<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Çukurova Üniversitesi Sosyal Bilimler Enstitüsü Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">1304-8899</issn>
                                                                                            <publisher>
                    <publisher-name>Cukurova University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.35379/cusosbil.1670774</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Political Science (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Siyaset Bilimi (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>THE DIGITAL FRONT: AI-SUPPORTED CYBER WARFARE BETWEEN ISRAEL AND IRAN</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>DİJİTAL CEPHE: İSRAİL VE İRAN ARASINDAKİ YAPAY ZEKÂ DESTEKLİ SİBER SAVAŞ</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2615-6025</contrib-id>
                                                                <name>
                                    <surname>Dinçel</surname>
                                    <given-names>Yusuf</given-names>
                                </name>
                                                                    <aff>POLİS AKADEMİSİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20260428">
                    <day>04</day>
                    <month>28</month>
                    <year>2026</year>
                </pub-date>
                                        <volume>35</volume>
                                                            
                        <history>
                                    <date date-type="received" iso-8601-date="20250406">
                        <day>04</day>
                        <month>06</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20251215">
                        <day>12</day>
                        <month>15</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Çukurova Üniversitesi Sosyal Bilimler Enstitüsü Dergisi</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Çukurova Üniversitesi Sosyal Bilimler Enstitüsü Dergisi</copyright-holder>
                </permissions>
            
                                                                                                                                                <trans-abstract xml:lang="en">
                            <p>The rapid acceleration of technological advancements not only facilitates various aspects of daily life but also introduces new security threats. A review of wars that have occurred throughout world history shows that they were predominantly conducted through conventional means. However, in recent years, a new dimension has emerged, with states increasingly engaging in conflicts within the cyber domain. Israel and Iran are two major rival powers in the Middle East. In recent years, direct conventional military confrontations have occurred between the two states, and in parallel with these developments, the cyber domain has increasingly evolved into a complementary and strategic front of warfare. The aim of this study is to examine the mechanisms and methods through which cyber warfare between Israel and Iran has been conducted. The research analyzes the sectors targeted by both states in their cyber operations and the specific stages at which artificial intelligence technologies are employed. The cases investigated in this study are based on recent news reports, policy documents, and analytical reports published by think tanks specializing in cybersecurity and artificial intelligence. According to the findings, cyberattacks in the Israel-Iran rivalry function both as an operational tool aimed at disabling critical infrastructure and as a strategic instrument employed in psychological warfare and information operations to shape public perception. These results highlight the growing centrality of cyber capabilities and AI technologies in contemporary interstate conflicts.</p></trans-abstract>
                                                                                                                                    <abstract><p>Teknolojik gelişmelerin her geçen gün hızlı bir şekilde artması, bir yönüyle gündelik hayatı kolaylaştırırken, diğer yönüyle yeni güvenlik tehditlerini de beraberinde getirmektedir. Dünya tarihinde bugüne kadar cereyan eden savaşlara bakıldığında, savaşların çoğunlukla geleneksel yöntemlerle icra edildiği görülmektedir. Ancak son yıllarda, savaşlara yeni bir boyut eklenmiş olup, siber ortamda devletler arasında çatışmalar yaşanmaktadır. İsrail ve İran, Ortadoğu’da birbirlerine rakip iki önemli güçtür. Son dönemde İsrail ile İran arasında doğrudan konvansiyonel askeri çatışmalar yaşanmış ve buna paralel olarak siber uzay da savaşın tamamlayıcı ve stratejik bir cephesi hâline gelmiştir. Bu çalışmanın amacı, İsrail ve İran arasındaki siber savaşın hangi vasıtalar aracılığıyla ve ne şekilde icra edildiğini ortaya koymaktır. Bu çalışmada, İsrail ve İran’ın hangi sektörlere yönelik siber saldırılar gerçekleştirdikleri ve yapay zekâdan hangi adımlarda istifade ettikleri analiz edilmiştir. Bu araştırmanın örnekleri, siber güvenlik ve yapay zekâ konularında yayımlanmış güncel haber içerikleri, politika belgeleri ve düşünce kuruluşlarının analiz raporları temel alınarak oluşturulmuştur. Bulgulara göre, İsrail-İran mücadelesinde siber saldırılar hem kritik altyapıları işlevsiz hale getirmeyi hedefleyen bir operasyonel araç hem de kamuoyu algısını yönlendiren, psikolojik harp ve bilgi operasyonlarını icra eden stratejik bir güç unsuru olarak kullanılmaktadır.</p></abstract>
                                                            
