The Academic Perspective Procedia publishes Academic Platform symposiums papers as three volumes in a year. DOI number is given to all of our papers.
Publisher : Academic Perspective
Journal DOI : 10.33793/acperpro
Journal eISSN : 2667-5862
 L. A. Maglaras, K. H. Kim, H. Janicke, M. A. Ferrag, S. Rallis, P. Fragkou, A. Maglaras and T. J. Cruz. "Cyber security of critical infrastructures." Ict Express 4.1 (2018): 42-45.
 İ. Özçelik, M. İskefiyeli, M. Balta, K. O. Akpinar and F. S.Toker. "Center water: a secure testbed infrastructure proposal for waste and potable water management." 2021 9th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2021.
 Ulusal Siber Güvenlik Stratejisi ve Eylem Stratejisi, Ulaştırma ve Altyapı Bakanlığı, https://hgm.uab.gov.tr//uploads/pages/siber-guvenlik/ulusal-siber-guvenlik-stratejisi-ep-2020-2023.pdf [Accessed 20 June 2022].
 The White House, Office of the Press Secretary, “Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience”. Available: https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil [Accessed 24 June 2022].
 NIST, “Special Publication 800-82 Revision 2 Guide to Industrial Control Systems (ICS) Security”, 2015. Available: 10.6028/NIST.SP.800-82r2 [Accessed 26 April 2022].
 R. Janke, M. E. Tryby, and R. M. Clark. "Protecting water supply critical infrastructure: An overview." Securing water and wastewater systems (2014): 29-85.
 Gondim J., Albuquerque R., Orozco A., “Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols”, Future Generation Computer Systems, Vol 108, July 2020, Pages 68-81.
 M. A. Brdys. "Integrated monitoring, control and security of Critical Infrastructure Systems." Annual Reviews in Control 38.1 (2014): 47-70.
 U. Ani, J. Watson, B. Green, B. Craggs and J. Nurse, "Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases", Journal of Cyber Security Technology, pp. 1-49, 2020. Available: 10.1080/23742917.2020.1843822.
 Y. Geng, Y. Wang, W. Liu, Q. Wei, K. Liu and H. Wu, "A survey of industrial control system testbeds", IOP Conference Series: Materials Science and Engineering, vol. 569, p. 042030, 2019. Available: 10.1088/1757-899x/569/4/042030 [Accessed 26 April 2021].
 A. Almalawi, Z. Tari, I. Khalil and A. Fahad, "SCADAVT-A framework for SCADA security testbed based on virtualization technology", 38th Annual IEEE Conference on Local Computer Networks, 2013. Available: 10.1109/lcn.2013.6761301 [Accessed 6 May 2022].
 MPV. Wadal and S. R. Gupta. "An Overview of Network Management System." International Journal Of Computer Science And Applications 6.2 (2013).
 D. Mauro, and K. Schmidt. Essential SNMP: Help for System and Network Administrators. " O'Reilly Media, Inc.", 2005.
 Boyko A., Varkentin V., Polyakova, “Advantages and Disadvantages of the Data Collection’s Method Using SNMP”, International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), 01-04 Oct 2019.
 Almseidin M., Alkasassbeh M., Kovacs S., “Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality”, Cornell University, Networking and Internet Architecture, 21 Nov 2018.
 Naymat G., Kasassbeh M., Hawari E., “Using machine learning methods for detecting network anomalies within SNMP-MIB dataset”, Int. J. Wireless and Mobile Computing, Vol. 15, No. 1, 2018.