How Should I Start Research in Cyber Security? Suggestions for Researchers According to Bibliometric Analysis Data

نویسندگان

چکیده

The aim of this study is to discover the research trends in field cyber security with performance analysis and reveal intellectual structure scientific mapping. For purpose, articles published between 1998-2021 WoS database were examined. was carried out accordance bibliometric guide. In data collection phase, 1,631 included by taking into account criteria determined among 15,781 studies using PRISMA procedure. R program used analysis. According findings study, there has been a significant increase article productivity after 2020. Although IEEE Access journal highest number publications field, Transactions on Smart Grid ranks first according h-index g-index values. Considering topics studied years, it seen that issues related law such as cybercrime terrorism examined, recently, addition these, current technological have included. It observed most effective publication 'The Internet Things for Health Care: Comprehensive Survey' Islam et al. which examines health care, also issue.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students

Security research and teaching using cyber-physical systems (e.g., automotive networks) is challenging because of the need to replicate the interactions between the hardware components and the control software of the systems. These interactions are challenging to replicate because of the dynamic inputs in real-world environments that cause various interactions of the hardware components and con...

متن کامل

Data Mining for Cyber Security

This chapter provides an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security. The various components of MINDS such as the scan detector, anomaly detector and the profiling module detect different types of attacks and intrusions on a computer network. The scan detector aims at detecting sc...

متن کامل

how to protect young researchers from research misconduct

سخن سردبیر editorial مجله دانشگاه علوم پزشکی رفسنجان دوره 13، بهمن 1393، 1020-1019       چگونه می توان پژوهشگران جوان را از سوء رفتارهای پژوهشی حفظ نمود   how to protect young researchers from research misconduct    محسن رضائیان[1] m. rezaeian     در سخن سردبیری شماره قبل مجله دانشگاه ]1[، با انواع سوء رفتارهای پژوهشی و طبقه بندی آن ها به تقلب های پژوهشی و رفتارهای پژوهشی ابهام برانگیز آشنا شدی...

متن کامل

How to start a research project

One of the goals of undergraduate education should be the acquisition of a scientific attitude, determined by affective dimensions, and whose traits or characteristics should include: curiosity, objectivity, open-mindedness, flexibility, critical thinking, intellectual honesty, investigative energy, creative daring and social participation. In short, the ‘‘university essence’’: creating and tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sakarya University Journal of Education

سال: 2023

ISSN: ['2146-7455']

DOI: https://doi.org/10.19126/suje.1219710