            
                                                                                                                                                <kwd-group>
                                                    <kwd>Siber Savaş</kwd>
                                                    <kwd>  Yapay Zekâ</kwd>
                                                    <kwd>  Siber Güvenlik</kwd>
                                                    <kwd>  İsrail</kwd>
                                                    <kwd>  İran</kwd>
                                            </kwd-group>
                            
                                                                                                        <kwd-group xml:lang="en">
                                                    <kwd>Cyber War</kwd>
                                                    <kwd>  Artificial Intelligence</kwd>
                                                    <kwd>  Cybersecurity</kwd>
                                                    <kwd>  Israel</kwd>
                                                    <kwd>  Iran</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Adamsky, D. D. (2017). The Israeli odyssey toward its national cyber security strategy. The Washington Quarterly, 40(2), 113-127. http://dx.doi.org/10.1080/0163660X.2017.1328928</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Amaliya, L. R. (2025). A cyber war of Iran-Israel: A geopolitical rivalry. Proceedings of the International Conference on Strategic and Global Studies (ICSGS 2024), (s. 45-56). Atlantis Press. 
 
Amitay, N. (2025, Nisan 14). Iranian deepfake of Israeli defense minister airs live - and how clarity caught it instantly. https://www.getclarity.ai/ai-deepfake-blog/iranian-deepfake-of-israeli-defense-minister-airs-live----and-how-clarity-caught-it-instantly</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Baezner, M. &amp; Cordey, S. (2022). Influence operations and other conflict trends. M. D. Cavelty &amp; A. Wenger (Ed.), Cyber security politics: Socio-technological transformations and political fragmentation içinde (ss. 17-31). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Bahgat, B. (2020). Iran and its neighbors face risks and opportunities in cyber security. Orbis, 64(1), 78-97.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Baram, G. &amp; Peer, N. (2025, Temmuz 18). How Israel and Iran brought cyber conflict to centre stage. https://bindinghook.com/how-israel-and-iran-brought-cyber-conflict-to-centre-stage/</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Barzashka, I. (2013). Are cyber-weapons effective? Assessing stuxnet’s impact on the Iranian enrichment programme. The RUSI Journal, 158(2), 48-56.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Benouachane, H. (2024). Cyber security challenges in the era of artificial intelligence and autonomous weapons. M. E. Erendor (Ed.), Cyber security in the age of artificial intelligence and autonomous weapons içinde (ss. 24-42). CRC Press.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Ben Shushan. (2024, Şubat 7). ‘Netanyahu is the target’: Microsoft report reveals Iran’s cyber war on Israel. https://www.jpost.com/breaking-news/article-785566 
            
Biernacik, B. (2018). The fifth dimension of war–cyberspace. How to secure this area: The approach of selected states and international organizations to cybersecurity. Zeszyty Naukowe Wyższej Szkoły Bankowej w Poznaniu, 83(6), 63-84.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Bob, Y. J. (2021, Eylül 19). Mossad assassinated Iran’s chief nuke scientist with remote AI gun – report. https://www.jpost.com/middle-east/mossad-assassinated-irans-chief-nuke-scientist-with-remote-ai-gun-report-679751</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Bonfanti, M. E. (2022). Artificial intelligence and the offense–defense balance in cyber security. M. D. Cavelty &amp; A. Wenger (Ed.), Cyber security politics: Socio-technological transformations and political fragmentation içinde (ss. 64-79). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Chawla, A. (2021). Pegasus spyware ‘a privacy killer’. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3890657</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Cristiano, F., Broeders, D., Delerue, F., Douzet, F. &amp; Géry., A. (2023). Artificial intelligence and international conflict in cyberspace: Exploring three sets of issue. F. Cristiano, D. Broeders, F. Delerue, F. Douzet &amp; A. Géry (Ed.), Artifical intelligence and international conflict in cyberspace içinde (ss. 1-15). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Çahmutoğlu, E. (2021). Iran’s cyber power. İRAM yayınları.  
 
