- قدیر، محسن و کاظمیفروشانی، حسین. (1398). بررسی تطبیقی حقوق کیفری ایران با اسناد بینالمللی در زمینه مقابله و پیشگیری از وقوع تروریسم سایبری. حقوقی بینالمللی، 60(36)، 267-238.
https://www.cilamag.ir/article_35084.html
-جانپرور، محسن؛ صالحآبادی، ریحانه و احمدی، سیروس. (1397). کنترل تروریسم سایبری با مدیریت مرزهای فضای سایبر راهبردی. مطالعات قدرت نرم، 8(19)، 125-99.
https://www.spba.ir/article_99339.html
-نعمتپور، اردشیر؛ تقیزادهانصاری، مصطفی و ببریگنبد، سکینه. (1400). مقابله با حملات تروریستی به زیرساختهای حیاتی یک کشور در قواعد حقوق بینالملل. مطالعات بینالمللی، 3(71)، 165-185.
https://www.isjq.ir/article_165395.html
-هلیلی، خداد؛ سلطانپور، محمدرضا. (1399). تهدیدات تروریسم سایبری و واکاوی تحرکات گروه تروریستی داعش در فضای سایبر. مطالعات جنگ، 2(7)، 83-68.
https://www.qjws.ir/article_249183.html
- Ayodeji, Abiodun, Mokhtar Mohamed, Li Li, Antonio Di Buono, Iestyn Pierce, Hafiz Ahmed (2023). “Cyber Security in the Nuclear Industry: A Closer Look at Digital Control Systems, Networks and Human Factors”, Progress in Nuclear Energy, 161: 243-284.
https://www.sciencedirect.com/science/article/pii/S0149197023001737
-Anand, K., Krishnan, P., & Devendra, K. P. (2014). “Facing the Reality of Cyber Threats in the Power Sector”, Energy Policy, 65: 126-133.
https://dergipark.org.tr/tr/pub/joltida/article/1198842
-Bastug MF, Onat I, Guler A (2023). “Threat Construction and Framing of Cyberterrorism in the U.S. News Media”, International Journal of Cybersecurity Intelligence & Cybercrime, 6(1):29–44.
https://vc.bridgew.edu/ijcic/vol6/iss1/3/
-Bae Jang, Kyung, Chang Hyun Baek & Tae Ho Woo (2020). “Protocol Construction for Preventing the Cyber Nuclear Terrorism in the Nuclear Power Plants (NPPs) Using the Nonlinear Algorithm”, Journal of Nuclear Science and Technology, 57(12): 1331-1338.
https://www.tandfonline.com/doi/full/10.1080/00223131.2020.1789007
-Case, D. U. (2016). “Analysis of the cyber-attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC)”, 388: 1-29.
https://dergipark.org.tr/en/pub/jep/issue/81893/1399365
-Iftikhar, Saman (2024). “Cyberterrorism as a Global Threat: A Review on Repercussions and Countermeasures”, PeerJ Computer Science, 10: 1-32.
https://peerj.com/articles/cs-1772/
-Fidler, David P (2016). “Cyber Space, Terrorism and International Law Get Access Arrow”, Journal of Conflict and Security Law, 21(3): 475-493.
https://www.researchgate.net/publication/308339234_Cyberspace_Terrorism_and_International_Law
-Jung, Yujin J. (2024). “Cyber Shadows over Nuclear Peace: Understanding and Mitigating Digital Threats to Global Security”, Journal of Asian Security and International Affairs, 11(2): 281-204.
https://ideas.repec.org/a/sae/asseca/v11y2024i2p233-253.html
-Kur, Hüseyin (2023). “Cyber Terror Threats Against Nuclear Power Plants”, Journal of Learning and Teaching in Digital Age, 8(2), 237-244.
https://dergipark.org.tr/en/pub/joltida/issue/78765/1198772
-Leu DM, Udroiu C, Raicu GM, Gârban HN, Şcheau MC (2023). “Analysis of Some Case Studies on Cyberattacks and Proposed Methods for Preventing Them”, Romanian Journal of Information Technology & Automatic Control/Revista Română de Informatică şi Automatică, 33(2):119–134.
https://www.researchgate.net/publication/371947489_Analysis_of_some_case_studies_on_cyberattacks_and_proposed_methods_for_preventing_them
-Özkışlalı, G. (2008). Globalization, the Internet and the Changing Face of Terrorism; Cyber Terrorism. Published Master's Thesis, Hacettepe SBE, Ankara, 71.
