Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2025, Cilt: 13 Sayı: 2, 210 - 218
https://doi.org/10.17694/bajece.1608364

Öz

Kaynakça

  • [1] Mas-Tur, A., Kraus, S., Brandtner, M., Ewert, R., & Kürsten, W. (2020). Advances in management research: a bibliometric overview of the Review of Managerial Science. Review of Managerial Science, 14(5), 933-958.
  • [2] Mistar, J., Setiakarnawijaya, Y., Dewi, P. C. P., Paramita, D. P., Aqobah, Q. J., & Akbar, M. A. (2023). Systematic Literature Review: Research on Martial Arts Competition Using Vos Viewers in the 2018-2022 Google Scholar Database. Gladi: Jurnal Ilmu Keolahragaan, 14(02), 221-228.
  • [3] Van Eck, N. J. & Waltman, L. (2023). VOSviewer manual for VOSviewer version 1.6.20. Universiteit Leiden: CWTS.
  • [4] Vosviewer (2025). https://www.vosviewer.com/features/examples. Access Date: January 18, 2025
  • [5] Dereli, A. B. (2024). Vosviewer ile Bibliyometrik Analiz. Communicata, (28), 1-7
  • [6] Zawish, M., Dharejo, F. A., Khowaja, S. A., Raza, S., Davy, S., Dev, K., & Bellavista, P. (2024). AI and 6G into the metaverse: Fundamentals, challenges, and future research trends. IEEE Open Journal of the Communications Society, 5, 730-778.
  • [7] Khan, L. U., Yaqoob, I., Imran, M., Han, Z., & Hong, C. S. (2020). 6G wireless systems: A vision, architectural elements, and future directions. IEEE Access, 8, 147029-147044.
  • [8] Kshetri, N., & Kshetri, N. (2016). Cybersecurity in National Security and International Relations. The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies, 53-74.
  • [9] Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology innovation management review, 4(10).
  • [10] Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know.
  • [11] Caviglione, L., Wendzel, S., Mileva, A., & Vrhovec, S. (2021). Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12(4), 1-3.
  • [12] Borrett, M., Carter, R., & Wespi, A. (2014). How is cyber threat evolving and what do organizations need to consider? Journal of business continuity & emergency planning, 7(2), 163-171.
  • [13] Ulsch, M. (2014). Cyber threat!: how to manage the growing risk of cyber attacks. John Wiley & Sons.
  • [14] Mallikarjunan, K. N., Muthupriya, K., & Shalinie, S. M. (2016, January). A survey of distributed denial of service attack. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.
  • [15] Hasan, M. K., Habib, A. A., Islam, S., Safie, N., Abdullah, S. N. H. S., & Pandey, B. (2023). DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments. Energy Reports, 9, 1318-1326.
  • [16] Solomon, A., Walker, E., Kensington, J., Drummond, M., Hall, R., & Blackwell, G. (2024). A new autonomous multi-layered cognitive detection mechanism for ransomware attacks.
  • [17] Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings 15(pp. 63-72). Springer Berlin Heidelberg.
  • [18] Handa, A., Sharma, A., & Shukla, S. K. (2019). Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(4), e1306.
  • [19] Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.
  • [20] Volini, A. G. (2020). A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues. J. Intell. Prop. L., 28, 291.
  • [21] Zheng, Y., Li, Z., Xu, X., & Zhao, Q. (2022). Dynamic defenses in cyber security: Techniques, methods, and challenges. Digital Communications and Networks, 8(4), 422-435.
  • [22] Maddireddy, B. R., & Maddireddy, B. R. (2024). Neural Network Architectures in Cybersecurity: Optimizing Anomaly Detection and Prevention. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 238-266.
  • [23] Martínez Torres, J., Iglesias Comesaña, C., & García-Nieto, P. J. (2019). Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics, 10(10), 2823-2836.
  • [24] Siber Güvenlik (n.d.). Dijital Dönüşüm Ofisi. https://cbddo.gov.tr/siber-guvenlik/
  • [25] National Cybersecurity Strategy (2023). White House. https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
  • [26] Anagnostakis, D. (2021). The European Union-United States cybersecurity relationship: a transatlantic functional cooperation. Journal of Cyber Policy, 6(2), 243-261
  • [27] Siber Güvenlik (n.d.). Dijital Dönüşüm Ofisi. https://cbddo.gov.tr/SharedFolderServer/Genel/File/bg_rehber.pdf
  • [28] Orduña-Malea, E., & Costas, R. (2021). Link-based approach to study scientific software usage: The case of VOSviewer. Scientometrics, 126(9), 8153-8186.
  • [29] Moustafa, N. (2021). A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society, 72, 102994.
  • [30] Ahmad, R., Alsmadi, I., Alhamdani, W., & Tawalbeh, L. A. (2023). Zero-day attack detection: a systematic literature review. Artificial Intelligence Review, 56(10), 10733-10811.
  • [31] Mahdavifar, S., & Ghorbani, A. A. (2019). Application of deep learning to cybersecurity: A survey. Neurocomputing, 347, 149-176.
  • [32] Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 59(6), 703-705.
  • [33] Abdullahi, M., Alhussian, H., Aziz, N., Abdulkadir, S. J., Alwadain, A., Muazu, A. A., & Bala, A. (2024). Comparison and investigation of AI-based approaches for cyberattack detection in cyber-physical systems. IEEE Access.
  • [34] Baadel, S., Thabtah, F., & Lu, J. (2021). Cybersecurity awareness: A critical analysis of education and law enforcement methods. Informatica, 45(3).
  • [35] Kavak, H., Padilla, J. J., Vernon-Bido, D., Diallo, S. Y., Gore, R., & Shetty, S. (2021). Simulation for cybersecurity: state of the art and future directions. Journal of Cybersecurity, 7(1), tyab005.
  • [36] Chaudhary, S., Gkioulos, V., & Katsikas, S. (2023). A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Computer Science Review, 50, 100592.
  • [37] Geluvaraj, B., Satwik, P. M., & Ashok Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 739-747). Springer Singapore.
  • [38] Muhammad, G., Pratama, A. R., Shaloom, C., & Cassandra, C. (2023, November). Cybersecurity Awareness Literature Review: A Bibliometric Analysis. In 2023 International Conference on Informatics, Multimedia, Cyber and Informations System (ICIMCIS) (pp. 195-199). IEEE.
  • [39] Allahrakha, N. (2023). Balancing cyber-security and privacy: legal and ethical considerations in the digital age. Legal Issues in the Digital Age, (2), 78-121.
  • [40] Štrucl, D. (2022). Comparative study on the cyber defense of NATO Member States. NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE).

