Topic recognition and refined evolution path analysis of literature in the field of cybersecurity.

Saved in:
Bibliographic Details
Title: Topic recognition and refined evolution path analysis of literature in the field of cybersecurity.
Authors: Zhu, Yanfeng, Li, Zheng, Li, Tianyi, Jiang, Lei
Source: PLoS ONE; 2/21/2025, Vol. 20 Issue 2, p1-26, 26p
Subject Terms: PATH analysis (Statistics), INTERNET security, DYNAMIC models, RESEARCH methodology, COMPARATIVE studies
Abstract: Using text analysis techniques to identify the research topics of the literature in the field of cybersecurity allows us to sort out the evolution of their research topics and reveal their evolution trends. The paper takes the literature from the Web of Science in the field of cybersecurity research from 2003 to 2022 as its research subject, dividing it into ten stages. It then integrates LDA and Word2vec methods for topic recognition and topic evolution analysis. The combined LDA2vec model can better reflect the correlation and evolution patterns between adjacent stage topics, thereby accurately identifying topic features and constructing topic evolution paths. Furthermore, to comprehensively evaluate the effectiveness of the LDA model in topic evolution analysis, this paper introduces the Dynamic Topic Model (DTM) for comparative analysis. The results indicate that the LDA model demonstrates higher applicability and clarity in topic extraction and evolution path depiction. In the aspect of topic content evolution, research topics within the field of cybersecurity exhibit characteristics of complexity and diversity, with some topics even displaying notable instances of backtracking. Meanwhile, within the realm of cybersecurity, there exists a dynamic equilibrium between technological developments and security threats. [ABSTRACT FROM AUTHOR]
Copyright of PLoS ONE is the property of Public Library of Science and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?cmd=search&db=pmc&term=1932-6203[TA]+AND+1[PG]+AND+2025[PDAT]
    Name: FREE - PubMed Central (ISSN based link)
    Category: fullText
    Text: Full Text
    Icon: https://imageserver.ebscohost.com/NetImages/iconPdf.gif
    MouseOverText: Check this PubMed for the article full text.
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=19326203&ISBN=&volume=20&issue=2&date=20250221&spage=1&pages=1-26&title=PLoS ONE&atitle=Topic%20recognition%20and%20refined%20evolution%20path%20analysis%20of%20literature%20in%20the%20field%20of%20cybersecurity.&aulast=Zhu%2C%20Yanfeng&id=DOI:10.1371/journal.pone.0319201
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Zhu%20Y
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 183201878
RelevancyScore: 1023
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 1023.06817626953
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Topic recognition and refined evolution path analysis of literature in the field of cybersecurity.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Zhu%2C+Yanfeng%22">Zhu, Yanfeng</searchLink><br /><searchLink fieldCode="AR" term="%22Li%2C+Zheng%22">Li, Zheng</searchLink><br /><searchLink fieldCode="AR" term="%22Li%2C+Tianyi%22">Li, Tianyi</searchLink><br /><searchLink fieldCode="AR" term="%22Jiang%2C+Lei%22">Jiang, Lei</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: PLoS ONE; 2/21/2025, Vol. 20 Issue 2, p1-26, 26p
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22PATH+analysis+%28Statistics%29%22">PATH analysis (Statistics)</searchLink><br /><searchLink fieldCode="DE" term="%22INTERNET+security%22">INTERNET security</searchLink><br /><searchLink fieldCode="DE" term="%22DYNAMIC+models%22">DYNAMIC models</searchLink><br /><searchLink fieldCode="DE" term="%22RESEARCH+methodology%22">RESEARCH methodology</searchLink><br /><searchLink fieldCode="DE" term="%22COMPARATIVE+studies%22">COMPARATIVE studies</searchLink>
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: Using text analysis techniques to identify the research topics of the literature in the field of cybersecurity allows us to sort out the evolution of their research topics and reveal their evolution trends. The paper takes the literature from the Web of Science in the field of cybersecurity research from 2003 to 2022 as its research subject, dividing it into ten stages. It then integrates LDA and Word2vec methods for topic recognition and topic evolution analysis. The combined LDA2vec model can better reflect the correlation and evolution patterns between adjacent stage topics, thereby accurately identifying topic features and constructing topic evolution paths. Furthermore, to comprehensively evaluate the effectiveness of the LDA model in topic evolution analysis, this paper introduces the Dynamic Topic Model (DTM) for comparative analysis. The results indicate that the LDA model demonstrates higher applicability and clarity in topic extraction and evolution path depiction. In the aspect of topic content evolution, research topics within the field of cybersecurity exhibit characteristics of complexity and diversity, with some topics even displaying notable instances of backtracking. Meanwhile, within the realm of cybersecurity, there exists a dynamic equilibrium between technological developments and security threats. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of PLoS ONE is the property of Public Library of Science and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=183201878
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1371/journal.pone.0319201
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 26
        StartPage: 1
    Subjects:
      – SubjectFull: PATH analysis (Statistics)
        Type: general
      – SubjectFull: INTERNET security
        Type: general
      – SubjectFull: DYNAMIC models
        Type: general
      – SubjectFull: RESEARCH methodology
        Type: general
      – SubjectFull: COMPARATIVE studies
        Type: general
    Titles:
      – TitleFull: Topic recognition and refined evolution path analysis of literature in the field of cybersecurity.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Zhu, Yanfeng
      – PersonEntity:
          Name:
            NameFull: Li, Zheng
      – PersonEntity:
          Name:
            NameFull: Li, Tianyi
      – PersonEntity:
          Name:
            NameFull: Jiang, Lei
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 21
              M: 02
              Text: 2/21/2025
              Type: published
              Y: 2025
          Identifiers:
            – Type: issn-print
              Value: 19326203
          Numbering:
            – Type: volume
              Value: 20
            – Type: issue
              Value: 2
          Titles:
            – TitleFull: PLoS ONE
              Type: main
ResultId 1