当前位置: X-MOL 学术World Patent Information › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Exploring cybertechnology standards through bibliometrics: Case of National Institute of Standards and Technology
World Patent Information Pub Date : 2024-04-20 , DOI: 10.1016/j.wpi.2024.102278
Tugrul Daim , Haydar Yalcin , Alain Mermoud , Valentin Mulder

Cyber security is one of the topics that gain importance today. It is necessary to determine the basic components, basic dynamics, and main actors of the Cyber security issue, which is obvious that it will have an impact in many areas from social, social, economic, environmental, and political aspects, as a hot research topic. When the subject literature is examined, it has become a trend-forming research subject followed by institutions and organizations that produce R&D policy, starting from the level of governments. In this study, cybersecurity research is examined in the context of 5 basic cyber security functions specified in the cyber security standard (CSF) defined by the National Institute of Standards and Technology (NIST). It is aimed to determine the research topics emerging in the international literature, to identify the most productive countries, to determine the rankings created by these countries according to their functions, to determine the research clusters and research focuses. In the study, several quantitative methods were used, especially scientometrics, social network analysis (SNA) line theory and structural hole analysis. Statistical tests (Log-Likelihood Ratio) were used to reveal the prominent areas, and the text mining method was also used. we first defined a workflow according to the “Identify”, “Protect”, “Detect”, “Respond” and “Recover” setups, and conducted an online search on the Web of Science (WoS) to access the information on the publications on the relevant topics It is seen that actors, institutions and research create different densities according to various geographical regions in the 5 functions defined within the framework of cybersecurity. It is possible to say that infiltration detection, the internet of things and the concept of artificial intelligence are among the other prominent research focuses, although it is seen that smart grids are among the most prominent research topics. In the first clustering analysis we performed, we can say that 17 clusters are formed, especially when we look under the definition function. The largest of these clusters has 32 data points, so-called "decision making models".

中文翻译:

通过文献计量学探索网络技术标准:美国国家标准技术研究院案例

网络安全是当今日益重要的主题之一。确定网络安全问题的基本构成、基本动力和主要行为体,显然它将从社会、社会、经济、环境、政治等多个领域产生影响,成为研究热点。话题。当审视该主题文献时,它已成为从政府层面开始制定研发政策的机构和组织所追随的趋势研究主题。在本研究中,网络安全研究在美国国家标准与技术研究院 (NIST) 定义的网络安全标准 (CSF) 中指定的 5 种基本网络安全功能的背景下进行了检验。其目的是确定国际文献中出现的研究主题,确定生产力最高的国家,确定这些国家根据其功能进行的排名,确定研究集群和研究重点。研究中使用了多种定量方法,特别是科学计量学、社会网络分析(SNA)线理论和结构洞分析。使用统计测试(对数似然比)来揭示突出区域,并使用文本挖掘方法。我们首先根据“识别”、“保护”、“检测”、“响应”和“恢复”设置定义了工作流程,并在 Web of Science (WoS) 上进行了在线搜索以访问有关出版物的信息相关主题 可以看出,参与者、机构和研究根据网络安全框架内定义的 5 种功能中的不同地理区域创建了不同的密度。可以说,渗透检测、物联网和人工智能概念是其他突出的研究热点,尽管智能电网是最突出的研究主题之一。在我们执行的第一次聚类分析中,我们可以说形成了 17 个聚类,特别是当我们查看定义函数时。这些集群中最大的有 32 个数据点,即所谓的“决策模型”。
更新日期:2024-04-20
down
wechat
bug