATO Cooperative Cyber Defence Centre of Excellence, "National Cyber Security Framework Manual", 2012, PP 8-19
- New Zealand Government, "New Zealand's Cyber Security Strategy", 2011
- UK Cabinet Office, "The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world", November 2011
- NATO Cooperative Cyber Defence Centre of Excellence (CCD-CoE), "National Cyber Security Framework Manual", NATO CCD-COE Publication, 2012
- NIST, "Framework for Improving Critical Infrastructure Cybersecurity version 1.0", 2014
- Qadir، Suhail و Quadri، S. M. K. (2016). Information Availability: An Insight into the Most Important Attribute of Information Security. Journal of Information Security.
- R.Ottis & P.Lorents. (2010). Cyberspace:Definition and Implications. In air force institue of technology. United States US / Dayton.
- Strate, L. (1999). The varieties of cyberspace: Problems in definition and delimitation. Western Journal Of Communication, 63(3), 382–412. DOI: 10.1080/10570319909374648
- UK Cabinet Office, "Cyber Security Strategy of the United Kingdom. Safety, security and resilience in cyber space", Norwich: The Stationery Office, 2009
wikipedia. (2012). Cyberspace. https://en.wikipedia.org/wiki/Cyberspace.
|