A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security

Yıl 2025, Cilt: 13 Sayı: 2, 210 - 218
https://doi.org/10.17694/bajece.1608364

Öz

This bibliometric study conducts a comprehensive analysis of the field of cybersecurity, particularly in the context of law enforcement and security strategies, to examine key trends, author influence, and interdisciplinary connections within the literature. In the WoS database, 6606 articles were reached by using the search expression in the title, abstract and keywords fields ("Cyber security" or "cyber-attacks" or "cyber protection" or "spam cyber security" or "data security" or "network security" or "anomaly detection" or "cyber countermeasures") and restricting the year of publication to after 2000. The analysis includes metrics such as keyword co-occurrence frequency, author citation impact, co-authorship networks, bibliographic coupling of documents, co-citation analysis of authors, and institutional bibliographic connections. This study highlights the relationship between cybersecurity, law enforcement, and public safety, assessing the role of methodologies and technologies in mitigating security threats and reducing their impacts. When the keywords in the articles obtained as a result of the keyword analysis were examined, it was seen that the words "anomaly detection", "cybersecurity", and "deep learning" were the most frequently used keywords. It is noteworthy that the word "deep learning" was not included in the words generated when determining the articles, but it was used as a keyword in the articles obtained as a result of the determined keywords. Author citation analysis revealed influential contributors such as Quin Du, Wei Li, and Liangpei Zhang. Country-level analysis shows that China and the United States are leading in the field of research output, and institutional analysis highlights the prominent role of the Chinese Academy of Sciences. In conclusion, this research provides valuable insights into how law enforcement and security strategies intersect with academic studies in cybersecurity, offering a roadmap for future research.

