Abstract
The main purpose of the study is to present a bibliometric overview of the published research within the cybersecurity framework over the recent decade. The study applies bibliometric analysis in order to analyze the most relevant journals, authors, and countries, as well as the most cited papers between 2011 and 2021. We identified activity and relationship indicators about the distribution of articles over time, most-cited journals, and most relevant countries, co-author analysis, and keyword analysis.
Different classifications have been made, including an analysis of the most influential journal, the most cited papers, the most relevant authors, and countries with over 20 publications in the field over the last decade. Also, the analysis identified four leading topics: cybersecurity management, intrusion detection and prevention, smart grids, cybercrime and cyberattacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abeshu, A., & Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine, 56(2), 169–175.
Arora, B. (2016). Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science, 8, 540–542.
Ashok, A., Govindarasu, M., & Wang, J. (2017). Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid. Proceedings of the IEEE, 105(7), 1389–1407.
Atat, R., Liu, L., Wu, J., Li, G., Ye, C., & Yang, Y. (2018). Big data meet cyber-physical systems: A panoramic survey. IEEE Access, 6, 73603–73636.
Benjamin, V., Valacich, J. S., & Chen, H. (2019). DICE-E: A framework for conducting darknet identification, collection, evaluation with ethics. MIS Quarterly, 43(1).
Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317–331.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21.
Cram, W. A., D'arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43(2), 525–554.
Cui, L., Xie, G., Qu, Y., Gao, L., & Yang, Y. (2018). Security and privacy in smart cities: Challenges and opportunities. IEEE Access.
Fernández Maimó, L., Perales Gómez, Á. L., García Clemente, F. J., Gil Pérez, M., & Martínez Pérez, G. (2018). A self-adaptive deep learning-based system for anomaly detection in 5G networks. IEEE Access, 6, 7700–7712.
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet of Things Journal, 6(2), 2188–2204.
Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., & Poolla, K. (2013). Smart grid data integrity attacks. IEEE Transactions on Smart Grid, 4(3), 1244–1253.
Gupta, M., Abdelsalam, M., Khorsandroo, S., & Mittal, S. (2020). Security and privacy in smart farming: Challenges and opportunities. IEEE Access, 8, 34564–34584.
Hashem Eiza, M., & Ni, Q. (2017). Driving with sharks: Rethinking connected vehicles with vehicle cybersecurity. IEEE Vehicular Technology Magazine, 12(2), 45–51.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80.
Laaki, H., Miche, Y., & Tammi, K. (2019). Prototyping a digital twin for real time remote control over mobile networks: Application of remote surgery. IEEE Access, 7, 20325–20336.
Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. M. (2018). A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE Access, 6, 12103–12117.
Marzi, G., Dabić, M., Daim, T., & Garces, E. (2017). Product and process innovation in manufacturing firms: A 30-year bibliometric analysis. Scientometrics, 113(2), 673–704.
Marzi, G., Rialti, R., Dabić, M., & Caputo, A. (2018). A mixed methods bibliometric investigation of the world review of entrepreneurship, management and sustainable development: From qualitative to quantitative data. World Review of Entrepreneurship, Management and Sustainable Development, 14(6), 764–786.
Marzi, G., Ciampi, F., Dalli, D., & Dabic, M. (2021). New product development during the last ten years: The ongoing debate and future avenues. IEEE Transactions on Engineering Management, 68(1), 330–344.
McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A.-R., Maniatakos, M., & Karri, R. (2016). The cybersecurity landscape in industrial control systems. Proceedings of the IEEE, 104(5), 1039–1057.
Michael, K., Kobran, S., Abbas, R., & Hamdoun, S. (2019). Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals. IEEE International Symposium on Technology and Society (ISTAS), 2019, 1–13.
Minoli, D., Sohraby, K., & Occhiogrosso, B. (2017). IoT considerations, requirements, and architectures for smart buildings—energy optimization and next-generation building management systems. IEEE Internet of Things Journal, 4(1), 269–283.
Obradović, T., Vlačić, B., & Dabić, M. (2021). Open innovation in the manufacturing industry: A review and research agenda. Technovation, 102(xxxx).
Petit, J., & Shladover, S. E. (2015). Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546–556.
Sridhar, S., Hahn, A., & Govindarasu, M. (2012). Cyber–physical system security for the electric power grid. Proceedings of the IEEE, 100(1), 210–224.
Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2015). An investigation on cyber security threats and security models. In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (pp. 307–311).
Tian, Z., Cui, Y., An, L., Su, S., Yin, X., Yin, L., & Cui, X. (2018). A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access, 6, 35355–35364.
Uma, M., & Padmavathi, G. (2013). A survey on various cyber attacks and their classification. 7.
van Eck, N. J., & Waltman, L. (2009). A computer program for bibliometric mapping. Science, 84(2), 523–538.
van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538.
van Eck, N. J., Waltman, L., van Den Berg, J., & Kaymak, U. (2006). Visualizing the computational intelligence field. IEEE Computational Intelligence Magazine, 1(4), 6–10.
von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344–1371.
Wei, D., Lu, Y., Jafari, M., Skare, P. M., & Rohde, K. (2011). Protecting smart grid automation systems against cyberattacks. IEEE Transactions on Smart Grid, 2(4), 782–795.
Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H., & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365–35381.
Zhang, Y., Wang, L., Sun, W., Green, R. C., II, & Alam, M. (2011). Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid, 2(4), 796–808.
Zhang, Y., Wang, L., Xiang, Y., & Ten, C.-W. (2015). Power system reliability evaluation with SCADA cybersecurity considerations. IEEE Transactions on Smart Grid, 6(4), 1707–1721.
Zupic, I., & Čater, T. (2015). Bibliometric methods in management and organization. Organizational Research Methods, 18(3), 429–472.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kyrdoda, Y., Marzi, G., Dabić, M., Daim, T.U. (2023). Cybersecurity Technology: An Analysis of the Topic from 2011 to 2021. In: Daim, T.U., Dabić, M. (eds) Cybersecurity. Applied Innovation and Technology Management. Springer, Cham. https://doi.org/10.1007/978-3-031-34843-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-34843-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34842-6
Online ISBN: 978-3-031-34843-3
eBook Packages: Business and ManagementBusiness and Management (R0)