<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.1608364</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Engineering (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Mühendisliği (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>A Bibliometric Analysis on Cybersecurity Using VOSviewer: An Evaluation for Public Security</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-3112-9371</contrib-id>
                                                                <name>
                                    <surname>Yılmaz</surname>
                                    <given-names>Vedat</given-names>
                                </name>
                                                                    <aff>Jandarma ve Sahil Güvenlik Akademisi</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250630">
                    <day>06</day>
                    <month>30</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>13</volume>
                                        <issue>2</issue>
                                        <fpage>210</fpage>
                                        <lpage>218</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241227">
                        <day>12</day>
                        <month>27</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250207">
                        <day>02</day>
                        <month>07</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>This bibliometric study conducts a comprehensive analysis of the field of cybersecurity, particularly in the context of law enforcement and security strategies, to examine key trends, author influence, and interdisciplinary connections within the literature.  In the WoS database, 6606 articles were reached by using the search expression in the title, abstract and keywords fields (&quot;Cyber security&quot; or &quot;cyber-attacks&quot; or &quot;cyber protection&quot; or &quot;spam cyber security&quot; or &quot;data security&quot; or &quot;network security&quot; or &quot;anomaly detection&quot; or &quot;cyber countermeasures&quot;) and restricting the year of publication to after 2000. The analysis includes metrics such as keyword co-occurrence frequency, author citation impact, co-authorship networks, bibliographic coupling of documents, co-citation analysis of authors, and institutional bibliographic connections. This study highlights the relationship between cybersecurity, law enforcement, and public safety, assessing the role of methodologies and technologies in mitigating security threats and reducing their impacts. When the keywords in the articles obtained as a result of the keyword analysis were examined, it was seen that the words &quot;anomaly detection&quot;, &quot;cybersecurity&quot;, and &quot;deep learning&quot; were the most frequently used keywords. It is noteworthy that the word &quot;deep learning&quot; was not included in the words generated when determining the articles, but it was used as a keyword in the articles obtained as a result of the determined keywords. Author citation analysis revealed influential contributors such as Quin Du, Wei Li, and Liangpei Zhang. Country-level analysis shows that China and the United States are leading in the field of research output, and institutional analysis highlights the prominent role of the Chinese Academy of Sciences. In conclusion, this research provides valuable insights into how law enforcement and security strategies intersect with academic studies in cybersecurity, offering a roadmap for future research.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>Cyber Security</kwd>
                                                    <kwd>  Anamoly Detection</kwd>
                                                    <kwd>  Cyber Atacs</kwd>
                                                    <kwd>  Security Technologies</kwd>
                                                    <kwd>  Law Enforcement</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] Mas-Tur, A., Kraus, S., Brandtner, M., Ewert, R., &amp; Kürsten, W. (2020). Advances in management research: a bibliometric overview of the Review of Managerial Science. Review of Managerial Science, 14(5), 933-958.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] Mistar, J., Setiakarnawijaya, Y., Dewi, P. C. P., Paramita, D. P., Aqobah, Q. J., &amp; Akbar, M. A. (2023). Systematic Literature Review: Research on Martial Arts Competition Using Vos Viewers in the 2018-2022 Google Scholar Database. Gladi: Jurnal Ilmu Keolahragaan, 14(02), 221-228.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] Van Eck, N. J. &amp; Waltman, L. (2023). VOSviewer manual for VOSviewer version 1.6.20. Universiteit Leiden: CWTS.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] Vosviewer (2025). https://www.vosviewer.com/features/examples. Access Date: January 18, 2025</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] Dereli, A. B. (2024). Vosviewer ile Bibliyometrik Analiz. Communicata, (28), 1-7</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] Zawish, M., Dharejo, F. A., Khowaja, S. A., Raza, S., Davy, S., Dev, K., &amp; Bellavista, P. (2024). AI and 6G into the metaverse: Fundamentals, challenges, and future research trends. IEEE Open Journal of the Communications Society, 5, 730-778.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] Khan, L. U., Yaqoob, I., Imran, M., Han, Z., &amp; Hong, C. S. (2020). 6G wireless systems: A vision, architectural elements, and future directions. IEEE Access, 8, 147029-147044.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] Kshetri, N., &amp; Kshetri, N. (2016). Cybersecurity in National Security and International Relations. The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies, 53-74.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] Craigen, D., Diakun-Thibault, N., &amp; Purse, R. (2014). Defining cybersecurity. Technology innovation management review, 4(10).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] Singer, P. W., &amp; Friedman, A. (2014). Cybersecurity: What everyone needs to know.