Research Article
BibTex RIS Cite

A Bibliometric Analysis of Maritime Cybersecurity: Trends, Themes, and Collaboration Patterns

Year 2026, Volume: 14, 41 - 49, 27.03.2026
https://doi.org/10.17694/bajece.1805029
https://izlik.org/JA34CS27MD

Abstract

The rapid development and increasing strategic importance of the maritime cyber security field, particularly over the last decade, form the starting point of this study. The aim of this study is to present the current status of the field with objective data. For this purpose, 607 records indexed under the keywords "Cyber Security" and "Maritime" in the Web of Science Core Collection were examined. Data were collected in the "Full Record and Cited References" format, and descriptive statistics and VOSviewer-based network analysis were applied together. The findings indicate a significant increase in publications after 2016; the acceleration of citation accumulation between 2019 and 2023 signals the field's transition to a mature phase. While the collaboration structure is concentrated around China and the US, it is supported by a strong cluster in Europe. Turkey's visibility is increasing, but there is room for development in terms of network depth. Four themes emerge in the keyword co-occurrence network: navigation and ship systems security (AIS/ECDIS, GNSS spoofing), maritime IoT and communication networks (ICS/SCADA, satcom), machine and deep learning-based anomaly detection, and risk, resilience, and governance. The study's contribution is its systematic mapping of the field within an interdisciplinary framework, jointly assessing country, institutional, and conceptual networks within the context of funding, publishing ecosystems, and citation dynamics. This assessment concretizes research priorities and emphasizes zero-trust principles with multilayered defenses in practice. The results point to a research agenda based on international data and testbed collaborations, providing a practical roadmap for policy and practice.

References

  • [1] Rivkin, B. S. (2023). Maritime cybersecurity: Navigational aspect. Gyroscopy and Navigation, 14(4), 386–400. https://doi.org/10.1134/S207510872470010X
  • [2] Perkovič, M., Gucma, L., & Feuerstack, S. (2024). Maritime security and risk assessments. Journal of Marine Science and Engineering, 12(6), 988. https://doi.org/10.3390/jmse12060988
  • [3] Oruc, A., Gkioulos, V., & Katsikas, S. (2022). Towards a cyber-physical range for the integrated navigation system (INS). Journal of Marine Science and Engineering, 10(1), 107. https://doi.org/10.3390/jmse10010107
  • [4] Avcı, İ., Koca, M., & Atasoy, M. (2021). Windows tabanlı uygulamalarda SQL enjeksiyon siber saldırı senaryosu ve güvenlik önlemleri. European Journal of Science and Technology, 28, 213–219. https://doi.org/10.31590/ejosat.995697
  • [5] L., J. (1981). A brief history of the use of marine radar. Journal of Navigation, 28(3), 199–205. https://doi.org/10.1002/j.2161-4296.1981.tb00767.x
  • [6] Katsikas, S. K., Kavallieratos, G., & Amro, A. (2024). Future trends in maritime cybersecurity. In Computer and Information Security Handbook (pp. 1663–1678). Elsevier. https://doi.org/10.1016/B978-0-443-13223-0.00104-1
  • [7] Koca, M., Avcı, İ., & Al-Hayani, M. A. S. (2023). Classification of malicious URLs using naive Bayes and genetic algorithm. Sakarya University Journal of Computer and Information Sciences, 6(2), 80–90. https://doi.org/10.35377/saucis...1273536
  • [8] Bolat, P., Yüksel, G., & Uçar, S. (2016, May). A study for understanding cyber security awareness among Turkish seafarers. In Proceedings of the Second Global Conference on Innovation in Marine Technology and the Future of Maritime Transportation.
  • [9] Butun, I., Osterberg, P., & Song, H. (2020). Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials, 22(1), 616–644. https://doi.org/10.1109/COMST.2019.2953364
  • [10] Koca, M., & Çiftçi, S. (2025). A comprehensive bibliometric analysis of big data and cyber security: Intellectual structure, trends, and global collaborations. Knowledge and Information Systems. https://doi.org/10.1007/S10115-025-02531-1
  • [11] Zhang, J. Z., Srivastava, P. R., Sharma, D., & Eachempati, P. (2021). Big data analytics and machine learning: A retrospective overview and bibliometric analysis. Expert Systems with Applications, 184. https://doi.org/10.1016/j.eswa.2021.115561
  • [12] Dao, S. D., Abhary, K., & Marian, R. (2017). A bibliometric analysis of genetic algorithms throughout the history. Computers & Industrial Engineering, 110, 395–403. https://doi.org/10.1016/j.cie.2017.06.009
  • [13] Martínez-López, F. J., Merigó, J. M., Gázquez-Abad, J. C., & Ruiz-Real, J. L. (2020). Industrial marketing management: Bibliometric overview since its foundation. Industrial Marketing Management, 84, 19–38. https://doi.org/10.1016/j.indmarman.2019.07.014
  • [14] Soo, D. B., Doku, R., & Garuba, M. (2021). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055–2072. https://doi.org/10.1109/TSC.2019.2907247
  • [15] Sood, S. K., Rawat, K. S., & Kumar, D. (2023). Scientometric analysis of ICT-assisted intelligent control systems response to COVID-19 pandemic. Neural Computing and Applications, 35(26), 18829–18849. https://doi.org/10.1007/S00521-023-08788-3
  • [16] Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330. https://doi.org/10.1016/j.future.2016.10.004
  • [17] van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3
  • [18] Centre for Science and Technology Studies, Leiden University. (2019). VOSviewer: Visualizing scientific landscapes. VOSviewer. https://www.vosviewer.com/
  • [19] Hou, X., Pal, D., Kumar, T. K. A., Thomas, J. P., & Liu, H. (2016, April). Privacy preserving rack-based dynamic workload balancing for Hadoop MapReduce. In Proceedings of IEEE BigDataSecurity (pp. 30–35). IEEE. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.40
  • [20] Koca, M., Aydin, M. A., Sertbaş, A., & Zaim, A. H. (2021). A new distributed anomaly detection approach for log IDS management based on deep learning. Turkish Journal of Electrical Engineering and Computer Sciences, 29(5), 2486–2501. https://doi.org/10.3906/elk-2102-89
  • [21] Musleh, A. S., Yao, G., & Muyeen, S. M. (2019). Blockchain applications in smart grid: Review and frameworks. IEEE Access, 7, 86746–86757. https://doi.org/10.1109/ACCESS.2019.2920682
  • [22] Bhatti, J., & Humphreys, T. (2017). Hostile control of ships via false GPS signals: Demonstration and detection. Journal of Navigation, 64(1), 51–66. https://doi.org/10.1002/navi.183
  • [23] Li, H., Han, D., & Tang, M. (2020). A privacy-preserving charging scheme for electric vehicles using blockchain and fog computing. IEEE Systems Journal, 15(3), 3189–3200. https://doi.org/10.1109/JSYST.2020.3009447
  • [24] Gao, S., et al. (2023). A 3D model encryption scheme based on a cascaded chaotic system. Signal Processing, 202. https://doi.org/10.1016/j.sigpro.2022.108745
  • [25] Yang, Y., Xiao, Y., & Li, T. (2022). Attacks on formation control for multiagent systems. IEEE Transactions on Cybernetics, 52(12), 12805–12817. https://doi.org/10.1109/TCYB.2021.3089375
  • [26] Wang, M., Wang, X., Zhao, T., Zhang, C., Xia, Z., & Yao, N. (2021). Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Information Sciences, 544, 1–24. https://doi.org/10.1016/j.ins.2020.07.051
  • [27] Li, Q., et al. (2022). Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Transactions on Circuits and Systems for Video Technology, 32(8), 5695–5706. https://doi.org/10.1109/TCSVT.2021.3138795
  • [28] Inayat, U., Zia, M. F., Mahmood, S., Khalid, H. M., & Benbouzid, M. (2022). Learning-based methods for cyber attacks detection in IoT systems: Methods, analysis, and future prospects. Electronics, 11(9). https://doi.org/10.3390/electronics11091502
  • [29] Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., & Shi, Y. (2021). An encrypted coverless information hiding method based on generative models. Information Sciences, 553, 19–30. https://doi.org/10.1016/j.ins.2020.12.002
  • [30] Bolbot, V., Theotokatos, G., Boulougouris, E., & Vassalos, D. (2020). A novel cyber-risk assessment method for ship systems. Safety Science, 131. https://doi.org/10.1016/j.ssci.2020.104908
  • [31] Tam, K., & Jones, K. (2019). MaCRA: A model-based framework for maritime cyber-risk assessment. WMU Journal of Maritime Affairs, 18(1), 129–163. https://doi.org/10.1007/s13437-019-00162-2
  • [32] Gao, S., et al. (2023). Asynchronous updating Boolean network encryption algorithm. IEEE Transactions on Circuits and Systems for Video Technology, 33(8), 4388–4400. https://doi.org/10.1109/TCSVT.2023.3237136
  • [33] Wolsing, K., Roepert, L., Bauer, J., & Wehrle, K. (2022). Anomaly detection in maritime AIS tracks: A review of recent approaches. Journal of Marine Science and Engineering, 10(1). https://doi.org/10.3390/jmse10010112
  • [34] Ashraf, I., et al. (2023). A survey on cyber security threats in IoT-enabled maritime industry. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2677–2690. https://doi.org/10.1109/TITS.2022.3164678
  • [35] Ben Farah, M. A., et al. (2022). Cyber security in the maritime industry: A systematic survey of recent advances and future trends. Information, 13(1), 22. https://doi.org/10.3390/info13010022

Denizcilik Siber Güvenliği Üzerine Bibliyometrik Bir Analiz: Eğilimler, Temalar ve İşbirliği Örüntüleri

Year 2026, Volume: 14, 41 - 49, 27.03.2026
https://doi.org/10.17694/bajece.1805029
https://izlik.org/JA34CS27MD

Abstract

Deniz siber güvenlik alanının, özellikle son on yılda hızla gelişmesi ve stratejik öneminin artması, bu çalışmanın başlangıç noktasını oluşturmaktadır. Bu çalışmanın amacı, alanın mevcut durumunu objektif verilerle ortaya koymaktır. Bu amaçla, Web of Science Core Collection'da "Siber Güvenlik" ve "Denizcilik" anahtar kelimeleri altında indekslenen 607 kayıt incelenmiştir. Veriler "Tam Kayıt ve Atıf Yapılan Referanslar" formatında toplanmış ve betimsel istatistikler ile VOSviewer tabanlı ağ analizi birlikte uygulanmıştır. Bulgular, 2016'dan sonra yayınlarda önemli bir artış olduğunu göstermektedir; 2019-2023 yılları arasında atıf birikiminin hızlanması, alanın olgun bir aşamaya geçişini işaret etmektedir. İş birliği yapısı Çin ve ABD etrafında yoğunlaşırken, Avrupa'daki güçlü bir kümelenme tarafından desteklenmektedir. Türkiye'nin görünürlüğü artmakta, ancak ağ derinliği açısından gelişmeye açık alanlar bulunmaktadır. Anahtar kelime eş-oluşum ağı'nda dört tema ortaya çıkmaktadır: navigasyon ve gemi sistemleri güvenliği (AIS/ECDIS, GNSS sahteciliği), denizcilik IoT ve iletişim ağları (ICS/SCADA, satcom), makine ve derin öğrenme tabanlı anomali tespiti ve risk, dayanıklılık ve yönetişim. Çalışmanın katkısı, disiplinler arası bir çerçevede alanın sistematik bir haritasını çıkarması ve fonlama, yayın ekosistemleri ve atıf dinamikleri bağlamında ülke, kurumsal ve kavramsal ağları birlikte değerlendirmesidir. Bu değerlendirme, araştırma önceliklerini somutlaştırır ve uygulamada çok katmanlı savunmalarla sıfır güven ilkelerini vurgular. Sonuçlar, uluslararası verilere ve test ortamı iş birliklerine dayalı bir araştırma gündemine işaret ederek politika ve uygulama için pratik bir yol haritası sunmaktadır.

References

  • [1] Rivkin, B. S. (2023). Maritime cybersecurity: Navigational aspect. Gyroscopy and Navigation, 14(4), 386–400. https://doi.org/10.1134/S207510872470010X
  • [2] Perkovič, M., Gucma, L., & Feuerstack, S. (2024). Maritime security and risk assessments. Journal of Marine Science and Engineering, 12(6), 988. https://doi.org/10.3390/jmse12060988
  • [3] Oruc, A., Gkioulos, V., & Katsikas, S. (2022). Towards a cyber-physical range for the integrated navigation system (INS). Journal of Marine Science and Engineering, 10(1), 107. https://doi.org/10.3390/jmse10010107
  • [4] Avcı, İ., Koca, M., & Atasoy, M. (2021). Windows tabanlı uygulamalarda SQL enjeksiyon siber saldırı senaryosu ve güvenlik önlemleri. European Journal of Science and Technology, 28, 213–219. https://doi.org/10.31590/ejosat.995697
  • [5] L., J. (1981). A brief history of the use of marine radar. Journal of Navigation, 28(3), 199–205. https://doi.org/10.1002/j.2161-4296.1981.tb00767.x
  • [6] Katsikas, S. K., Kavallieratos, G., & Amro, A. (2024). Future trends in maritime cybersecurity. In Computer and Information Security Handbook (pp. 1663–1678). Elsevier. https://doi.org/10.1016/B978-0-443-13223-0.00104-1
  • [7] Koca, M., Avcı, İ., & Al-Hayani, M. A. S. (2023). Classification of malicious URLs using naive Bayes and genetic algorithm. Sakarya University Journal of Computer and Information Sciences, 6(2), 80–90. https://doi.org/10.35377/saucis...1273536
  • [8] Bolat, P., Yüksel, G., & Uçar, S. (2016, May). A study for understanding cyber security awareness among Turkish seafarers. In Proceedings of the Second Global Conference on Innovation in Marine Technology and the Future of Maritime Transportation.
  • [9] Butun, I., Osterberg, P., & Song, H. (2020). Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials, 22(1), 616–644. https://doi.org/10.1109/COMST.2019.2953364
  • [10] Koca, M., & Çiftçi, S. (2025). A comprehensive bibliometric analysis of big data and cyber security: Intellectual structure, trends, and global collaborations. Knowledge and Information Systems. https://doi.org/10.1007/S10115-025-02531-1
  • [11] Zhang, J. Z., Srivastava, P. R., Sharma, D., & Eachempati, P. (2021). Big data analytics and machine learning: A retrospective overview and bibliometric analysis. Expert Systems with Applications, 184. https://doi.org/10.1016/j.eswa.2021.115561
  • [12] Dao, S. D., Abhary, K., & Marian, R. (2017). A bibliometric analysis of genetic algorithms throughout the history. Computers & Industrial Engineering, 110, 395–403. https://doi.org/10.1016/j.cie.2017.06.009
  • [13] Martínez-López, F. J., Merigó, J. M., Gázquez-Abad, J. C., & Ruiz-Real, J. L. (2020). Industrial marketing management: Bibliometric overview since its foundation. Industrial Marketing Management, 84, 19–38. https://doi.org/10.1016/j.indmarman.2019.07.014
  • [14] Soo, D. B., Doku, R., & Garuba, M. (2021). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14(6), 2055–2072. https://doi.org/10.1109/TSC.2019.2907247
  • [15] Sood, S. K., Rawat, K. S., & Kumar, D. (2023). Scientometric analysis of ICT-assisted intelligent control systems response to COVID-19 pandemic. Neural Computing and Applications, 35(26), 18829–18849. https://doi.org/10.1007/S00521-023-08788-3
  • [16] Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330. https://doi.org/10.1016/j.future.2016.10.004
  • [17] van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. https://doi.org/10.1007/s11192-009-0146-3
  • [18] Centre for Science and Technology Studies, Leiden University. (2019). VOSviewer: Visualizing scientific landscapes. VOSviewer. https://www.vosviewer.com/
  • [19] Hou, X., Pal, D., Kumar, T. K. A., Thomas, J. P., & Liu, H. (2016, April). Privacy preserving rack-based dynamic workload balancing for Hadoop MapReduce. In Proceedings of IEEE BigDataSecurity (pp. 30–35). IEEE. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.40
  • [20] Koca, M., Aydin, M. A., Sertbaş, A., & Zaim, A. H. (2021). A new distributed anomaly detection approach for log IDS management based on deep learning. Turkish Journal of Electrical Engineering and Computer Sciences, 29(5), 2486–2501. https://doi.org/10.3906/elk-2102-89
  • [21] Musleh, A. S., Yao, G., & Muyeen, S. M. (2019). Blockchain applications in smart grid: Review and frameworks. IEEE Access, 7, 86746–86757. https://doi.org/10.1109/ACCESS.2019.2920682
  • [22] Bhatti, J., & Humphreys, T. (2017). Hostile control of ships via false GPS signals: Demonstration and detection. Journal of Navigation, 64(1), 51–66. https://doi.org/10.1002/navi.183
  • [23] Li, H., Han, D., & Tang, M. (2020). A privacy-preserving charging scheme for electric vehicles using blockchain and fog computing. IEEE Systems Journal, 15(3), 3189–3200. https://doi.org/10.1109/JSYST.2020.3009447
  • [24] Gao, S., et al. (2023). A 3D model encryption scheme based on a cascaded chaotic system. Signal Processing, 202. https://doi.org/10.1016/j.sigpro.2022.108745
  • [25] Yang, Y., Xiao, Y., & Li, T. (2022). Attacks on formation control for multiagent systems. IEEE Transactions on Cybernetics, 52(12), 12805–12817. https://doi.org/10.1109/TCYB.2021.3089375
  • [26] Wang, M., Wang, X., Zhao, T., Zhang, C., Xia, Z., & Yao, N. (2021). Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Information Sciences, 544, 1–24. https://doi.org/10.1016/j.ins.2020.07.051
  • [27] Li, Q., et al. (2022). Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Transactions on Circuits and Systems for Video Technology, 32(8), 5695–5706. https://doi.org/10.1109/TCSVT.2021.3138795
  • [28] Inayat, U., Zia, M. F., Mahmood, S., Khalid, H. M., & Benbouzid, M. (2022). Learning-based methods for cyber attacks detection in IoT systems: Methods, analysis, and future prospects. Electronics, 11(9). https://doi.org/10.3390/electronics11091502
  • [29] Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., & Shi, Y. (2021). An encrypted coverless information hiding method based on generative models. Information Sciences, 553, 19–30. https://doi.org/10.1016/j.ins.2020.12.002
  • [30] Bolbot, V., Theotokatos, G., Boulougouris, E., & Vassalos, D. (2020). A novel cyber-risk assessment method for ship systems. Safety Science, 131. https://doi.org/10.1016/j.ssci.2020.104908
  • [31] Tam, K., & Jones, K. (2019). MaCRA: A model-based framework for maritime cyber-risk assessment. WMU Journal of Maritime Affairs, 18(1), 129–163. https://doi.org/10.1007/s13437-019-00162-2
  • [32] Gao, S., et al. (2023). Asynchronous updating Boolean network encryption algorithm. IEEE Transactions on Circuits and Systems for Video Technology, 33(8), 4388–4400. https://doi.org/10.1109/TCSVT.2023.3237136
  • [33] Wolsing, K., Roepert, L., Bauer, J., & Wehrle, K. (2022). Anomaly detection in maritime AIS tracks: A review of recent approaches. Journal of Marine Science and Engineering, 10(1). https://doi.org/10.3390/jmse10010112
  • [34] Ashraf, I., et al. (2023). A survey on cyber security threats in IoT-enabled maritime industry. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2677–2690. https://doi.org/10.1109/TITS.2022.3164678
  • [35] Ben Farah, M. A., et al. (2022). Cyber security in the maritime industry: A systematic survey of recent advances and future trends. Information, 13(1), 22. https://doi.org/10.3390/info13010022
There are 35 citations in total.

Details

Primary Language English
Subjects Software Architecture, Software Engineering (Other)
Journal Section Research Article
Authors

Murat Koca 0000-0002-6048-7645

Submission Date October 16, 2025
Acceptance Date March 26, 2026
Publication Date March 27, 2026
DOI https://doi.org/10.17694/bajece.1805029
IZ https://izlik.org/JA34CS27MD
Published in Issue Year 2026 Volume: 14

Cite

APA Koca, M. (2026). A Bibliometric Analysis of Maritime Cybersecurity: Trends, Themes, and Collaboration Patterns. Balkan Journal of Electrical and Computer Engineering, 14, 41-49. https://doi.org/10.17694/bajece.1805029

Aim & Scope

Balkan Journal of Electrical and Computer Engineering - (BAJECE)
(An International Peer Reviewed, indexed and Open Access Journal)

The journal publishes original papers in the extensive field of Electrical-electronics and Computer engineering. It accepts contributions which are fundamental for the development of electrical engineering and its applications, including overlaps to physics. Manuscripts on both theoretical and experimental work are welcome. Review articles and letters to the editors are also included.

Application areas include (but are not limited to):


Electrical & Electronics Engineering

Computer Engineering

Software Engineering

Biomedical Engineering

Electrical Power Engineering

Electric analysis & Mathematical models.

Electrical Control Engineering

Signal and Image Processing

Communications

Networking

Sensors, Actuators, Remote sensing, Consumer electronics, Fiber optics

Radar and Sonar systems

Artificial Intelligence and its Applications, Expert Systems

Medical imaging, Biomedical analysis and its applications

Computer vision, Pattern recognition,

Robotics, industrial automation

Renewable Energy


IMPORTANT INFORMATION FOR AUTHORS




Manuscript will be considered only on the understanding that it is not currently being submitted to other journals.

Submission of an article implies that the results described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and that, if accepted, it will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher.

Authors are obliged to follow remarks and comments of the reviewers, as well as to follow Instructions for preparing manuscripts and technical remarks and corrections of the Editorial Board.

Papers will be published in English, and authors are obliged to submit papers free of typing errors (please use Spell Checking).

Editorial Board has right to make small lector corrections and to shorten text of the paper, which would not influence author's ideas and presentation. After computer lay-out of the paper, authors will obtain text as .pdf file for approval.

The manuscripts, not exceeding 12 pages (for review papers maximum 20 pages), including figures and tables, should be submitted in electronic form only in MS Word (.doc file) or LaTex format (.tex file), and submit to submission system.

For each author full name, personal (or first) name(s) and family (or last) name(s), and affiliation, have to be given. Family or last name(s) has to be written in capital letters. In the case of more than one author, the name of corresponding author should be indicated, with full postal address, e-mail address, and affiliation.

Each paper has to be written according to following order: title, author(s), affiliation(s), abstract, key words, body of the text with numerated sections and subsections including introduction, conclusions, acknowledgment (if necessary), nomenclature, and references. Pages must have page numbers.

Each author and coauthor have the possibility to subscribe for 10 reprints of their paper (for details, see our subscription page).

Authors note that paper can not be withdrawn at any condition once it is accepted. The Authors may not publish his/her The Author may not publish his/her contribution anywhere else without the prior written permission of the publisher unless it has been changed substantially. The Author warrants that his/her contribution is original, except for such excerpts from copyrighted works as may be included with the permission of the copyright holder and author thereof, that it contains no libellous statements, and does not infringe on any copyright, trademark, patent, statutory right, or propriety right of others. The Author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. In return for these rights:

All proprietary rights other than copyrights, such as patent rights.

The right to use all or part of this article, including tables and figures in future works of their own, provided that the proper acknowledgment is made to the Publisher as copyright holder.

The right to make copies of this article for his/her own use, but not for sale.

It is the responsibility of each author to ensure that papers submitted to the journal are written with ethical standards in mind, concerning plagiarism. Please note that all submissions are thoroughly checked for plagiarism. If an attempt at plagiarism is found in a published paper, the authors will be asked to issue a written apology to the authors of the original material. Any paper which shows obvious signs of plagiarism will be automatically rejected and its authors may be banned for duration of 10 years from publishing in Journal. The authors will receive proper notification if such a situation arises.

This paper has not been published in the same form elsewhere.

It will not be submitted anywhere else for publication prior to acceptance/rejection by BAJECE.

Ethics;

Papers must be submitted on the understanding that they have not been published elsewhere and are not currently under consideration by another journal. The submitting author is responsible for ensuring that the article’s publication has been approved by all the other coauthors. When an author discovers a significant error or inaccuracy in his/her own published work, it is the author's obligation to notify the publisher and cooperate with the editor to retract or correct the paper. It is also the authors’ responsibility to ensure that the articles emanating from a particular institution are submitted with the approval of the necessary institution. Only an acknowledgment from the editorial office officially establishes the date of receipt. Further correspondence and proofs will be sent to the author(s) before publication unless otherwise indicated. It is a condition of submission of a paper that the authors permit editing of the paper for readability.

BAJECE is committed to following the Code of Conduct and Best Practice Guidelines of COPE (Committee on Publication Ethics) . It is a duty of our editors to follow Cope Guidance for Editors and our peer-reviewers must follow COPE Ethical Guidelines for Peer Reviewers .

If you have any questions, please contact the relevant editorial office, or Balkan Journal of Electrical and Computer Engineering (BAJECE)' ethics representative: bajece@hotmail.com

Download a PDF version of the Ethics and Policies [PDF,392KB].

Reviewer Process Information

BAJECE employs a single-blind peer review process to ensure scientific quality, fairness, and transparency. In this review model, reviewers are able to see the authors’ names and affiliations, while authors do not have access to the reviewers’ identities. This approach allows reviewers to provide objective, detailed, and constructive feedback while maintaining their anonymity.

All submitted manuscripts are first evaluated by the Editorial Board for relevance, structure, and adherence to journal guidelines. Papers that meet the initial criteria are then assigned to at least two independent reviewers who are experts in the related research area. Reviewers assess manuscripts based on originality, technical accuracy, clarity, methodology, and scientific contribution.

Authors are required to revise their papers according to reviewers’ comments and suggestions within the given time frame. The final publication decision—acceptance, revision, or rejection—is made by the Editor-in-Chief after considering the reviewers’ recommendations and the scientific merit of the manuscript.

This single-blind review process ensures impartial evaluation, promotes academic integrity, and supports high-quality scientific publication standards in BAJECE.

Papers must be submitted on the understanding that they have not been published elsewhere and are not currently under consideration by another journal. The submitting author is responsible for ensuring that the article’s publication has been approved by all the other coauthors. When an author discovers a significant error or inaccuracy in his/her own published work, it is the author's obligation to notify the publisher and cooperate with the editor to retract or correct the paper. It is also the authors’ responsibility to ensure that the articles emanating from a particular institution are submitted with the approval of the necessary institution. Only an acknowledgment from the editorial office officially establishes the date of receipt. Further correspondence and proofs will be sent to the author(s) before publication unless otherwise indicated. It is a condition of submission of a paper that the authors permit editing of the paper for readability.

BAJECE is committed to following the Code of Conduct and Best Practice Guidelines of COPE (Committee on Publication Ethics) . It is a duty of our editors to follow Cope Guidance for Editors and our peer-reviewers must follow COPE Ethical Guidelines for Peer Reviewers .

If you have any questions, please contact the relevant editorial office, or Balkan Journal of Electrical and Computer Engineering (BAJECE)' ethics representative: bajece@hotmail.com

Download a PDF version of the Ethics and Policies [PDF,392KB].

Reviewer Process Information

BAJECE employs a single-blind peer review process to ensure scientific quality, fairness, and transparency. In this review model, reviewers are able to see the authors’ names and affiliations, while authors do not have access to the reviewers’ identities. This approach allows reviewers to provide objective, detailed, and constructive feedback while maintaining their anonymity.

All submitted manuscripts are first evaluated by the Editorial Board for relevance, structure, and adherence to journal guidelines. Papers that meet the initial criteria are then assigned to at least two independent reviewers who are experts in the related research area. Reviewers assess manuscripts based on originality, technical accuracy, clarity, methodology, and scientific contribution.

Authors are required to revise their papers according to reviewers’ comments and suggestions within the given time frame. The final publication decision—acceptance, revision, or rejection—is made by the Editor-in-Chief after considering the reviewers’ recommendations and the scientific merit of the manuscript.

This single-blind review process ensures impartial evaluation, promotes academic integrity, and supports high-quality scientific publication standards in BAJECE.

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı