Topic recognition and refined evolution path analysis of literature in the field of cybersecurity.
Saved in:
| Title: | Topic recognition and refined evolution path analysis of literature in the field of cybersecurity. |
|---|---|
| Authors: | Zhu, Yanfeng, Li, Zheng, Li, Tianyi, Jiang, Lei |
| Source: | PLoS ONE; 2/21/2025, Vol. 20 Issue 2, p1-26, 26p |
| Subject Terms: | PATH analysis (Statistics), INTERNET security, DYNAMIC models, RESEARCH methodology, COMPARATIVE studies |
| Abstract: | Using text analysis techniques to identify the research topics of the literature in the field of cybersecurity allows us to sort out the evolution of their research topics and reveal their evolution trends. The paper takes the literature from the Web of Science in the field of cybersecurity research from 2003 to 2022 as its research subject, dividing it into ten stages. It then integrates LDA and Word2vec methods for topic recognition and topic evolution analysis. The combined LDA2vec model can better reflect the correlation and evolution patterns between adjacent stage topics, thereby accurately identifying topic features and constructing topic evolution paths. Furthermore, to comprehensively evaluate the effectiveness of the LDA model in topic evolution analysis, this paper introduces the Dynamic Topic Model (DTM) for comparative analysis. The results indicate that the LDA model demonstrates higher applicability and clarity in topic extraction and evolution path depiction. In the aspect of topic content evolution, research topics within the field of cybersecurity exhibit characteristics of complexity and diversity, with some topics even displaying notable instances of backtracking. Meanwhile, within the realm of cybersecurity, there exists a dynamic equilibrium between technological developments and security threats. [ABSTRACT FROM AUTHOR] |
| Copyright of PLoS ONE is the property of Public Library of Science and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=search&db=pmc&term=1932-6203[TA]+AND+1[PG]+AND+2025[PDAT] Name: FREE - PubMed Central (ISSN based link) Category: fullText Text: Full Text Icon: https://imageserver.ebscohost.com/NetImages/iconPdf.gif MouseOverText: Check this PubMed for the article full text. – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=19326203&ISBN=&volume=20&issue=2&date=20250221&spage=1&pages=1-26&title=PLoS ONE&atitle=Topic%20recognition%20and%20refined%20evolution%20path%20analysis%20of%20literature%20in%20the%20field%20of%20cybersecurity.&aulast=Zhu%2C%20Yanfeng&id=DOI:10.1371/journal.pone.0319201 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Zhu%20Y Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 183201878 RelevancyScore: 1023 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 1023.06817626953 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Topic recognition and refined evolution path analysis of literature in the field of cybersecurity. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Zhu%2C+Yanfeng%22">Zhu, Yanfeng</searchLink><br /><searchLink fieldCode="AR" term="%22Li%2C+Zheng%22">Li, Zheng</searchLink><br /><searchLink fieldCode="AR" term="%22Li%2C+Tianyi%22">Li, Tianyi</searchLink><br /><searchLink fieldCode="AR" term="%22Jiang%2C+Lei%22">Jiang, Lei</searchLink> – Name: TitleSource Label: Source Group: Src Data: PLoS ONE; 2/21/2025, Vol. 20 Issue 2, p1-26, 26p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22PATH+analysis+%28Statistics%29%22">PATH analysis (Statistics)</searchLink><br /><searchLink fieldCode="DE" term="%22INTERNET+security%22">INTERNET security</searchLink><br /><searchLink fieldCode="DE" term="%22DYNAMIC+models%22">DYNAMIC models</searchLink><br /><searchLink fieldCode="DE" term="%22RESEARCH+methodology%22">RESEARCH methodology</searchLink><br /><searchLink fieldCode="DE" term="%22COMPARATIVE+studies%22">COMPARATIVE studies</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: Using text analysis techniques to identify the research topics of the literature in the field of cybersecurity allows us to sort out the evolution of their research topics and reveal their evolution trends. The paper takes the literature from the Web of Science in the field of cybersecurity research from 2003 to 2022 as its research subject, dividing it into ten stages. It then integrates LDA and Word2vec methods for topic recognition and topic evolution analysis. The combined LDA2vec model can better reflect the correlation and evolution patterns between adjacent stage topics, thereby accurately identifying topic features and constructing topic evolution paths. Furthermore, to comprehensively evaluate the effectiveness of the LDA model in topic evolution analysis, this paper introduces the Dynamic Topic Model (DTM) for comparative analysis. The results indicate that the LDA model demonstrates higher applicability and clarity in topic extraction and evolution path depiction. In the aspect of topic content evolution, research topics within the field of cybersecurity exhibit characteristics of complexity and diversity, with some topics even displaying notable instances of backtracking. Meanwhile, within the realm of cybersecurity, there exists a dynamic equilibrium between technological developments and security threats. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of PLoS ONE is the property of Public Library of Science and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=183201878 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1371/journal.pone.0319201 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 26 StartPage: 1 Subjects: – SubjectFull: PATH analysis (Statistics) Type: general – SubjectFull: INTERNET security Type: general – SubjectFull: DYNAMIC models Type: general – SubjectFull: RESEARCH methodology Type: general – SubjectFull: COMPARATIVE studies Type: general Titles: – TitleFull: Topic recognition and refined evolution path analysis of literature in the field of cybersecurity. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Zhu, Yanfeng – PersonEntity: Name: NameFull: Li, Zheng – PersonEntity: Name: NameFull: Li, Tianyi – PersonEntity: Name: NameFull: Jiang, Lei IsPartOfRelationships: – BibEntity: Dates: – D: 21 M: 02 Text: 2/21/2025 Type: published Y: 2025 Identifiers: – Type: issn-print Value: 19326203 Numbering: – Type: volume Value: 20 – Type: issue Value: 2 Titles: – TitleFull: PLoS ONE Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science