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] Caviglione, L., Wendzel, S., Mileva, A., &amp; Vrhovec, S. (2021). Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12(4), 1-3.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] Borrett, M., Carter, R., &amp; Wespi, A. (2014). How is cyber threat evolving and what do organizations need to consider? Journal of business continuity &amp; emergency planning, 7(2), 163-171.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] Ulsch, M. (2014). Cyber threat!: how to manage the growing risk of cyber attacks. John Wiley &amp; Sons.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] Mallikarjunan, K. N., Muthupriya, K., &amp; Shalinie, S. M. (2016, January). A survey of distributed denial of service attack. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] Hasan, M. K., Habib, A. A., Islam, S., Safie, N., Abdullah, S. N. H. S., &amp; Pandey, B. (2023). DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments. Energy Reports, 9, 1318-1326.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] Solomon, A., Walker, E., Kensington, J., Drummond, M., Hall, R., &amp; Blackwell, G. (2024). A new autonomous multi-layered cognitive detection mechanism for ransomware attacks.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] Chen, P., Desmet, L., &amp; Huygens, C. (2014). A study on advanced persistent threats. In Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings 15(pp. 63-72). Springer Berlin Heidelberg.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] Handa, A., Sharma, A., &amp; Shukla, S. K. (2019). Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(4), e1306.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., &amp; Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] Volini, A. G. (2020). A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity &amp; Data Privacy Legal &amp; Policy Issues. J. Intell. Prop. L., 28, 291.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] Zheng, Y., Li, Z., Xu, X., &amp; Zhao, Q. (2022). Dynamic defenses in cyber security: Techniques, methods, and challenges. Digital Communications and Networks, 8(4), 422-435.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22] Maddireddy, B. R., &amp; Maddireddy, B. R. (2024). Neural Network Architectures in Cybersecurity: Optimizing Anomaly Detection and Prevention. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 238-266.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23] Martínez Torres, J., Iglesias Comesaña, C., &amp; García-Nieto, P. J. (2019). Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics, 10(10), 2823-2836.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24] Siber Güvenlik (n.d.). Dijital Dönüşüm Ofisi. https://cbddo.gov.tr/siber-guvenlik/</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25] National Cybersecurity Strategy (2023). White House. https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">[26] Anagnostakis, D. (2021). The European Union-United States cybersecurity relationship: a transatlantic functional cooperation. Journal of Cyber Policy, 6(2), 243-261</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">[27] Siber Güvenlik (n.d.). Dijital Dönüşüm Ofisi. https://cbddo.gov.tr/SharedFolderServer/Genel/File/bg_rehber.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">[28] Orduña-Malea, E., &amp; Costas, R. (2021). Link-based approach to study scientific software usage: The case of VOSviewer. Scientometrics, 126(9), 8153-8186.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">[29] Moustafa, N. (2021). A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustainable Cities and Society, 72, 102994.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">[30] Ahmad, R., Alsmadi, I., Alhamdani, W., &amp; Tawalbeh, L. A. (2023). Zero-day attack detection: a systematic literature review. Artificial Intelligence Review, 56(10), 10733-10811.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">[31] Mahdavifar, S., &amp; Ghorbani, A. A. (2019). Application of deep learning to cybersecurity: A survey. Neurocomputing, 347, 149-176.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">[32] Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 59(6), 703-705.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">[33] Abdullahi, M., Alhussian, H., Aziz, N., Abdulkadir, S. J., Alwadain, A., Muazu, A. A., &amp; Bala, A. (2024). Comparison and investigation of AI-based approaches for cyberattack detection in cyber-physical systems. IEEE Access.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">[34] Baadel, S., Thabtah, F., &amp; Lu, J. (2021). Cybersecurity awareness: A critical analysis of education and law enforcement methods. Informatica, 45(3).</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">[35] Kavak, H., Padilla, J. J., Vernon-Bido, D., Diallo, S. Y., Gore, R., &amp; Shetty, S. (2021). Simulation for cybersecurity: state of the art and future directions. Journal of Cybersecurity, 7(1), tyab005.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">[36] Chaudhary, S., Gkioulos, V., &amp; Katsikas, S. (2023). A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Computer Science Review, 50, 100592.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">[37] Geluvaraj, B., Satwik, P. M., &amp; Ashok Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 739-747). Springer Singapore.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">[38] Muhammad, G., Pratama, A. R., Shaloom, C., &amp; Cassandra, C. (2023, November). Cybersecurity Awareness Literature Review: A Bibliometric Analysis. In 2023 International Conference on Informatics, Multimedia, Cyber and Informations System (ICIMCIS) (pp. 195-199). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">[39] Allahrakha, N. (2023). Balancing cyber-security and privacy: legal and ethical considerations in the digital age. Legal Issues in the Digital Age, (2), 78-121.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">[40] Štrucl, D. (2022). Comparative study on the cyber defense of NATO Member States. NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE).</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
