Follow
Gürol Canbek
Gürol Canbek
Pointr, METU, Gazi, Boğaziçi, İTÜ (ASELSAN, HAVELSAN, Inonu, MSB, TAKASBANK, NATO)
Verified email at canbek.com - Homepage
Title
Cited by
Cited by
Year
Çocukların ve Gençlerin Bilgisayar ve İnternet Güvenliği {Computer and Internet Security for Children and Teenagers}
G Canbek, Ş Sağıroğlu
Politeknik Dergisi 10 (1), 33-39, 2007
2202007
Bilgi, Bilgi Güvenliği ve Süreçleri Üzerine Bir İnceleme {A Review on Information, Information Security and Security Processes}
G Canbek, Ş Sağıroğlu
Politeknik Dergisi 9 (3), 165-174, 2006
2182006
Binary classification performance measures/metrics: A comprehensive visualized roadmap to gain new insights
G Canbek, S Sagiroglu, TT Temizel, N Baykal
2017 International Conference on Computer Science and Engineering (UBMK …, 2017
1002017
Keyloggers Increasing Threats to Computer Security and Privacy
S Sagiroglu, G Canbek
IEEE technology and society magazine 28 (3), 10-17, 2009
982009
Kötücül ve Casus Yazılımlar: Kapsamlı bir Araştırma {Malware and Spyware: A Comprehensive Review}
G Canbek, Ş Sağıroğlu
Journal of the Faculty of Engineering and Architecture of Gazi University 22 …, 2007
61*2007
Bilgisayar Sistemlerine Yapılan Saldırılar ve Türleri: Bir İnceleme {Attacks against Computer Systems and Their Types: A Review Study}
G Canbek, Ş Sağıroğlu
Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi 23 (1-2), 1-12, 2007
52*2007
Bilgi ve Bilgisayar Güvenliği: Casus Yazılımlar ve Korunma Yöntemleri {Information and Computer Security: Spyware and safeguarding Methods}
G CANBEK, Ş SAĞIROĞLU
Grafiker Yayıncılık, 2006
44*2006
Analysis, design and implementation of keyloggers and anti-keyloggers
G Canbek
Gazi University, Institute Of Science And Technology, M. Sc. thesis (in …, 2005
41*2005
BenchMetrics: A systematic benchmarking method for binary-classification performance metrics
G Canbek, TT Temizel, S Sagiroglu
262021
New techniques in profiling big datasets for machine learning with a concise review of android mobile malware datasets
G Canbek, S Sagiroglu, TT Temizel
2018 International Congress on Big Data, Deep Learning and Fighting Cyber …, 2018
192018
New comprehensive taxonomies on mobile security and malware analysis
G Canbek, S Sagiroglu, N Baykal
International Journal of Information Security Science 5 (4), 106-138, 2016
162016
Casus Yazılımlar: Bulaşma Yöntemleri ve Önlemler {Spyware: Infection Methods and Preventive Measures}
G Canbek, Ş Sağıroğlu
Journal of the Faculty of Engineering and Architecture of Gazi University 23 …, 2008
16*2008
PToPI: A comprehensive review, analysis, and knowledge representation of binary classification performance measures/metrics
G Canbek, T Taskaya Temizel, S Sagiroglu
SN Computer Science 4 (1), 13, 2022
152022
Gaining insights in datasets in the shade of “garbage in, garbage out” rationale: Feature space distribution fitting
G Canbek
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 12 (3 …, 2022
122022
Clustering and Visualization of Mobile Application Permissions for End Users and Malware Analysts
G Canbek, N Baykal, S Sagiroglu
2017 5th International Symposium on Digital Forensic and Security (ISDFS), 1-10, 2017
122017
Tugba Taskaya Temizel, and Nazife Baykal. 2017. Binary classification performance measures/metrics: A comprehensive visualized roadmap to gain new insights
G Canbek, S Sagiroglu
2017 International Conference on Computer Science and Engineering (UBMK …, 0
10
Cyber security by a new analogy:“the allegory of the ‘mobile’cave”
G Canbek
Journal of Applied Security Research 13 (1), 63-88, 2018
82018
Şifre Bilimi Tarihine Genel Bakış-I
G Canbek, Ş Şağıroğlu
Türk Telekom Dergisi, Mayıs, 34-42, 2005
62005
Strategic cyber-security perspective in smart grids
G Canbek, S Sagiroglu
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2018
42018
Gaining new insight into machine-learning datasets via multiple binary-feature frequency ranks with a mobile benign/malware apps example
G Canbek
Hittite Journal of Science and Engineering 8, 103 - 121, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20