Kaynakça

  • [1] Mas-Tur, A., Kraus, S., Brandtner, M., Ewert, R., & Kürsten, W. (2020). Advances in management research: a bibliometric overview of the Review of Managerial Science. Review of Managerial Science, 14(5), 933-958.
  • [2] Mistar, J., Setiakarnawijaya, Y., Dewi, P. C. P., Paramita, D. P., Aqobah, Q. J., & Akbar, M. A. (2023). Systematic Literature Review: Research on Martial Arts Competition Using Vos Viewers in the 2018-2022 Google Scholar Database. Gladi: Jurnal Ilmu Keolahragaan, 14(02), 221-228.
  • [3] Van Eck, N. J. & Waltman, L. (2023). VOSviewer manual for VOSviewer version 1.6.20. Universiteit Leiden: CWTS.
  • [4] Vosviewer (2025). https://www.vosviewer.com/features/examples. Access Date: January 18, 2025
  • [5] Dereli, A. B. (2024). Vosviewer ile Bibliyometrik Analiz. Communicata, (28), 1-7
  • [6] Zawish, M., Dharejo, F. A., Khowaja, S. A., Raza, S., Davy, S., Dev, K., & Bellavista, P. (2024). AI and 6G into the metaverse: Fundamentals, challenges, and future research trends. IEEE Open Journal of the Communications Society, 5, 730-778.
  • [7] Khan, L. U., Yaqoob, I., Imran, M., Han, Z., & Hong, C. S. (2020). 6G wireless systems: A vision, architectural elements, and future directions. IEEE Access, 8, 147029-147044.
  • [8] Kshetri, N., & Kshetri, N. (2016). Cybersecurity in National Security and International Relations. The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies, 53-74.
  • [9] Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology innovation management review, 4(10).
  • [10] Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know.
  • [11] Caviglione, L., Wendzel, S., Mileva, A., & Vrhovec, S. (2021). Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12(4), 1-3.
  • [12] Borrett, M., Carter, R., & Wespi, A. (2014). How is cyber threat evolving and what do organizations need to consider? Journal of business continuity & emergency planning, 7(2), 163-171.
  • [13] Ulsch, M. (2014). Cyber threat!: how to manage the growing risk of cyber attacks. John Wiley & Sons.
  • [14] Mallikarjunan, K. N., Muthupriya, K., & Shalinie, S. M. (2016, January). A survey of distributed denial of service attack. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.
  • [15] Hasan, M. K., Habib, A. A., Islam, S., Safie, N., Abdullah, S. N. H. S., & Pandey, B. (2023). DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments. Energy Reports, 9, 1318-1326.
  • [16] Solomon, A., Walker, E., Kensington, J., Drummond, M., Hall, R., & Blackwell, G. (2024). A new autonomous multi-layered cognitive detection mechanism for ransomware attacks.
  • [17] Chen, P., Desmet, L., & Huygens, C. (2014). A study on advanced persistent threats. In Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings 15(pp. 63-72). Springer Berlin Heidelberg.
  • [18] Handa, A., Sharma, A., & Shukla, S. K. (2019). Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(4), e1306.
  • [19] Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.
  • [20] Volini, A. G. (2020). A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues. J. Intell. Prop. L., 28, 291.
  • [21] Zheng, Y., Li, Z., Xu, X., & Zhao, Q. (2022). Dynamic defenses in cyber security: Techniques, methods, and challenges. Digital Communications and Networks, 8(4), 422-435.
  • [22] Maddireddy, B. R., & Maddireddy, B. R. (2024). Neural Network Architectures in Cybersecurity: Optimizing Anomaly Detection and Prevention. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 238-266.
