Bilgi, Bilgi Güvenliği ve Süreçleri Üzerine Bir İnceleme {A Review on Information, Information Security and Security Processes} G Canbek, Ş Sağıroğlu Politeknik Dergisi 9 (3), 165-174, 2006 | 232 | 2006 |
Çocukların ve Gençlerin Bilgisayar ve İnternet Güvenliği {Computer and Internet Security for Children and Teenagers} G Canbek, Ş Sağıroğlu Politeknik Dergisi 10 (1), 33-39, 2007 | 228 | 2007 |
Binary classification performance measures/metrics: A comprehensive visualized roadmap to gain new insights G Canbek, S Sagiroglu, TT Temizel, N Baykal 2017 International Conference on Computer Science and Engineering (UBMK …, 2017 | 133 | 2017 |
Keyloggers Increasing Threats to Computer Security and Privacy S Sagiroglu, G Canbek IEEE technology and society magazine 28 (3), 10-17, 2009 | 106 | 2009 |
Kötücül ve Casus Yazılımlar: Kapsamlı bir Araştırma {Malware and Spyware: A Comprehensive Review} G Canbek, Ş Sağıroğlu Journal of the Faculty of Engineering and Architecture of Gazi University 22 …, 2007 | 64* | 2007 |
Bilgisayar Sistemlerine Yapılan Saldırılar ve Türleri: Bir İnceleme {Attacks against Computer Systems and Their Types: A Review Study} G Canbek, Ş Sağıroğlu Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi 23 (1-2), 1-12, 2007 | 58* | 2007 |
Bilgi ve Bilgisayar Güvenliği: Casus Yazılımlar ve Korunma Yöntemleri {Information and Computer Security: Spyware and safeguarding Methods} G CANBEK, Ş SAĞIROĞLU Grafiker Yayıncılık, 2006 | 49* | 2006 |
Analysis, design and implementation of keyloggers and anti-keyloggers G Canbek Gazi University, Institute Of Science And Technology, M. Sc. thesis (in …, 2005 | 44* | 2005 |
BenchMetrics: A systematic benchmarking method for binary-classification performance metrics G Canbek, TT Temizel, S Sagiroglu | 37 | 2021 |
PToPI: A comprehensive review, analysis, and knowledge representation of binary classification performance measures/metrics G Canbek, T Taskaya Temizel, S Sagiroglu SN Computer Science 4 (1), 13, 2022 | 24 | 2022 |
New techniques in profiling big datasets for machine learning with a concise review of android mobile malware datasets G Canbek, S Sagiroglu, TT Temizel 2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018 | 20 | 2018 |
New comprehensive taxonomies on mobile security and malware analysis G Canbek, S Sagiroglu, N Baykal International Journal of Information Security Science 5 (4), 106-138, 2016 | 17 | 2016 |
Casus Yazılımlar: Bulaşma Yöntemleri ve Önlemler {Spyware: Infection Methods and Preventive Measures} G Canbek, Ş Sağıroğlu Journal of the Faculty of Engineering and Architecture of Gazi University 23 …, 2008 | 15* | 2008 |
Gaining insights in datasets in the shade of “garbage in, garbage out” rationale: Feature space distribution fitting G Canbek Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 12 (3 …, 2022 | 12 | 2022 |
Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts G Canbek, N Baykal, S Sagiroglu 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 1-10, 2017 | 12 | 2017 |
Cyber security by a new analogy:“the allegory of the ‘mobile’cave” G Canbek Journal of Applied Security Research 13 (1), 63-88, 2018 | 8 | 2018 |
Şifre Bilimi Tarihine Genel Bakış-I G Canbek, Ş Şağıroğlu Türk Telekom Dergisi, Mayıs, 34-42, 2005 | 6 | 2005 |
Strategic cyber-security perspective in smart grids G Canbek, S Sagiroglu 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2018 | 4 | 2018 |
Gaining new insight into machine-learning datasets via multiple binary-feature frequency ranks with a mobile benign/malware apps example G Canbek Hittite Journal of Science and Engineering 8, 103 - 121, 2021 | 3 | 2021 |
Kötücül ve Casus Yazılımlara Karşı Elektronik İmzanın Sağlamış Olduğu Korunma Düzeyi {The Level of Protection of E-Signature against Malware and Spyware} G Canbek, Ş Sağıroğlu Information Security & Cyryptology Conference (ISCTurkey), 263-269, 2007 | 3* | 2007 |