Çalışkan, A. (2023). Siber savaş: Bilgi krizi mi yoksa güvenliği mi?. SAVSAD Savunma ve Savaş Araştırmaları Dergisi, 33(1), 1-32. https://doi.org/10.54078/savsad.1188851</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Cohen, S. (2019). Iranian cyber capabilities: Assessing the threat to Israeli financial and security interests. Cyber, Intelligence, and Security, 3(1), 71-94.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Davis, Z. (2019). Artificial intelligence on the battlefield: Implications for deterrence and surprise. PRISM, 8(2), 114-131.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Denning, D. E. (2012). Stuxnet: What has changed?. Future Internet, 4(3), 672-687.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Editorial INTI. (2024, Eylül 09). What is Israel’s secret to building a global cybersecurity ecosystem?. https://intimedia.id/read/what-is-israels-secret-to-building-a-global-cybersecurity-ecosystem-66defc9fd1cc7</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Farwell, J. P. &amp; Arakelian, D. (2013). What does Iran’s cyber capability mean for future conflict?.  The Whitehead Journal of Diplomacy and International Relations, 14(1), 49-65.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Freilich, C. (2024). The Iranian cyber threat: The institutions and praxis of Iran’s cyber strategy, Institute for National Security Studies, 5-123. https://www.inss.org.il/publication/iranian-cyber/</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 41-73.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Geranmayeh, E. (2025). Israel and Iran on the brink: Preventing the next war. European Union Institute for Security Studies.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Gotsiridze, A. (2020, Ocak 15). Iran’s cyber capabilities. https://gfsis.org/en/irans-cyber-capabilities-2/</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Guyonneau, R. &amp; Le Dez, A. (2019). Artificial intelligence in digital warfare: Introducing the concept of the cyberteammate. The Cyber Defense Review, 4(2), 103-116.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Haroon, A. (2024). AI and cyber drove warfare in the Israeli-Iran conflict and its impact on gulf states’ security. Journal of Politics and International Studies, 10(2), 145-163.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Hodges, D. &amp; Creese, S. (2015). Understanding cyber-attacks. J. A. Green (Ed.), Cyber warfare: A multidisciplinary analysis içinde (ss. 33-60). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Ifeanyi-Ajufo, N. &amp; Rosli, W. R. W. (2024). Artificial intelligence and cyber espionage delineating emergent warfare and international security. M. E. Erendor (Ed.), Cyber security in the age of artificial intelligence and autonomous weapons içinde (ss. 70-86). CRC Press.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Iran’s cyberattacks capabilities. (2020, Ocak). Special report. King Faisal Center for Research and Islamic Studies. https://kfcris.com/en/view/post/258</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Johnson, J. S. (2020). Artificial intelligence: A threat to strategic stability. Strategic Studies Quarterly, 14(1), 16-39.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Jun, J. (2024, Nisan 30). How will AI change cyber operations?. https://warontherocks.com/2024/04/how-will-ai-change-cyber-operations/ 
 
Kaiser, R. (2015). The birth of cyberwar. Political Geography, 46, 11–20. https://doi.org/10.1016/j.polgeo.2014.10.001</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Kallberg, J. (2016). Strategic cyberwar theory-A foundation for designing decisive strategic cyber operations. The Cyber Defense Review, 1(1), 113-128.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Karamchand, G. &amp; Aramide, O. O. (2025). AI and cyberwarfare. Journal of Tianjin University Science and Technology. 58(8), 835-851.  https://doi.org/10.5281/zenodo.16948349</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Keck, Z. (2014, Ağustos 02). Chinese hackers target Israel’s iron dome. https://thediplomat.com/2014/08/chinese-hackers-target-israels-iron-dome/ 
 
Khalil, A., Bitar, M. &amp; Raj, S. A. K. (2024). A new era of armed conflict: The role of state and non-state actors in cyber warfare with special reference to Russia-Ukraine war. TalTech Journal of European Studies, 14(2), 49-72. https://doi.org/10.2478/bjes-2024-0016 
 