  • [23] Martínez Torres, J., Iglesias Comesaña, C., & García-Nieto, P. J. (2019). Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics, 10(10), 2823-2836.
  • [24] Siber Güvenlik (n.d.). Dijital Dönüşüm Ofisi. https://cbddo.gov.tr/siber-guvenlik/
  • [25] National Cybersecurity Strategy (2023). White House. https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
  • [26] Anagnostakis, D. (2021). The European Union-United States cybersecurity relationship: a transatlantic functional cooperation. Journal of Cyber Policy, 6(2), 243-261
  • [27] Siber Güvenlik (n.d.). Dijital Dönüşüm Ofisi. https://cbddo.gov.tr/SharedFolderServer/Genel/File/bg_rehber.pdf
  • [28] Orduña-Malea, E., & Costas, R. (2021). Link-based approach to study scientific software usage: The case of VOSviewer. Scientometrics, 126(9), 8153-8186.
  • [29] Moustafa, N. (2021). A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society, 72, 102994.
  • [30] Ahmad, R., Alsmadi, I., Alhamdani, W., & Tawalbeh, L. A. (2023). Zero-day attack detection: a systematic literature review. Artificial Intelligence Review, 56(10), 10733-10811.
  • [31] Mahdavifar, S., & Ghorbani, A. A. (2019). Application of deep learning to cybersecurity: A survey. Neurocomputing, 347, 149-176.
  • [32] Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 59(6), 703-705.
  • [33] Abdullahi, M., Alhussian, H., Aziz, N., Abdulkadir, S. J., Alwadain, A., Muazu, A. A., & Bala, A. (2024). Comparison and investigation of AI-based approaches for cyberattack detection in cyber-physical systems. IEEE Access.
  • [34] Baadel, S., Thabtah, F., & Lu, J. (2021). Cybersecurity awareness: A critical analysis of education and law enforcement methods. Informatica, 45(3).
  • [35] Kavak, H., Padilla, J. J., Vernon-Bido, D., Diallo, S. Y., Gore, R., & Shetty, S. (2021). Simulation for cybersecurity: state of the art and future directions. Journal of Cybersecurity, 7(1), tyab005.
  • [36] Chaudhary, S., Gkioulos, V., & Katsikas, S. (2023). A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Computer Science Review, 50, 100592.
  • [37] Geluvaraj, B., Satwik, P. M., & Ashok Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 739-747). Springer Singapore.
  • [38] Muhammad, G., Pratama, A. R., Shaloom, C., & Cassandra, C. (2023, November). Cybersecurity Awareness Literature Review: A Bibliometric Analysis. In 2023 International Conference on Informatics, Multimedia, Cyber and Informations System (ICIMCIS) (pp. 195-199). IEEE.
  • [39] Allahrakha, N. (2023). Balancing cyber-security and privacy: legal and ethical considerations in the digital age. Legal Issues in the Digital Age, (2), 78-121.
  • [40] Štrucl, D. (2022). Comparative study on the cyber defense of NATO Member States. NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE).
Toplam 40 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mühendisliği (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Vedat Yılmaz 0000-0002-3112-9371

Erken Görünüm Tarihi 11 Temmuz 2025
Yayımlanma Tarihi
Gönderilme Tarihi 27 Aralık 2024
Kabul Tarihi 7 Şubat 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 13 Sayı: 2

Kaynak Göster

APA Yılmaz, V. (2025). A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security. Balkan Journal of Electrical and Computer Engineering, 13(2), 210-218. https://doi.org/10.17694/bajece.1608364

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisans