Publications

Peer-reviewed journals (12)

  1. Gürol Canbek, …, BenchMetrics: A systematic benchmarking method for binary-classification performance metrics. Neural Computing and Applications (NCAA), 2021, https://doi.org/10.1007/s00521-021-06103-6
    (post-peer-review, pre-copyedit version Full Text)
    (NCAA: Springer SCI, Q1 Software)
    Keywords: artificial intelligence, machine learning, binary classification, performance metric, performance evaluation, benchmarking, meta-metric


  1. Gürol Canbek, Gaining new insight in machine-learning datasets via multiple binary-feature frequency ranks with a mobile benign/malware apps example. Hittite Journal of Science and Engineering
    Vol:8, No: 2, pp.
    103–121, June 2021, https://doi.org/10.17350/HJSE19030000221
    (Full Text, ResearchGate)
    Keywords: artificial intelligence, machine learning, binary classification, dataset comparison, feature engineering, quantitative analysis, data profiling, malware analysis


  1. Gürol Canbek, Cyber security by a new analogy: The allegory of the ‘mobile’ cave, Journal of Applied Security Research, Taylor & Francis, Vol 13, No: 1, pp. 63-88, Routledge, 2017, https://doi.org/10.1080/19361610.2018.1387838
    (JSAR: ESCI, Q3 Law, ResearchGate: Full Text)
    (Citations: 1 via Taylor & Francis, 5 via Google Scholar as of May 2021)
    Keywords: reasoning, analogy, induction, deduction, abduction, examplification, comparison, simile, metaphor, hypocatastasis, parable, allegory, symbol, scientific inquiry, cyber security, mobile security, security awareness


  1. Gürol Canbek, …, New comprehensive taxonomies on mobile security and malware analysis, International Journal of Information Security Science (IJISS), Vol:5, Nr:4, pp. 106–138, December 2016.
    (ResearchGate: Full Text)
    (Citations: 12 via Google Scholar as of May 2021)
    Keywords: taxonomy, mobile security, mobile malware analysis, cyber security, visualization


  1. Şeref Sağıroğlu and Gürol Canbek, Keyloggers: Increasing threats to computer security and privacy, IEEE Technology and Society Magazine, IEEE, Vol 28, No: 3, pp. 10–17, September 2009, https://doi.org/10.1109/MTS.2009.934159
    (Cover Article, ResearchGate: Full Text) (IEEE TSM: SCI, Q2 Engineering)
    (
    Citations: 20 via IEEE, 68 via Google Scholar as of May 2021)
    Keywords: computer security, computer system protection, human-to-machine interfaces, keylogger intrusion, computer privacy


  1. Gürol Canbek, ..., A perspective to personal privacy and legal regulations in terms of malicious software (in Turkish: “Kişisel gizlilik ve yasal düzenlemelere kötücül yazılımlar açısından bakış”), Savunma Bilimleri Dergisi, KHO, Vol 7, No: 2, pp. 119–139, October 2008
    (ResearchGate: Full Text)
    (Citations: 2 via Google Scholar)


  1. Gürol Canbek, ..., Spyware: Infection methods and preventive measures (in Turkish: Casus yazılımlar: Bulaşma yöntemleri ve önlemler), Journal of the Faculty of Eng. & Architecture of Gazi University, Vol 23, No: 1, pp. 165–180, March 2008
    (ResearchGate: Full Text)
    (Citations: 12 via Google Scholar)


  1. Gürol Canbek, ..., Attacks against computer systems and their types: A review study (in Turkish: Bilgisayar sistemlerine yapılan saldırılar ve türleri: Bir inceleme), Erciyes Universitesi Fen Bilimleri Enstitüsü Dergisi, Vol 23, No: 1–2, p 1–12, 2007
    (ResearchGate: Full Text)
    (
    Citations: 35 via Google Scholar)


  1. Gürol Canbek, ..., Malware and spyware: A comprehensive review (in Turkish: Kötücül ve casus yazılımlar: Kapsamlı bir araştırma), Journal of the Faculty of Eng. & Architecture of Gazi University, Vol 22, No: 1, pp. 121–136, March 2007
    (ResearchGate: Full Text)
    (Citations: 21 via Google Scholar)


  1. Gürol Canbek, ..., Computer and Internet security for children and teenagers (in Turkish: Çocukların ve gençlerin bilgisayar ve İnternet güvenliği), Journal of Polytechnic, Gazi University, Vol 10, No: 1, pp. 33–39, January 2007
    (ReserchGate: Full Text)
    (
    Citations: 128 via Google Scholar)


  1. Gürol Canbek, …, A review on information, information security and security processes (in Turkish: Bilgi, bilgi güvenliği ve süreçleri üzerine bir inceleme), Journal of Polytechnic Gazi University, Vol 9, No: 3, pp. 165–174, Dec 2006
    (ResearchGate: Full Text)
    (
    Citations: 113 via Google Scholar)


  1. Gürol Canbek, ..., Implementation of real-time optimization of page layout of Internet newspaper using simulated annealing (in Turkish: İnternet gazetesi sayfa düzeninin gerçek zamanlı eniyilemesinn benzetilmiş tavlama algoritmasıyla gerçekleştirilmesi), Journal of the Faculty of Eng. & Architecture of Gazi University, Vol 21, No: 2, pp. 341–348, June 2006
    (ResearchGate:
    Full Text)
    (
    Citations: 1 via Google Scholar)

Proceedings in peer-reviewed conferences/symposia (7)

  1. Gürol Canbek, Veri Kümelerinin Makine Öğrenmesinde Kullanımına Yönelik Bir Kesit Çıkartma Yöntemi: Büyük Veri ile Bağdaştırılmış Bir Genişletme Önerisi {A Data Profiling Method for Machine Learning Datasets: An Expansion Proposal with Big Data Association}”. 6th International Academic Studies Conference (UBCAK), August 2021,
    (ResearchGate: Full Text)
    Keywords: data profiling, data quality, big data, big dataset, volume, variety, veracity, venue, value, variability, artificial intelligence, machine learning, classification, feature engineering, malware detection, mobile malware, Android


  1. Gürol Canbek, …, New techniques in profiling big datasets for machine learning with a concise review of Android mobile malware datasets”. Int. Conf. Big Data, Deep Learning (IBIGDELFT), IEEE, December 2018, Ankara, https://doi.org/10.1109/IBIGDELFT.2018.8625275
    (ResearchGate: Full Text)
    (Citations: 1 via IEEE, 5 via Google Scholar as of May 2021)
    Keywords: data profiling, data quality, big data, big dataset, volume, variety, veracity, venue, value, variability, artificial intelligence, machine learning, classification, feature engineering, malware detection, mobile malware, Android


  1. Gürol Canbek, …, Strategic cyber-security perspectivein smart grids, (in Turkish: Akıllı şebekelerde stratejik siber güvenlik bakışı). 6th International Symposium on Digital Forensic and Security (ISDFS), IEEE, March 2018, Istanbul, https://doi.org/10.1109/ISDFS.2018.8355346
    (ResearchGate:
    Full Text)


  1. Gürol Canbek, …, Clustering and visualization of mobile application permissions for end users and malware analysts”. 5th International Symposium on Digital Forensic and Security (ISDFS), IEEE, April 2017, Tîrgu Mures, Romania, https://doi.org/10.1109/ISDFS.2017.7916512
    (ResearchGate:
    Full Text)
    (Citations: 3 via IEEE, 6 via Google Scholar as of May 2021)
    Keywords: data visualisation, pattern classification, pattern clustering, invasive software, mobile computing, Android, access control, mobile security


  1. Gürol Canbek, ..., Binary classification performance measures/metrics: A comprehensive visualized roadmap to gain new insights”, International Conference on Computer Science and Engineering (UBMK), IEEE, October 2016, Antalya, https://doi.org/10.1109/UBMK.2017.8093539
    (ResarchGate:
    Full Text)
    (Citations: 4 via IEEE, 25 via Google Scholar as of May 2021)
    Keywords: terminology, mathematical model, visualization, performance analysis, learning (artificial intelligence), pattern classification, performance metrics, binary classification performance, machine learning problems, canonical notation, concept duality concept, complementation concept, binary classification, classification performance, metrics, measures, machine learning, visualization, ontology


  1. Gürol Canbek, …, Holistic cyber security: From network to software(in Turkish: “Bilgisayar ağlarından yazılıma: Bütüncül siber güvenlik yaklaşımı”), 1st International Symposium on Digital Forensics and Security (ISDFS), May 2013, Elazığ
    (ResearchGate:
    Full Text)


  1. Gürol Canbek, ..., The level of protection of e-signature against malware and spyware(in Turkish: “Kötücül ve casus yazılımlara karşı elektronik imzanın sağlamış olduğu korunma düzeyi”), Information Security and Cryptology Conference (ISCTURKEY), Telecommunication Ins., pp. 263–269, 13-14 December 2007, Ankara
    (ResearchGate: Full Text)
    (
    Citations: 1 via Google Scholar)

Books & book chapters (4)

  1. Gürol Canbek, Insurance in Cyber Security (in Turkish: Siber Güvenlikte Sigortalama), Chapter 8 in Cyber Security and Defense: Problems and Solutions (in Turkish: Siber Güvenlik ve Savunma: Problemler ve Çözümler), Grafiker Yayıncılık, 2019, Ankara
    (ResearchGate:
    Full Text)


  1. Gürol Canbek, …, Information and Computer Security: Spyware and safeguarding Methods (in Turkish: Bilgi ve Bilgisayar Güvenliği: Casus Yazılımlar ve Korunma Yöntemleri), Grafiker Publishing, ISBN 975-6355-26-3, 480 pages, Dec 2006, Ankara
    (
    Citations: 30 via Google Scholar as of May 2021)

Order Online More Info


  1. Gürol Canbek, Design with AutoCAD R.14 (in Turkish: AutoCAD R.14 ile Tasarım), Inonu University, 2000, Malatya


  1. Gürol Canbek, ..., Information Technology Fundementals (in Turkish: Temel Bilişim Teknolojileri), Inonu University, 2000, Malatya

Reports (3)

  1. Gürol Canbek, …, Criteria for Classification of Information Assets According to Their Confidentiality Levels (in Turkish: Bilgi Varlıklarının Gizlilik Derecelerine Göre Sınıflandırılması), TSE K523, Turkish Standardization Organization, Ankara, May 2016.
    (ResearchGate:
    Full Text)


  1. Gürol Canbek, ..., Secure Information Sharing - Part I: SECRET to Lower Level Domains Interconnection Proposal, NATO Science & Technology Organization (STO), IST-114, January 2016. doi: 10.14339/STO-TR-IST-114-Part-I
    (NATO:
    Full Text)


  1. …, Gürol Canbek, ..., National Cyber Security Strategy Proposal of Turkey (in Turkish: Türkiye Ulusal Siber Güvenlik Stratejisi Önerisi), Information Security Association, Ankara, June 2012.
    (ResearchGate:
    Full Text)

Articles (2)

  1. Gürol Canbek, The New Cyber Order and Cyber Weaponry: What should we do? (in Turkish: Yeni siber düzen ve siber silahlanma: Ne yapılabilir?), Aljazeera Türkiye, 29 March 2017.
    (ResearchGate:
    Full Text)


  1. Gürol Canbek, On the verge of cyber war: the zeroth day (in Turkish: Siber savaşın eşiğinde: sıfırıncı gün?”), Aljazeera Türkiye, 26 February 2015.