Research Communities in cyber security: A Comprehensive Literature Review

by   Sotirios Katsikeas, et al.

In order to provide a coherent overview of cyber security research, the Scopus academic abstract and citation database was mined to create a citation graph of 98,373 authors active in the field between 1949 and early 2020. The Louvain community detection algorithm was applied to the graph in order to identify existing research communities. The analysis discovered twelve top-level communities: access control, authentication, biometrics, cryptography (I II), cyber-physical systems, information hiding, intrusion detection, malwares, quantum cryptography, sensor networks, and usable security. These top-level communities were in turn composed of a total of 80 sub-communities. The analysis results are presented for each community in descriptive text, sub-community graphs, and tables with, for example, the most-cited papers and authors. A comparison between the detected communities and topical areas defined by other related work, is also presented, demonstrating a greater researcher emphasis on cryptography, quantum cryptography, information hiding and biometrics, at the expense of laws and regulation, risk management and governance, and security software lifecycle.




Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has been promoted by digital curr...

Cyber-Physical Defense in the Quantum Era

Networked-Control Systems (NCSs), a type of cyber-physical systems, cons...

Developmental tendencies in the Academic Field of Intellectual Property through the Identification of Invisible Colleges

The emergence of intellectual property as an academic issue opens a big ...

Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems

Android-based devices like smartphones have become ideal mobile cyber-ph...

Center-Periphery Structure in Communities: Extracellular Vesicles

Clustering and community detection in networks are of broad interest and...

A Holistic Approach to Evaluating Cyber Security Defensive Capabilities

Metrics and frameworks to quantifiably assess security measures have ari...

On the relationship between the structural and socioacademic communities of a coauthorship network

This article presents a study that compares detected structural communit...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.