Open Access Open Access  Restricted Access Subscription Access

Network Safety Utilizing Web of Science: A Bibliometric Examination

Soumen Chakraborty

Abstract


Post Coronavirus, it is close to 100% sure that most IT/ITES empowered enterprises will saddle the abilities of the cloud to advance remote working society. With associations going on the web, the likelihood of digital assaults will spike dramatically. Hence it is exceptionally significant for all carefully empowered businesses to stay up to date with the latest things, concerns, and on-going examination in the field of network protection. The investigation has been conducted from 1998 to 2020, which is the time covered by the main papers published in the field of digital protection, in order to improve this review. The broad pattern examination has been directed involving bibliometric investigation thinking about different boundaries for examination. The examination involves Web of Science index for information investigation, concentrating on roughly 2184 records to edify the researchers all over the planet. This exploration will help academicians, understudies, and specialists to find out about the improvement of digital protection as an examination field. The analysis has uncovered a positive development in writing. The unexpected development of distributions was viewed as after 2010 with around 300 distributed yearly in the late past. To name a couple, IEEE, Elsevier and Springer were among the most famous distributions for quality papers on digital protection. Nations like the US, UK, Netherlands, Switzerland, Germany, and Canada have contributed altogether to the exploration connected with digital protection.


Keywords


Network protection, bibliometric examination, scient metrics, pattern investigation

Full Text:

PDF

References


Gallagher DM. Move over tickertape, here comes the cyber-exchange: The rise of internet-based securities trading systems. Cath. UL Rev. 1997; 47: 1009.

Bhuyan SS, Kabir UY, Escareno JM, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming healthcare cybersecurity from reactive to proactive: Current status and future recommendations. Journal of Medical Systems. May 2020; 44(98): 1–9.

Chang ES, Jain AK, Slade DM, Tsao SL. Managing cyber security vulnerabilities in large networks. Bell Labs Technical Journal. Oct 1999; 4(4): 252–272.

Sofaer AD, Goodman SE. Cyber crime and security: The transnational dimension. The transnational dimension of cyber crime and terrorism. Stanford: Hoover Press; 2001. pp. 1–34.

Kyle Coffey, Richard Smith, et al. Vulnerability analysis of network scanning on SCADA systems. Security and Communication Networks. Mar 2018; 2018. Available at: https://doi.org/10.1155/2018/3794603.

Rousseau R. Forgotten founder of bibliometrics. Nature. Jun 2014; 510(7504): 218.

Jalali MS, Razak S, Gordon W, Perakslis E, Madnick S. Health care and cybersecurity: Bibliometric analysis of the literature. Journal of Medical Internet Research. Feb 2019; 21(2): e12644.

Cobo MJ, Jürgens B, Herrero-Solana V, Martínez MA, Herrera-Viedma E. Industry 4.0: A perspective based on bibliometric analysis. Procedia Computer Science. Jan 2018;139: 364–371.

Sakhnini J, Karimipour H, Dehghantanha A, Parizi RM, Srivastava G. Security aspects of internet of things aided smart grids: A bibliometric survey. Internet of Things. Jun 2021; 14: 100111.

Gill J, Okere I, Haddad Pajouh H, Dehghantanha A. Mobile forensics: A bibliometric analysis. In: Dehghantanha, A., Conti, M., Dargahi, T. (eds) Cyber Threat Intelligence. Advances in Information Security. vol 70. Springer, Cham. 2018. pp. 297–310. Available at: https://doi.org/10.1007/978-3-319-73951-9_15.

Makawana PR, Jhaveri RH. A bibliometric analysis of recent research on machine learning for cyber security. In: Hu YC, Tiwari S, Mishra K, Trivedi M (eds) Intelligent Communication and Computational Technologies. Proceedings of Internet of Things for Technological Development (IoT4TD). 2018: 213–226.

Van Eck NJ, Waltman L. VOS: A new method for visualizing similarities between objects. Advances in Data Analysis. Proceedings of the 30th Annual Conference of the Gesellschaft für Klassifikation eV, Freie Universität Berlin. 2006. March 8–10. Springer Berlin Heidelberg. 2007. pp. 299–306.

Van Eck N, Waltman L. Software survey: VOS viewer, a computer program for bibliometric mapping. Scientometrics. Aug 2010; 84(2): 523–538.

Waltman L, van Eck NJ. Field-normalized citation impact indicators and the choice of an appropriate counting method. Journal of Informetrics. Oct 2015; 9(4): 872–894.

Guan J, Ma N. A bibliometric study of China's semiconductor literature compared with other major Asian countries. Scientometrics. Jan 2007; 70(1): 107–124.

Subramanyam K. Bibliometric studies of research collaboration: A review. Journal of Information Science. Jan 1983; 6(1): 33–38.

Lawani SM. Quality, collaboration and citations in cancer research: A bibliometric study. The Florida State University; 1980.

Yadav SK, Singh SN, Verma MK. Authorship and collaboration pattern in SRELS journal of information management during 2008-2017: An evaluation. Library Philosophy and Practice. Apr 2019; pp. 1–4.

Ajiferuke I, Burell Q, Tague J. Collaborative coefficient: A single measure of the degree of collaboration in research. Scientometrics. Nov 1988; 14(5–6): 421–433.

Elango B, Rajendran P. Global tribology research output (1998–2012): A macro level scientometric study. Journal of Information Science Theory and Practice. 2015; 3(4): 35–48.

Shukla G, Gochhait S. Cyber security trend analysis using web of science: A bibliometric analysis. Eur J Mol Clin Med. Sep 2020; 7(6): 2567–2576.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Computer Technology & Applications