Topic recognition and refined evolution path analysis of literature in the field of cybersecurity.
Using text analysis techniques to identify the research topics of the literature in the field of cybersecurity allows us to sort out the evolution of their research topics and reveal their evolution trends. The paper takes the literature from the Web of Science in the field of cybersecurity research...
Saved in:
| Main Authors: | Yanfeng Zhu, Zheng Li, Tianyi Li, Lei Jiang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Public Library of Science (PLoS)
2025-01-01
|
| Series: | PLoS ONE |
| Online Access: | https://doi.org/10.1371/journal.pone.0319201 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Educational modules and research surveys on critical cybersecurity topics
by: Lixin Wang, et al.
Published: (2020-09-01) -
Refining Ethical Reflections in Cybersecurity Policy and Privacy: Insights for Policy Makers
by: Ryma Abassi
Published: (2025-05-01) -
Public-private partnership in the field of cybersecurity
by: S.V. Sieriebriak
Published: (2024-12-01) -
The evolution of mobile cybersecurity regulations in the European Union
by: Teodorescu Cosmin Alexandru, et al.
Published: (2025-03-01) -
From threat to response: Cybersecurity evolution in Albania
by: Klorenta PASHAJ, et al.
Published: (2025-01-01)