IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Balkan Journal of Electrical and Computer Engineering
  • Cilt: 13 Sayı: 2
  • A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security

A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security

Authors : Vedat Yılmaz
Pages : 210-218
Doi:10.17694/bajece.1608364
View : 70 | Download : 139
Publication Date : 2025-06-30
Article Type : Research Paper
Abstract :This bibliometric study conducts a comprehensive analysis of the field of cybersecurity, particularly in the context of law enforcement and security strategies, to examine key trends, author influence, and interdisciplinary connections within the literature. In the WoS database, 6606 articles were reached by using the search expression in the title, abstract and keywords fields (\\\"Cyber security\\\" or \\\"cyber-attacks\\\" or \\\"cyber protection\\\" or \\\"spam cyber security\\\" or \\\"data security\\\" or \\\"network security\\\" or \\\"anomaly detection\\\" or \\\"cyber countermeasures\\\") and restricting the year of publication to after 2000. The analysis includes metrics such as keyword co-occurrence frequency, author citation impact, co-authorship networks, bibliographic coupling of documents, co-citation analysis of authors, and institutional bibliographic connections. This study highlights the relationship between cybersecurity, law enforcement, and public safety, assessing the role of methodologies and technologies in mitigating security threats and reducing their impacts. When the keywords in the articles obtained as a result of the keyword analysis were examined, it was seen that the words \\\"anomaly detection\\\", \\\"cybersecurity\\\", and \\\"deep learning\\\" were the most frequently used keywords. It is noteworthy that the word \\\"deep learning\\\" was not included in the words generated when determining the articles, but it was used as a keyword in the articles obtained as a result of the determined keywords. Author citation analysis revealed influential contributors such as Quin Du, Wei Li, and Liangpei Zhang. Country-level analysis shows that China and the United States are leading in the field of research output, and institutional analysis highlights the prominent role of the Chinese Academy of Sciences. In conclusion, this research provides valuable insights into how law enforcement and security strategies intersect with academic studies in cybersecurity, offering a roadmap for future research.
Keywords : Cyber Security, Anamoly Detection, Cyber Atacs, Security Technologies, Law Enforcement

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026