-Jang, K.B., C.H. Baek, T.H. Woo (2022). “Assessment for Nuclear Security Using Analytic Hierarchy Process (AHP) incorporated with Neural Networking Method in Nuclear Power Plants (NPPs)”, Kerntechnik, 87: 607-614.
https://www.semanticscholar.org/paper/Assessment-for-nuclear-security-using-Analytic-with-Jang-Baek/e75f679b38f96d58ef69b5071c3b4916ebeeca60
-Onderco, M., M. Zutt (2022). “Emerging Technology and Nuclear Security: What Does the Wisdom of the Crowd Tell Us?”, Contemporary Security Policy, 42: 286-311.
https://www.tandfonline.com/doi/full/10.1080/13523260.2021.1928963
-Hawila, M.A., S.S. Chirayath (2018). “Combined Nuclear Safety-Security Risk Analysis Methodology Development and Demonstration Through a Case Study”, Progress in Nuclear Energy, 105: 153-159.
https://www.researchgate.net/publication/324867583_Combined_nuclear_safety-security_risk_analysis_methodology_development_and_demonstration_through_a_case_study
-Hellman, M.E. (2017). “Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic”, Communications of the ACM, 60: 52-59.
https://cacm.acm.org/research/cybersecurity-nuclear-security-alan-turing-and-illogical-logic/
-Henderson C. çinde Nicholas Tsagourias ve Russell Buchan (2021). “International law and cyberspace”, Research handbooks in international law, (Edward Elgar, 2015); 2021. The United Nations and the regulation of cybersecurity, pp. 474–475.
https://sussex.figshare.com/articles/chapter/The_United_Nations_and_the_regulation_of_cybersecurity/23448347?file=41157845
-Lovering, J.R., A. Abdulla, G. Morgan (2020). “Expert Assessments of Strategies to Enhance Global Nuclear Security”, Energy Policy, 139: 1-9.
https://www.tandfonline.com/doi/abs/10.1080/10736500.2022.2130457
-Raj, P., & Yadav S. (2022). “Cyber Terrorism: A Threat to Cyber World. Emerging Trends in Technology & its Impact on Law”, 1.
https://dergipark.org.tr/en/download/article-file/2348831
-Ranger, S (2018). “What is Cyberwar? Everything you Need to Know About the Frightening Future of Digital Conflict”, ZDNET.
https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/
-Shubayr, Nasser (2024). “Nuclear Security Measures: A Review of Selected Emerging Technologies and Strategies”, Journal of Radiation Research and Applied Sciences, 17(1): 1-11.
https://www.researchgate.net/publication/378640887_Nuclear_security_measures_A_review_of_selected_emerging_technologies_and_strategies
-Tavares, R.L., O.A. Robson de, W. Giozza (2022). “Effectiveness Evaluation of a Nuclear Facility Security System Under a Cyber-Physical Attack Scenario”, 17th Iberian Conference on Information Systems and Technologies (CISTI), 22-25 June.
https://ieeexplore.ieee.org/document/9820179.
-Wicki-Birchler D (2020). “The Budapest Convention and the General Data Protection Regulation: Acting in Concert to Curb Cybercrime?”, International Cybersecurity Law Review,1:63–72.
https://www.researchgate.net/publication/346246542_The_Budapest_Convention_and_the_General_Data_Protection_Regulation_acting_in_concert_to_curb_cybercrime