{"title":"网络安全与密码学:威胁、障碍和解决方案--文献计量分析","authors":"Purushottam Singh, Sandip Dutta, Prashant Pranav","doi":"10.2174/0126662558280232231213053002","DOIUrl":null,"url":null,"abstract":"\n\nIn the wake of escalating cyber threats and the indispensability of robust\nnetwork security mechanisms, it becomes crucial to understand the evolving landscape of\ncryptographic research. Recognizing the significant contributions and discerning emerging\ntrends can guide future strategies and technological advancements. Our study endeavors to\nshed light on this through a bibliometric analysis of publications in the realms of Network Security\nand Cryptography.\n\n\n\nTo chronicle and synthesize the progression of research methodologies from their inception\nto the present day, we undertook a comprehensive Bibliometric Analysis of Network\nSecurity and Cryptography. Our data set was culled from the Clarivate Analytics Web of Science\nDatabase, encompassing 3,897 papers, 603 sources, and 7,886 authors from across the\nglobe.\n\n\n\nOur analysis revealed a marked upsurge in cryptographic research since 1992, with\nChina standing out as a dominant contributor in terms of publications. Notably, while 'security'\nand 'cryptography' emerged as recurrent research themes, there's an observable downtrend in\ninternational collaborations. Our study also highlights pivotal topics shaping the network security\ndomain, offering insights into the trajectories of research source growth, structural variabilities\nin research relevance, and prospective intellectual and collaborative avenues as guided by\nauthorship patterns.\n\n\n\nCryptographic research is on an upward trajectory, both in volume and significance.\nHowever, the tapering of international collaborations and an evident need to concentrate\non emergent challenges, such as data privacy and innovative network attacks, emerge as notable\ninsights. This bibliometric review serves as a compass, directing researchers and academicians\ntowards areas warranting heightened attention, thereby informing the roadmap for future\ninvestigative pursuits.\n","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":"118 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis\",\"authors\":\"Purushottam Singh, Sandip Dutta, Prashant Pranav\",\"doi\":\"10.2174/0126662558280232231213053002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n\\nIn the wake of escalating cyber threats and the indispensability of robust\\nnetwork security mechanisms, it becomes crucial to understand the evolving landscape of\\ncryptographic research. Recognizing the significant contributions and discerning emerging\\ntrends can guide future strategies and technological advancements. Our study endeavors to\\nshed light on this through a bibliometric analysis of publications in the realms of Network Security\\nand Cryptography.\\n\\n\\n\\nTo chronicle and synthesize the progression of research methodologies from their inception\\nto the present day, we undertook a comprehensive Bibliometric Analysis of Network\\nSecurity and Cryptography. Our data set was culled from the Clarivate Analytics Web of Science\\nDatabase, encompassing 3,897 papers, 603 sources, and 7,886 authors from across the\\nglobe.\\n\\n\\n\\nOur analysis revealed a marked upsurge in cryptographic research since 1992, with\\nChina standing out as a dominant contributor in terms of publications. Notably, while 'security'\\nand 'cryptography' emerged as recurrent research themes, there's an observable downtrend in\\ninternational collaborations. Our study also highlights pivotal topics shaping the network security\\ndomain, offering insights into the trajectories of research source growth, structural variabilities\\nin research relevance, and prospective intellectual and collaborative avenues as guided by\\nauthorship patterns.\\n\\n\\n\\nCryptographic research is on an upward trajectory, both in volume and significance.\\nHowever, the tapering of international collaborations and an evident need to concentrate\\non emergent challenges, such as data privacy and innovative network attacks, emerge as notable\\ninsights. This bibliometric review serves as a compass, directing researchers and academicians\\ntowards areas warranting heightened attention, thereby informing the roadmap for future\\ninvestigative pursuits.\\n\",\"PeriodicalId\":36514,\"journal\":{\"name\":\"Recent Advances in Computer Science and Communications\",\"volume\":\"118 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Recent Advances in Computer Science and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2174/0126662558280232231213053002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Advances in Computer Science and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/0126662558280232231213053002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
摘要
随着网络威胁的不断升级和强大的网络安全机制的不可或缺,了解密码学研究的发展态势变得至关重要。认识重大贡献和辨别新兴趋势可以指导未来战略和技术进步。我们的研究通过对网络安全和密码学领域的出版物进行文献计量分析,试图揭示这一问题。为了记录和总结研究方法从诞生到今天的发展历程,我们对网络安全和密码学进行了全面的文献计量分析。我们的数据集摘自 Clarivate Analytics Web of Science 数据库,其中包括来自全球的 3,897 篇论文、603 个来源和 7,886 位作者。值得注意的是,虽然 "安全 "和 "密码学 "是经常出现的研究主题,但在国际合作方面却出现了明显的下降趋势。我们的研究还突出了影响网络安全领域的关键主题,深入探讨了研究来源的增长轨迹、研究相关性的结构性变化,以及由作者模式引导的未来知识和合作途径。本文献计量学综述可作为指南针,将研究人员和学者引向值得高度关注的领域,从而为未来的研究工作提供参考。
Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis
In the wake of escalating cyber threats and the indispensability of robust
network security mechanisms, it becomes crucial to understand the evolving landscape of
cryptographic research. Recognizing the significant contributions and discerning emerging
trends can guide future strategies and technological advancements. Our study endeavors to
shed light on this through a bibliometric analysis of publications in the realms of Network Security
and Cryptography.
To chronicle and synthesize the progression of research methodologies from their inception
to the present day, we undertook a comprehensive Bibliometric Analysis of Network
Security and Cryptography. Our data set was culled from the Clarivate Analytics Web of Science
Database, encompassing 3,897 papers, 603 sources, and 7,886 authors from across the
globe.
Our analysis revealed a marked upsurge in cryptographic research since 1992, with
China standing out as a dominant contributor in terms of publications. Notably, while 'security'
and 'cryptography' emerged as recurrent research themes, there's an observable downtrend in
international collaborations. Our study also highlights pivotal topics shaping the network security
domain, offering insights into the trajectories of research source growth, structural variabilities
in research relevance, and prospective intellectual and collaborative avenues as guided by
authorship patterns.
Cryptographic research is on an upward trajectory, both in volume and significance.
However, the tapering of international collaborations and an evident need to concentrate
on emergent challenges, such as data privacy and innovative network attacks, emerge as notable
insights. This bibliometric review serves as a compass, directing researchers and academicians
towards areas warranting heightened attention, thereby informing the roadmap for future
investigative pursuits.