Kırık, A. M. (2025). Siber savaşların gölgesinde İsrail’in teknolojik gücü ve etik sorunlar. Avrasya Dosyası, 15(2), 1-23.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Kober, A. (2019). Israel’s security model. S. A. Cohen &amp; A. Klieman (Ed.), Routledge handbook on Israeli security içinde (ss. 225-237). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Kovacs, E. (2020, Nisan 27). Israel says hackers targeted SCADA systems at water facilities. https://www.securityweek.com/israel-says-hackers-targeted-scada-systems-water-facilities/</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Lande, D. &amp; Danyk, Y. (2025). Competitive artificial intelligence in information and cyber warfare. Available at SSRN:  http://dx.doi.org/10.2139/ssrn.5084698</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Libicki, M. (2020). Cyberwar is what states make of it. The Cyber Defense Review, 5(2), 77-88.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Lindsay, J. R. (2025). Stuxnet revisited: From cyber warfare to secret statecraft. Journal of Strategic Studies, 48(3), 1-40. https://doi.org/10.1080/01402390.2025.2481447</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Lund, M. S. (2025). Hybrid threats in cyberspace: What do Russia’s cyberspace operations in Ukraine tell us?. O. J. Borch &amp; T. Heier (Ed.), Preparing for hybrid threats to security: Collaborative preparedness and response içinde (ss. 69-83). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Malik, S. (2024, Ekim 18). Iranian cyber actors target critical infrastructure: FBI, CISA, and NSA warn. https://www.capacitymedia.com/article/2dwnjgpyaqfqcheztbjeo/news/iran-cyber-actors</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Mazanec, B. M. (2015). The Evolution of cyber war: International norms for emerging-technology weapons. Potomac Books.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Mieses, M., Kerr, N. &amp; Jahanbani, N. (2024, Ekim 9). Artificial intelligence is accelerating Iranian cyber operations. https://www.lawfaremedia.org/article/artificial-intelligence-is-accelerating-iranian-cyber-operations</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Montasari, R. (2022). Cyber threats and national security: The use and abuse of artificial intelligence. A. J. Masys (Ed.), Handbook of security science içinde (ss. 679-700). Springer International Publishing.</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">Nelson, N. (2025, 3 Nisan). Israel enters ‘stage 3’ of cyber wars with Iran proxies. https://www.darkreading.com/threat-intelligence/israel-stage-3-cyber-wars-with-iran-proxies</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Nixon, G. (2022, 20 Mart). Zelensky, Putin videos provide glimpse of evolving deepfake threat, experts say. https://www.cbc.ca/news/world/zelensky-putin-ukraine-war-deepfake-video-1.6391033</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">Nye, J. S. (2011). Nuclear lessons for cyber security?. Strategic Studies Quarterly, 5(4), 18-38.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44-71.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">Ofusori, L., Bokaba, T. &amp; Mhlongo, S. (2024). Artificial intelligence in cybersecurity: A comprehensive review and future direction. Applied Artificial Intelligence, 38(1), https://doi.org/10.1080/08839514.2024.2439609</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">Paliszkiewicz, J., Chen, K. &amp; Goluchowski, J. (2024). Privacy in social media: Future directions. J. Paliszkiewicz, K. Chen &amp; J. Goluchowski (Ed.), Privacy, trust and social media içinde (ss. 3-13). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">Provecho, E. F., Phuc, P. D. &amp; Fokker, J. (2024, Eylül 19). The Iranian cyber capability. https://www.trellix.com/blogs/research/the-iranian-cyber-capability/</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5-32.   http://dx.doi.org/10.1080/01402390.2011.608939</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">Robinson, M., Jones, K. &amp; Janicke, H. (2015). Cyber warfare: Issues and challenges. Computers &amp; Security, 49, 70-94.</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">Rosenfield, D. K. (2009). Rethinking cyber war. Critical Review, 21(1), 77-90. https://doi.org/10.1080/08913810902812156</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">Rosli, W. R. W. (2025). Waging warfare against states: The deployment of artificial intelligence in cyber espionage. AI and Ethics, 5, 47-53. https://doi.org/10.1007/s43681-024-00628-x</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">Salem, A.H., Azzam, S. M., Emam, O. E. &amp; Abohany, A. A. (2024). Advancing cybersecurity: A comprehensive review of AI-driven detection techniques. Journal of Big Data, 11(105), https://doi.org/10.1186/s40537-024-00957-y</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">SentinelOne. (2025, Mayıs 15). Key cyber security statistics for 2025. https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-statistics/#industry-specific-cyber-security-statistics</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">Shadle, M. A. (2020). Killer robots and cyber warfare: Technology and war in the twenty-first century. T. Winright (Ed.), T&amp;T Clark handbook of christian ethics içinde (ss. 215-224). Bloomsbury Publishing.</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">Siboni, G., Abramski, L. &amp; Sapir, G. (2020). Iran’s activity in cyberspace: Identifying patterns and understanding the strategy. Cyber, Intelligence, and Security, 4(1), 21-40.</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">Siboni, G. &amp; Kronenfeld, S. (2012). Iran’s cyber warfare. Institute for National Security Studies, https://www.inss.org.il/publication/irans-cyber-warfare/</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">Siman-Tov, D. &amp; Even, S. (2020). A new level in the cyber war between Israel and Iran. Institute for National Security Studies, https://www.inss.org.il/publication/iran-israel-cyber-war/</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">Smeets, M. (2018). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90-113.</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">Smith, T. E. (2013). Cyber warfare: A misrepresentation of the true cyber threat. American Intelligence Journal, 31(1), 82-85. 
     
Stiennon, R. (2015). A short history of cyber warfare. J. A. Green (Ed.), Cyber warfare: A multidisciplinary analysis içinde (ss. 7-32). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">Summer, D. (2023, Aralık 20). Israel linked to cyberattack that closed 70% of Iran’s gas stations. Israel Linked To Cyberattack That Closed 70% Of Iran&#039;s Gas Stations | IBTimes UK</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">Tabansky, L. (2011). Basic concepts in cyber warfare. Military and Strategic Affairs, 3(1), 75-92.</mixed-citation>
                    </ref>
                                    <ref id="ref65">
                        <label>65</label>
                        <mixed-citation publication-type="journal">Tabansky, L. ve Ben Israel, I. (2015). Cybersecurity in Israel. Springer International Publishing.</mixed-citation>
                    </ref>
                                    <ref id="ref66">
                        <label>66</label>
                        <mixed-citation publication-type="journal">Tabansky, L. (2016). Towards a theory of cyber power: The Israeli experience with innovation and strategy. 2016 8th International Conference on Cyber Conflict (CyCon) (ss. 51-63). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref67">
                        <label>67</label>
                        <mixed-citation publication-type="journal">Tehran Insider. (2024, Ağustos 22). The final straw: Iranians dread plans for a ‘national’ internet. https://www.iranintl.com/en/202408218106</mixed-citation>
                    </ref>
                                    <ref id="ref68">
                        <label>68</label>
                        <mixed-citation publication-type="journal">United against nuclear Iran. (2024, Haziran). The Iranian cyber threat. https://www.unitedagainstnucleariran.com/history-of-iranian-cyber-attacks-and-incidents</mixed-citation>
                    </ref>
                                    <ref id="ref69">
                        <label>69</label>
                        <mixed-citation publication-type="journal">Unna, Y. (2019). National cyber security in Israel. Cyber, Intelligence, and Security, 3(1), 167-173.</mixed-citation>
                    </ref>
                                    <ref id="ref70">
                        <label>70</label>
                        <mixed-citation publication-type="journal">Yamin, M. M., Ullah, M., Ullah, H. &amp; Katt, B. (2021). Weaponized AI for cyber attacks. Journal of Information Security and Applications, 57, 1-14.</mixed-citation>
                    </ref>
                                    <ref id="ref71">
                        <label>71</label>
                        <mixed-citation publication-type="journal">Yenal, S. &amp; Akdemir, N. (2020). Uluslararası ilişkilerde yeni bir kuvvet çarpanı: Siber savaşlar üzerine bir vaka analizi. Çankırı Karatekin Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 11(1), 414-450.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
