Next Article in Journal
Transient Controller Design Based on Reinforcement Learning for a Turbofan Engine with Actuator Dynamics
Previous Article in Journal
A Study of Continuous Dependence and Symmetric Properties of Double Diffusive Convection: Forchheimer Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields

1
Department of Computer Engineering, University of Anyang, Anyang-si 14058, Korea
2
Department of Software, University of Anyang, Anyang-si 14058, Korea
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(4), 683; https://doi.org/10.3390/sym14040683
Submission received: 25 February 2022 / Revised: 18 March 2022 / Accepted: 21 March 2022 / Published: 25 March 2022

Abstract

:
Recently, as core technologies leading the fourth industrial revolution, such as the Internet of Things (IoT), 5G, the cloud, and big data, have promoted smart convergence across national socio-economic infrastructures, cyber systems are expanding and becoming complex, and they are not effective in responding to cyber safety risks and threats using security technology solutions limited to a single system. Therefore, we developed cyber security technology that combines machine learning and AI technology to solve complex problems related to cyber safety. In this regard, this study aims to identify technology development trends to prevent the risks and threats of various cyber systems by monitoring major cyber security convergence fields and technologies through the symmetrical thesis and patent analysis. Because thesis information can explain the superiority of technology and patent information can explain the usefulness of a technology, they can be effectively used for analyzing and predicting technology development trends. Therefore, in this study, latent Dirichlet allocation is applied to extract text-document-based technical topics for the symmetrical thesis and patent information to identify security convergence fields and technologies for cyber safety. In addition, it elucidates cyber security convergence fields and technology trends by applying a dynamic topic model and long short-term memory, which are useful for analyzing technological changes and predicting trends. Based on these results, cyber security administrators, system operators, and developers can effectively identify and respond to trends in related technologies to reduce threats, and companies and experts developing cyber security solutions can present a new security approach.

1. Introduction

The scale of cyber systems is increasing as cyberspace in various fields has rapidly converged, owing to the practical use of innovative technologies that lead the fourth industrial revolution such as IoT, cloud computing, big data, 5G, robots, and drones based on artificial intelligence. Accordingly, as various advanced technologies converge to cyber systems, dangerous fields and factors that cause serious security threats as well as conditions and actions have become extremely complex [1].
It is not effective to minimize cyber safety risks using conventional security technology approaches that focus on specific security issues in individual cyber systems or sectors [2]. It is crucial to focus on the common cyber safety issues shared by cyber sectors and systems across industries [3].
Therefore, cyber safety management, which reduces major risk factors by achieving security technology convergence in the core field of the fourth industrial revolution, has been emphasized [4]. Recently, an integrated security solution that can solve these complex cyber security problems has been developed [5,6,7,8,9,10,11].
With the development of the fourth industrial revolution, the era of “super-connection” has arrived, in which information technology (IT), physical (physical), manufacturing operation (OT), and Internet of Things (IoT) systems, which were previously operated in different networks, are connected to each other. Although the core technologies that led to the fourth industrial revolution, such as IoT, big data, artificial intelligence, and cloud computing, are advancing our lives, the scope of cyber threats is gradually expanding and increasing, and attacks that cross different industries or systems occur every year [12,13,14,15]. Therefore, a new security paradigm is required to respond to such complex threats.
Cyber security, such as information security, aims to ensure confidentiality, integrity, and availability [16]. The types of attacks that threaten cyber security goals continue to evolve as technology advances, causing significant problems in our lives, and they will have a greater impact in the future. To solve this problem, international standards related to cyber security and research on various cyber security technologies are in progress [17,18,19]. International standards related to cyber security are being established based on the ISO/IEC 27000 series, known as information security management systems. ISO/IEC 27000, and related organized information is shown in Table 1.
ISO/IEC 27100 [20] contains general concepts on cyber security and definitions related to cyber security used in various standards, and ISO/IEC 27101 [21] contains guidelines for developing and implementing cyber security frameworks in organizations. ISO/IEC 27102 [22] includes guidelines for introducing cyber insurance as a measure for managing the impact of cyber incidents within an organization, and ISO/IEC 27103 [23] contains information on how organizations can systematically manage cyber security by utilizing cyber security frameworks based on information security standards.
ISO/IEC 27032 [24] contains an overview of cyber security, relationships between cyber security and other types of security, definitions of stakeholders and roles in cyber security, as well as guidelines for addressing general cyber security issues. These standards prevent unintended cyber risks and eliminate threats based on technical and engineering solutions [25]. Therefore, understanding technology convergence enables cyber security technicians and administrators to plan, develop, and maintain cyber security systems according to various standards [26].
Checkpoint, the world’s largest security solution company, based on the changes in cyber security incidents over the past decade by era, as shown in Figure 1, with the WannaCry attack that occurred in April 2017 as a boundary, is predicted as the process of transitioning from the time period to the fifth-generation security period [27]. The development of next-generation security technology can form the core of next-generation technology development to respond to mega-attacks against vulnerabilities in hyperconnected IT systems in real time. The implementation of the concept of zero trust or SOAR, which goes through an ID verification process before granting access rights to all objects that want to access the system, will become the center of the development of the fifth generation of cyber security technology.
Despite the importance of these cyber security standards and technological improvements, most previous studies have been limited to the development of individual security technology solutions by security technology experts or technology improvements related to the security management tasks of system administrators [28,29]. Conversely, various studies have been trying to identify research trends in cyber security technology based on empirical analysis of academic papers, patents, and technical reports [30,31]. However, the perspective of policy and management in terms of technological innovation for monitoring cyber security convergence fields and technology has not been sufficiently considered in academia and practice in the field of cyber security. To design a cyber system by predicting the requirements of cyber security convergence fields and technologies, research to understand the important trends in cyber security convergence fields and technologies is essential [32,33]. By identifying key cyber security convergence areas and technologies, policymakers can plan a holistic roadmap for related industries and cyber security [34,35]. In addition, monitoring technology trends in the field of cyber security enables cyber security managers, system operators, and developers to introduce effective and useful technologies for the development or operation of reliable and robust cyber systems.
Therefore, this study aims to monitor the main fields of cyber security technology and identify the convergence fields for its development. This objective can be achieved by analyzing papers and patents. Papers contain experimentally proven knowledge and skills, whereas patents contain practical technologies based on scientific principles; therefore, it is more efficient for meaningful empirical analysis [36,37]. Thus, the analysis of papers and patents is a useful way to provide an overview of the novelty and innovativeness of various technologies in the field of cyber security.
This study extracts and analyzes major keywords in cyber security convergence fields and technologies by focusing on probabilistic topic model techniques based on text analysis of papers and patents. Therefore, this study applies a systematic approach to applying these three techniques. First, the main topics and key keywords were extracted from papers and patents using the latent Dirichlet allocation (LDA) algorithm, which can estimate both the distribution of keywords by topic and the distribution of topics by document [38,39]. The extracted topic identifies the cyber security field composed of related technology keywords and derives the cyber security convergence field based on the connected keywords for each field. These results provide information that can be used to identify threats and risks in the new cyber security field.
Second, we analyze changes in cyber security convergence fields and technologies using the dynamic topic model (DTM) algorithm, which can analyze the changes in topics according to time series [40,41]. By monitoring the trends in the cyber security field and convergence field over time, the continuity of the convergence, new convergence, and non-convergence fields are extracted. These results can provide a clear overview of technological progress in cyber security as well as help researchers and practitioners examine emerging cyber security technologies and convergence issues.
Third, we predict trends in cyber security convergence fields and technologies using the long short-term memory (LSTM) algorithm, which can predict future data by considering not only previous data but also macroscopic past data [42,43]. The future development trend of the cyber security convergence field and technology is predicted based on the analysis of changes in the cyber security field and technology using the keywords connected by each cyber security convergence field. Additionally, we predicted the degree of binding and aggregation of the convergence field. These results suggest a novel security approach in cyber security and, in the long term, provide evidence for planning a technology roadmap.
The remainder of this paper is organized as follows: In the Introduction, the background of this study and the importance of identification and prediction of cyber security technology and convergence fields were mentioned. Additionally, three core research approaches based on deep learning were introduced. In Section 2, we examine ICT strategic and cyber security technology trends to derive cyber security technology convergence fields, cyber security keywords, and security areas. In addition, the contributions, discussion, and insights of this study are emphasized. Section 3 introduces the data collection method used in this study, and the cyber security technology and deep learning algorithms for convergence identification and prediction are described in detail. Section 4 describes the processed experimental data in detail and explains the recent cyber security trend analysis, cyber security keyword extraction, and domain identification analysis processes based on deep learning. In addition, trends in the convergence field were analyzed based on the extracted keywords and areas. Section 5 analyzes and predicts trends in the cyber security convergence area by extracting connection keyword information through in-depth analysis of the cyber security convergence area and applying it to a deep learning algorithm. Finally, the insights and limitations of this study and future research directions are presented in the conclusion.

2. Cyber Security Technology Convergence

2.1. ICT Strategic Technology Trend

To identify the cyber security convergence field and the related core technologies and conduct research to suggest future cyber security technology convergence directions, it is necessary to understand the trends in ICT technology to which cyber security technologies are applied and utilized. The 10 strategic technologies that Gartner, a global IT research firm, announces every year are representative trend predictions that predict how the IT industry will change [44]. Table 2 summarizes Gartner’s forecasts for the top 10 IT strategic technologies from 2011 to 2020.
To obtain a more meaningful look at Gartner’s announcement, we need to look at the trends in technology that changed over the past 11 years, not just what we have picked as strategic technologies for the next year. That is, the period for which a particular technology is included in the Gartner’s top ten technologies depends on the period in which the technology takes root, and some technologies disappear within a short period of time after being selected or reappearing over the years. IT trends, such as artificial intelligence, robots, 5G, drones, interactive platforms, immersive media, and blockchain, seem to be different technologies, but technologies will be connected and intelligent in the era of the fourth industrial revolution; therefore, it is necessary to look at them in connection. For instance, as IT technologies have a very close interrelationship, the security technologies of cyber systems to which IT technologies are applied also emphasize new ultra-security to which various types of convergence security technologies are applied.

2.2. Cyber Security Technology Trends

When estimating next-generation security technologies, it is useful to utilize the hype cycle developed by Gartner, as shown in Figure 2. The cycle consisted of five phases: technology trigger, peak of inflated expectations, trough of disillusionment, slope of enlightenment, and plateau of productivity. The next-generation security technology area is mainly located in the first, the technology trigger, and second stages, the peak stage of expectations [45].
As a result of analyzing the above data, next-generation security technology is an integrated cyber security technology that can respond to mega-attacks targeting all areas of cyber security in real time to realize the safety, reliability, and resilience of a hyper-connected platform based on IoT and 5G. Technological development can proceed with the goal of cyber risk management.
Therefore, from the development of security-equipment-centered technology that has been mainstream up to the fourth generation of security, using AI-related techniques such as deep learning to proactively respond to the evolution of attackers (predictive intelligence) and abnormal behavior through the automatic learning of normal behavior, behavioral analytics/anomaly detection that detects behavior, automated security that protects and processes large volumes of traffic from endpoints, deception security that responds to mutant viruses and zombies, and low-risk unnecessary dark data identification technology that automatically deletes data can form the mainstream of next-generation security technology development.
In addition, at the national level, in preparation for the evolution of cyber-attacks that are systematic and intentionally attempted to create social chaos or steal state secrets, the cyber kill chain, a so-called cyber-strike cycle, is a concept that blocks threats applied at each stage of attack in advance. Cyber kill chain technology and security rating services (SRS) for the security supply chain could be actively studied. To actively respond to the uncertain and dynamic changes in future, it is essential to strengthen forecasts for the future and establish a strategy based on the results. Therefore, it is important to identify future-oriented cyber security convergence fields and technologies.

2.3. Field of Cyber Security

In this study, the cyber security field was derived based on the Gartner’s IT strategy technology trend in Section 2.1 and the Gartner’s hype cycle in Section 2.2. First, key keywords related to the 10 strategic technologies selected from the IT trends by year from 2010 to 2020 were derived. As introduced in Section 2.1, Gartner selects and announces 10 trend keywords expected to appear in the next year under the name of “Top 10 Strategic Trends” in October every year. The 10 strategic trends are based on analysts’ analysis, and the final 10 trend keywords are determined by considering the interests of the company and its customers. In the early stages of the study, we attempted to select a “10 trends” similarly to Gartner, but authors and experts gathered to line up dozens of keywords and compress the trends through regular online meetings and several offline meetings to extract more optimal trends. The strategic technologies and keywords derived from the top ten strategic technologies in 2019 are listed in Table 3 [44].
Based on the compressed strategic technology trends listed in Table 3, we first classified the major categories, middle classes using the technology names of the hype cycle from 2016 to 2019, and finally sub-classifications using the relevant detailed technology names (keywords). For instance, as summarized in Table 4, network security is set as a major classification essential for “artificial intelligence”, “5G”, and an “interactive platform” strategic technology, and it is classified as a medium classification using “cloud security assessments”, the technology name of the 2019 hype cycle. Select “Cloud Security”. In addition, when mapping topics extracted from future research experiments, “virtualization platform security”, cloud security services, and “software-defined security” are specified as sub-categories for the comparison of related keywords.
The cyber security areas derived based on keywords derived from IT strategy technology from 2010 to 2020 and keywords mentioned in the hype cycle are summarized in Table 4.
The final cyber security domain derived, as summarized in Table 4, was divided into five major categories, 22 medium categories, and 65 small categories. In this study, using keywords in topics extracted from papers and patents, the topics were mapped to the cyber security areas in Table 4.

2.4. Contribution, Discussion, and Insights from This Study

The contributions of this study are as follows:
First, it monitors key cyber security convergence fields and technologies to provide practical insights to companies and experts for developing cyber security solutions. This is the first approach to understanding the types of cyber security technology convergence fields and the changes in the development of cyber security technology.
Second, by visualizing cyber security convergence fields and technologies, it monitors the core technologies that are being developed, mainly for cyber security.
The main discussions of this study are as follows:
First, according to the cyber security convergence trend, cyber security technology is mainly being developed in the fields of home city, wireless network, application, authentication/authorization technology, wired network, security vulnerabilities, threat analysis, and control. Cyber security technology is directly or indirectly related to cyber security administrators as well as system operators and developers.
Second, this study shows core cyber security technologies based on keywords extracted from papers and patents; however, detailed technical specifications for safety innovation are not mentioned. To provide more implications for cyber security managers and technology researchers, individual characteristics such as author information, number of citations, citation relationship, commercialization, institution, and country of papers and patents should be examined. If these studies are supported, more accurate and specific results for each cyber security field can be derived in future studies.
Third, trend prediction for cyber security convergence fields and technologies can be used to prevent and solve the security problems of various cyber systems used in ICT and related industries. When the risk keywords extracted from the cyber safety accident report are used together, new insights can be obtained to discover and predict new cyber security technologies that can solve not only actual security problems but also various security problems that may occur in the future.
The insight of this study is that understanding changes and trends in the field of cyber security convergence is the most efficient way to respond to cyber security threats and risks proactively, and it is crucial in the development of next-generation cyber security technologies.

3. Research Methodology

3.1. Introduction to the Research Process

In this study, papers published for 11 years (2010–2020) and patents in the information security field were collected from four major societies (ACM CCS, Usenix Security, IEEE Security & Privacy, and NDSS) that boast the highest authority in the field of information security. Through the developed web crawler, metadata including title, author, abstract, publication year, thesis, and patent files were collected. Accordingly, approximately 4200 papers and 3100 patents were collected as experimental subjects.
In this study, major topics and key keywords were extracted from the collected papers and patents, and the cyber security field was derived. Based on keywords connected by field, it analyzes changes in cyber security convergence fields and technologies over time to monitor newly emerged convergence fields and convergence fields that have continued or disappeared. Finally, the cyber security convergence field and technology trends were predicted through an analysis of the convergence field and technology trends. To conduct such a rational study, we analyzed various existing technology prediction methodologies and applied them to our experiments by optimizing them.
In terms of technology, the advantage of this study is that it utilizes the latest deep learning technologies, such as LDA, DTM, and LSTM, which will be introduced next. In general, the Delphi method, which listens to the opinions of experts, is used to predict the future of science and technology, but the accuracy is not high at approximately 30%. Using self-learning AI deep learning technology, the network structure information, keywords, and research fields of each technology group were digitized. Based on the deep learning future prediction model created in this way, it is possible to derive cyber security technology and show a high level of prediction accuracy.

3.2. Deep Learning Algorithm for Identification and Prediction of Cyber Security Technology and Convergence Fields

Technological forecasting methods have been developed in various forms, depending on the purpose of forecasting, the scope of forecasting, the nature of technology, and the degree of data accumulation. Recently, rather than using each method individually, a form of using a mixture was developed, and the method was modified and optimized according to the subject of use. The following introduces the algorithms (LDA, DTM, and LSTM) used as text-analysis-based probabilistic topic model techniques applied to actual research experiments in this study.
LDA is a topic-modeling technique for detecting potential topics for a given large number of documents. LDA clusters documents by using hidden topics. LDA assumes that documents contain one or more topics, selects the nth word from each document, and has the largest multiplication value of the probability distribution of the topic for the document containing that word, and the probability distribution of the word for the topic is assigned to the nth word. That is, LDA is a probabilistic model for which topics exist in each document for a given document, and the schematic diagram is shown in Figure 3.
In Figure 3, the probabilities that the words attack, privacy, and detection appear in the yellow topic are 0.04, 0.02, and 0.01, respectively, indicating that it is an information-security-related topic. Because the proportion of words corresponding to yellow topics is greater than that corresponding to blue and red topics in each document, the main topic of the document is likely to be a yellow topic (related to information security). The LDA is a useful method in natural language processing, such as classification, summary, similarity, and relevance judgment.
LDA has been used in fields related to academic literature analysis, and attempts to use topic modeling for trend analysis have increased since then. A representative example is the DTM. Figure 4 shows a schematic of the DTM.
The DTM is a probabilistic time-series model for analyzing the evolution of subjects over time. For instance, in the case of LDA, assuming that there is a document set created between 2016 and 2020, the entire document set is first divided into five sets by year to analyze the subject change over the five years. If the number of topics is designated as 10 and LDA topic modeling is performed for each year, 50 (5 × 10) topics are derived. However, it is impossible to analyze trends, because all 50 derived topics may differ. Therefore, for trend analysis, it is necessary to show that themes are connected and change by year. That is, the nth theme of 2018 should be similar to that of 2017. The DTM adds the condition that the topics of the current year are similar to those of the previous year; therefore, the proportion of literature belonging to the topic and how the topic changes over time.
Because conventional neural networks currently only consider the input data, a recurrent neural network (RNN) has emerged to process continuous data. An RNN is an artificial neural network for learning data that changes over time, such as time-series data, and the present result is related to the previous result because it recursively refers to past output data. However, learning ability is significantly reduced when the distance between the information related to the past and the point where the information is used is long. To overcome this problem, long short-term memory (LSTM) was devised by adding the cell-state to the RNN’s state. Figure 5 shows the network structure of the LSTM.
Figure 5 shows the overall network structure of the LSTM, which consists of four gates. The forget gate decides which information to forget from the hidden state information of the previous step, and the input gate decides which information to store. That is, it determines how much of the value of the previous cell state is reflected in the value of the current cell state. The value determined by the forget gate and the input gate is updated from the previous cell state to the new cell state in the update gate. Finally, the output gate determines the value to transfer to the hidden state of the next stage from the finally obtained cell state value. These LSTMs exhibit good performance in predicting time-series data by solving the long-term dependency problem.
In this study, LDA was used to extract major topics (areas) and key keywords (techniques), DTM was used to analyze changes in topics and keywords, LSTM was used to predict trends of topics and keywords that were optimized for collected papers and patents, and research experiments were conducted.

4. Research Experiments

4.1. Experimental Data

In this research experiment, the 2010–2020 papers from four major societies (ACM CCS, Usenix Security, NDSS, IEEE Security & Privacy), which boast the highest authority in the field of information security, and patents collected through keyword searches in various security fields were utilized. Approximately 1600 papers from the ACM CCS conference, 800 papers from the Usenix Security conference, 600 papers from the NDSS conference, and 1200 papers from the IEEE Security & Privacy journal were collected. Additionally, approximately 3100 pieces were collected. In addition, related metadata were collected. Table 5 presents specific information and examples of metadata for the collected papers and patents.

4.2. Cyber Security Related Papers and Patent Trend Analysis

Cyber security technology is rapidly advancing daily, and the rationale for this is presented through conferences, journals, and patents. Therefore, continuous monitoring of these major papers and patents is essential for identifying and analyzing the technological development and research direction of the research community of leading global countries. The recent changes in the number of papers and patents per year in the cyber security field are shown in Figure 6.
As shown in Figure 6, except for 2020, the number of papers and patents has continued to increase. This suggests that the importance of technology development and related research on cyber security has been steadily maintained over the past 11 years. However, the decrease in the number of patents in 2019 could be because it takes some time from application to registration for patents, and the slight decrease in the number of papers and patents in 2020 is attributed to COVID-19. Therefore, the number of papers and patents in 2020 should be viewed from a relative point of view rather than interpreted as an absolute number. Through such monitoring, we can estimate the direction of the advancement of future cyber security technology, and it can be used to predict the commercialization potential and timing of the technology.

4.3. Cyber Security Keyword Extraction and Domain Identification

The keywords for each topic of the thesis and patents from 2010 to 2020 extracted using the LDA algorithm are summarized in Table 2. Keywords in these topics can provide detailed descriptions of papers and patents. Therefore, the subject of this thesis and patent documents can be derived from the technical keywords extracted from the LDA algorithm. In this case, unnecessary keywords are automatically removed by the technical stop word dictionary in the text mining process, which is the preprocessing stage of the LDA algorithm. Table 6 summarizes examples of the top 10 keywords by recent papers and patent topics in 2020.
As summarized in Table 6, the topic was determined by mapping the keywords for each topic extracted from the papers and patents for each year to the cyber security area derived based on the IT strategy technology and hype cycle in Section 2.3. It may be difficult to classify papers and patents that contain technical keywords into specific fields because general keywords that describe cyber security technologies may be included in this process. In this case, subject classification was performed while manually analyzing the thesis and patent with an expert. As this is the first study to identify the cyber security convergence field and technology, the cyber security field was finally specified with the help of experts after targeting as many and various keywords as possible. Table 7 summarizes the topic mapping results of papers and patents by year according to cyber security area. To view the topic tendency of the thesis and patents together, topics extracted from the thesis are indicated in red and topics extracted from patents are indicated in blue.
As summarized in Table 7, the cyber security area is divided into five major categories: network, data and application service, physical, system and password, and IoT security. The thesis mainly focused on the middle classification of network, data and application service security, as well as system and password security, and patents were mainly focused on physical and IoT security. This is because papers mainly contain experimental techniques, and patents contain practical techniques. Network security is divided into three major categories: wired, wireless, and the cloud. Although related topics appear every year in the wired network security area, the wireless network security area has shown a more pronounced technological growth since 2012 than the wired network security area. Along with cloud security, technological development has been steadily progressing from 2010 to 2020.
Data and application service security can be divided into four major categories: application, data, electronic money/fintech, and digital forensics. Generally, the application security area and electronic money/fintech security area occupied a large proportion, and the applied security area mainly focused on related topics in 2012, 2013, and 2015. The related topics were concentrated in 2019. Related topics appeared every year in the data security area and intermittently in the digital forensics area. Physical security is divided into four major categories: human/bio-recognition, CCTV monitoring/control, security searches, and unmanned electronic security. Technological advances were strong in 2010 in the areas of human/bio-recognition, security search, and unmanned electronic security, and the human/bio-recognition area showed strength again in 2018 and 2020, and the CCTV monitoring/control area started in 2014. After the rebound in 2016, the security screening and unmanned electronic security sectors rebounded in 2015.
System and password security are divided into six major categories: encryption technology, authentication/authorization technology, security vulnerability, system security, malicious codes, as well as threat analysis and control. Generally, authentication/authorization technology, security vulnerability, and malicious code areas account for a large proportion, and technology development is being made steadily every year. In addition, cryptographic technology, threat analysis, and control areas have shown strength again since 2018. Related topics in the area of system security appear sporadically. IoT security is divided into nine major categories: home city, industrial control system, automobile, shipping, marine, aviation, healthcare, medical security, and other ICT security. Home city security occupies the largest share, followed by healthcare, medical, and automobile security. In addition, related topics sporadically appeared in the industrial control system security area, ship, marine, aviation security, and other ICT security areas.
Table 8 summarizes the network visualization of the LDA results and convergence regions to identify convergence regions by major year. Network analysis in the cyber security convergence field by major year analyzed the period from 2010 to 2020 in two-year units. Keywords connected between topics were used to identify the cyber convergence field.
As summarized in Table 8, seven convergence areas existed in 2010 based on the connection keywords authentication, device, malware, method, network, security, and user. A convergence area is formed around CCTV surveillance/control, cloud security, secure search, and unmanned electronic guards. In 2012, two convergence areas existed based on the connection keywords device and security, and convergence areas centered on e-money and fintech security areas were created.
In 2014, two convergence areas existed based on the connection keywords device and security, and convergence areas centered on cloud security and wireless network security areas were created. In 2016, three convergence areas existed based on the connection keywords data, device, and security, and convergence areas have been created centered on application security, cloud security, and malware areas.
In 2018, there were six convergence areas based on the connection keywords data, device, malware, method, security, as well as user, and convergence areas were created around cloud security, e-money, fintech security, and security variability areas. In 2020, there were eight convergence areas based on the connection keywords attack, data, device, network, security, server, system, as well as viability, and convergence areas were created around application security, cloud security, malware, application security, and security.
Based on these connection keywords, it is possible to analyze the convergence relationship by year between the cyber security domains. However, there is a limit to grasping the flow of the convergence area because the topics extracted by LDA by year do not have connectivity by year. Therefore, in Section 4.4, we used the DTM algorithm.

4.4. Trend Analysis of Cyber Security Area and Convergence Field

The second approach applied to analyze changes in cyber security and convergence fields is to use the DTM algorithm to identify theses and patent trends for the entire year.
The DTM algorithm, a probabilistic time series model, was applied to papers and patents from 2010 to 2020. When a topic is derived for each year using LDA, it is impossible to analyze the topic change because the topics are different. Therefore, to analyze topic trends, it is necessary to show that topic changes by year are connected. The DTM extracts topics by year by adding the condition that the topics of the current year are similar to those of the previous year; therefore, it is possible to identify the trends of topics.
In this section, the topics derived from the DTM results are mapped to the cyber security domain, just as the topics derived from the LDA results are mapped to the cyber security domain in Section 4.3. In this case, the entire year was input as one dataset without dividing the thesis and patent by year. Table 9 and Table 10 summarize the mapping results of the DTM topic keywords and DTM topics according to the cyber security domain. As mentioned above, the DTM shows the keywords of the recent 2020 topics as examples because topics by year have similar keywords. Similar to LDA, topics extracted from the thesis are displayed in red and topics extracted from patents are displayed in blue.
As summarized in Table 10, most security areas appeared as topics of DTM because of continuous technological developments over the past 11 years. However, eight areas (digital forensics, human/bio-recognition, CCTV surveillance/control, system security, industrial control system security, automobile security, ship, marine, aviation security, and other ICT security areas) are similar to Section 4.3. As seen in the LDA results of the section, the topics did not appear in the results of the DTM because the topics appeared sporadically in a specific year or intermittently during a specific year period.
In this study, the average number of papers and patents for each area, proportion of the total area, and compound annual growth rate (CAGR) were analyzed, as summarized in Table 11, to grasp the technology trends in the cyber security area dynamically. During trend analysis, as observed in Section 4.2, the latest year standard was set for 2019, as paper publications and patent registrations were not active in 2020 owing to the impact of COVID-19.
Cyber security fields, where many papers and patents have recently appeared, include home city (183), application (155), malicious code (129), cloud (104), wireless network, and security vulnerabilities (103). To develop and operate safe cyber systems in various fields that utilize cyber systems in the era of the fourth industrial revolution, various security fields have received attention from academia and practice. Table 11 summarizes the statistical information on papers and patents in the field of cyber security.
From 2010 to 2019, the fields of cyber security that consistently produced many papers and patents were home city security (144.00), application security (121.90), malicious code (96.10), and electronic money/fintech security (81.00). Naturally, the average ratio shows a similar pattern to the average number, with home city security accounting for a large proportion (14.57%) and then followed by application security (12.54%), malicious code (9.73%), and electronic money/fintech security (8.47%). These results indicate that the importance of cyber security has been continuously focused on in various fields over the past decade, and most of the interest in cyber security has arisen from attempts to solve problems and prevent risks using advanced technologies. For instance, home cities, which have converged with cutting-edge technology with the highest number of papers and patents, are increasingly targeted by cyber-attacks. If a security incident occurs in cyber–physical systems, such as the energy infrastructure constituting the home city, connected IoT, and the cloud, the destructive power will not be limited to cyberspace, but it will destroy the physical real world. Therefore, technological advances have been made.
As shown in Figure 7 and Figure 8, the change in the average number and ratio of papers and patents by the cyber security field on an annual basis is useful for understanding trends in the cyber security field. Furthermore, the rate of increase in the number and ratio of papers and patents in the cyber security field is an effective indicator for estimating cyber security technology trends. Among them, the measurement of CAGR is useful for monitoring cyber security technology trends. CAGR was calculated to identify typical exponential growth rates when the exponential growth interval was one year. Therefore, the growth rate of several cyber-safety fields is important for trend identification.
The fields with a significant increase in the number of papers and patents were threat analysis and control (23.64%), home city security (12.78%), wireless network security (12.05%), data security (10.51%), and security vulnerabilities (10.48%). In addition, although the CAGR of most cyber security fields is increasing, wired network security (−0.57%), electronic money/fintech security (−2.41%), and authentication/authorization technology (−5.61%) have recorded negative CAGR. The encryption technology showed a significant decrease (−10.45%).
In this study, to intuitively understand and analyze the cyber security convergence field according to the cyber security domain that has this continuity, the network visualization technique and the connection keyword were used, as in the LDA in Section 4.3. Figure 9 and Table 12 present the visualization results of the DTM network for the entire year, convergence area, and connection keywords.
As shown in Figure 9, if we analyze the DTM network visualization result, it consists of 19 convergence regions. If we analyze the trends of the 19 convergence areas, we can confirm the results in Table 13 and Figure 10.
From 2010 to 2019, the convergence field with a high proportion of papers and patents was convergence 12 (11.90%), followed by convergences 6 (7.82%), 9 (7.56%), 8 (7.54%), and 17 (7.02%). These results indicate that cyber security technology is also developing in the form of convergence security according to the convergence development flow of ICT technology.
Convergence fields with a steady increase in the number of papers and patents were typically convergences 18 (3.03%), 17 (2.65%), 6 (2.62%), and 13 (2.36%). In addition, although the CAGR of most cyber security convergence fields is small, they show an increasing trend, but convergences 15 (−9.71%), 14 (−6.20%), and 7 (−5.79%) show a significant decrease. These results indicate that in the conventional security field (convergences 15, 14, and 7), an integrated security control center (SOC) was established to respond to security threats, and information protection and personal information protection systems were established to counter human security control and infringement. Recently, with the advent of the untact era, the use of cloud services has rapidly increased and security threats are increasing accordingly. It is necessary to build an automated security system in these cloud services (convergences 18, 17, 6, and 13), unlike conventional security, which shows that related technologies are developing.

5. In-Depth Analysis of Cyber Security Convergence Area

5.1. Connection Strength in the Cyber Security Convergence Domain

In Section 4.4, to extract the cyber security convergence field, the keywords that occurred simultaneously among the keywords of the topics within each cyber security area were used as a link. These connection keywords may indicate the degree of convergence in the cyber-convergence field. That is, according to the high and low frequency of the appearance of connected keywords, or the large and small number of connected keywords, it was found to have a high correlation in cyber convergence. Therefore, because the connection keyword indicates the degree of connection of convergence, it is possible to analyze the trend of changes in the cyber security area and related technologies over the past decade. Table 14 presents the DTM network visualization results for the entire year according to the strength of the connection keywords, convergence area, and connection keywords.
The strength of the connection keyword was expressed by adding all the number of co-appearances by year in the cyber security domain, constituting the convergence domain and then normalizing it to a value between 1 and 10. That is, the lower the intensity, the lower the degree of cohesion, and the higher the intensity, the higher is the degree of cohesion. Therefore, as summarized in Table 14, 19 convergence regions appeared when the intensity was one; in the case of two and five, as well as in the case of three and four, three convergence regions appeared. In addition, it can be analyzed as a convergence relationship with a higher degree of binding, as there are more linking keywords and a low degree of binding with fewer linking keywords. For instance, in strength one, five convergence domains (malware, wired network security, wireless network security), convergence domains (e-money, fintech security, healthcare, medical security), and convergence domains (home city security, wireless) network security) are fused with three connection keywords; therefore, the internal cyber security field is more closely related than other convergence areas composed of one connection keyword.

5.2. Trend Analysis and Forecasting of Cyber Security Convergence Area

The third approach applied to analyze the development trend of the cyber security convergence field is to analyze and predict trends in the field using the LSTM algorithm.
In Section 4, the LSTM algorithm, an artificial neural network that forms a circular structure, was applied to cyber security convergence analysis using the DTM algorithm. First, to predict the trend in the cyber security convergence area, the trend was analyzed and predicted based on the annual frequency of keywords in the topic constituting each cyber security area within the convergence area. The following figures present the trend prediction results of the convergence areas. In the prediction of the convergence region, only the case of intensity one was considered because it includes all convergence regions of intensities two, three, and four. Additionally, among the cyber security convergence fields, as in Section 4.4, we focused on the convergence fields where the CAGR ratio was higher or significantly increased or decreased compared to other cyber security convergence fields. Figure 11 presents the prediction results for convergences 12, 9, and 8, which are convergence areas with high proportions. Figure 12 presents the predicted results for convergences 18, 17, 6, and 13, which are the increased convergence regions. Figure 13 presents the predicted results for convergences 15, 14, and 7, which are the decreased convergence regions.
Analyzing the above prediction results, it is predicted that the areas of convergence with a high proportion will develop steadily in the future or they will maintain the current state. Although the convergence areas that have increased could continue to develop in the future, those that have decreased show different prediction results for each convergence area. Convergence region 15 was predicted to continue to decrease, convergence region 14 was predicted to increase, and convergence region seven was predicted to remain the same. Owing to the recent increase in network-based medical devices and medical information systems as well as the rapid introduction of cutting-edge technologies such as artificial intelligence and big data into various related systems inside and outside medical institutions, sensitive personal information, including patient information, is collected and distributed. This shows that the threat of cyber-attacks targeting medical institutions and medical information is rapidly increasing. In addition, cyber security companies have recently strengthened their growth engines with the blockchain, a priority factor for becoming industry leaders in financial services, energy, and manufacturing. This reflects the active movement to link blockchain businesses, specifically companies with technologies in the cryptographic authentication field.
In this study, the prediction of the increase/decrease trend of the cyber security convergence domain as well as the strength of connection keywords was analyzed to predict mutual organicity between convergence domains. Although it is difficult to predict perfect mutual organicity using only connected keywords, it is considered to have sufficient meaning to estimate future trends.
For mutual organicity prediction, trends were analyzed and predicted based on the annual frequency of connected keywords, such as trend prediction. In addition, only the case of intensity one was considered, and the connection keywords that converged to four or more cyber security domains were focused on. Figure 14 shows the prediction results of the control, environment, device, network, and systems, which are key connection keywords that converge to four or more security domains (convergences 6, 8, 12, and 17).
As shown in Figure 14, the connection keywords control and environment constituting convergence area six, the connection keyword device constituting convergence area eight, and the system, the connection keyword constituting convergence area 17, are expected to increase. Owing to the high degree of cohesion, they are expected to develop into a deeper relationship with each other in the future, forming an organic relationship with each other. Conversely, because the network, which is the connection keyword constituting convergence area 12, is predicted to decrease, significant differentiation is recognized over time, and detailed technologies within the convergence area can be technically commercialized from their own domains to independent domains. For example, Wi-Fi, one of the technologies in the wireless network field, is a core technology in the cloud, AI, and IoT fields; however, Wi-Fi is also changing. Wi-Fi technology has been developed around speed and performance, but recently, starting with Wi-Fi 6 (802.11ax), it has required high technology support suitable for the cloud, AI, and IoT era, such as higher speed and performance, efficiency in high-density environments, and power consumption. That is, the wireless network solution goes beyond supporting the latest technology, and its agility, simplified management, and intelligent management functions are emerging as differentiators.

6. Conclusions

This study analyzed the development, change, and evolution of related technologies that are essential for recognizing and understanding cyber security safety issues from various perspectives. Cyber security technology has been continuously developed to protect cyber systems from threats and risk factors, and it covers all aspects of cyber systems. However, very little research has been conducted on this topic.
Therefore, the contribution of this study is to monitor major cyber security convergence fields and technologies to provide practical insights for cyber security solution development companies and experts. This is almost the first approach for understanding the types of cyber security technology convergence fields and the changes in cyber security technology development. In addition, by visualizing cyber security convergence fields and technologies, it monitors which core technologies are being developed, mainly for cyber security.
That is, the innovation and novelty of this study are that, although there have been many cases of technology trend analysis research in cyber security, this is the first time a study has tried to identify and predict the flow of cyber security convergence. In addition, the research method that develops and applies the latest deep learning model will become a source technology for technology prediction studies in various fields in the future.
According to cyber security convergence trends, cyber security technology is mainly being developed in the fields of home city security, wireless network security, application security, authentication/authorization technology, wired network security, security vulnerability, and threat analysis and control. Each cyber security technology is directly or indirectly related to cyber security administrators, system operators, and developers. The highlight of this study is that understanding changes and trends in the field of cyber security convergence is the most efficient way to respond to cyber security threats and risks proactively, and it is crucial in the development of next-generation cyber security technologies.
Nonetheless, our work has several limitations, which can be addressed in future research. First, this study shows core cyber security technologies based on keywords extracted from papers and patents; however, detailed technical specifications for safety innovation are not mentioned. To provide more implications for cyber security managers and technology researchers, individual characteristics such as author information, number of citations, citation relationship, commercialization, institution, and country of papers and patents should be examined. If these studies are supported, accurate and specific results for each cyber security field can be derived in future studies. Second, trend predictions for cyber security convergence fields and technologies can be used to prevent and solve the security problems of various cyber systems used in ICT and related industries. When the risk keywords extracted from the cyber safety accident report are used together, new insights can be obtained to discover and predict new cyber security technologies that can solve not only actual security problems but also various security problems that may occur in the future. Future studies will ultimately provide detailed technical specifications and applicable technologies to deal with cyber security issues and present practical guidelines based on an analysis of papers and patents.

Author Contributions

Conceptualization, S.-Y.H. and J.-J.K.; Methodology, D.-J.S. and J.-J.K.; Software, S.-Y.H.; Validation, D.-J.S. and J.-J.K.; Formal analysis, D.-J.S. and J.-J.K.; Investigation, S.-Y.H. and D.-J.S.; Resources, S.-Y.H. and J.-J.K.; Data curation, S.-Y.H. and D.-J.S.; Writing—original draft preparation, S.-Y.H. and D.-J.S.; Writing—review and editing, J.-J.K.; Visualization, D.-J.S.; Supervision, J.-J.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar] [CrossRef]
  2. Gupta, M.; Rees, J.; Chaturvedi, A.; Chi, J. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach. Decis. Support Syst. 2006, 41, 592–603. [Google Scholar] [CrossRef]
  3. Razzaq, A.; Hur, A.; Ahmad, H.F.; Masood, M. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Proceedings of the 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), Mexico City, Mexico, 6–8 March 2013; pp. 1–6. [Google Scholar] [CrossRef]
  4. Mendhurwar, S.; Mishra, R. Integration of social and IoT technologies: Architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst. 2019, 15, 565–584. [Google Scholar] [CrossRef]
  5. Soni, S.; Bhushan, B. Use of Machine Learning algorithms for designing efficient cyber security solutions. In Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, 5–6 July 2019; pp. 1496–1501. [Google Scholar] [CrossRef]
  6. Asghar, M.R.; Hu, Q.; Zeadally, S. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Netw. 2019, 165, 106946. [Google Scholar] [CrossRef]
  7. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
  8. Sengan, S.; Subramaniyaswamy, V.; Nair, S.K.; Indragandhi, V.; Manikandan, J.; Ravi, L. Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Gener. Comput. Syst. 2020, 112, 724–737. [Google Scholar] [CrossRef]
  9. Tianju, S.; Yilin, M.; Damián Marelli Ximing, S.; Minyue, F. The Vulnerability of Cyber-Physical System Under Stealthy Attacks. IEEE Trans. Autom. Control 2021, 66, 637–650. [Google Scholar]
  10. Abomhara, M.; Køien, G.M. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
  11. Sui, T.; Sun, X.M. The vulnerability of distributed state estimator under stealthy attacks. Automatica 2021, 133, 109869. [Google Scholar] [CrossRef]
  12. Ilhan, I.; Karakose, M. Requirement Analysis for Cybersecurity Solutions in Industry 4.0 Platforms. In Proceedings of the 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, Turkey, 21–22 September 2019; pp. 1–7. [Google Scholar] [CrossRef]
  13. Culot, G.; Fattori, F.; Podrecca, M.; Sartor, M. Addressing Industry 4.0 Cybersecurity Challenges. IEEE Eng. Manag. Rev. 2019, 47, 79–86. [Google Scholar] [CrossRef]
  14. Alani, M.M.; Alloghani, M. Security Challenges in the Industry 4.0 Era. Ind. 4.0 Eng. Sustain. Future 2019, 117–136. [Google Scholar] [CrossRef]
  15. Elmaghraby, A.S.; Losavio, M.M. Cyber security challenges in Smart Cities: Safety, security and privacy. J. Adv. Res. 2014, 5, 491–497. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 2019, 86, 350–357. [Google Scholar] [CrossRef]
  17. Srinivas, J.; Das, A.K.; Kumar, N. Government regulations in cyber security: Framework, standards and recommendations. Futur. Gener. Comput. Syst. 2018, 92, 178–188. [Google Scholar] [CrossRef]
  18. Clark-Ginsberg, A.; Slayton, R. Regulating risks within complex sociotechnical systems: Evidence from critical infrastructure cybersecurity standards. Sci. Public Policy 2019, 46, 339–346. [Google Scholar] [CrossRef]
  19. Chhaya, L.; Sharma, P.; Kumar, A.; Bhagwatikar, G. Cybersecurity for Smart Grid: Threats, Solutions and Standardization. Adv. Greener Energy. Technol. 2020, 17–29. [Google Scholar] [CrossRef]
  20. ISO/IEC 27100. Information Technology-Security Techniques-Cyber Security-Overview and Concepts. 2019. Available online: https://www.iso27001security.com/html/27100.html (accessed on 11 December 2020).
  21. ISO/IEC 27101. Information Security, Cyber Security and Privacy Protection-Cyber Security Framework Development Guidelines. 2019. Available online: https://www.iso27001security.com/html/27101.html (accessed on 11 December 2020).
  22. ISO/IEC 27102. Information Security Management-Guidelines for Cyber-Insurance. 2019. Available online: https://www.iso27001security.com/html/27102.html (accessed on 11 December 2020).
  23. ISO/IEC 27103. Information Technology-Security Techniques-Cyber Security and ISO and IEC Standards. 2019. Available online: https://www.iso27001security.com/html/27103.html (accessed on 11 December 2020).
  24. ISO/IEC 27032. Information Technology-Security Techniques-Guidelines for Cyber Security. 2012. Available online: https://www.iso27001security.com/html/27032.html (accessed on 11 December 2020).
  25. Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef] [Green Version]
  26. Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
  27. Saravanan, A.; Bama, S.S. A Review on Cyber Security and the Fifth Generation Cyberattacks. Orient. J. Comput. Sci. Technol. 2016, 12, 50–56. [Google Scholar] [CrossRef]
  28. Lee, J.; Wu, F.; Zhao, W.; Ghaffari, M.; Liao, L.; Siegel, D. Prognostics and health management design for rotary machinery systems—Reviews, methodology and applications. Mech. Syst. Signal Process. 2013, 42, 314–334. [Google Scholar] [CrossRef]
  29. Silva, E.C. Accidents and the technology. J. Loss Prev. Process Ind. 2017, 49, 319–325. [Google Scholar] [CrossRef]
  30. Daim, T.U.; Rueda, G.; Martin, H.; Gerdsri, P. Forecasting emerging technologies: Use of bibliometrics and patent analysis. Technol. Forecast. Soc. Chang. 2006, 73, 981–1012. [Google Scholar] [CrossRef]
  31. Dotsika, F.; Watkins, A. Identifying potentially disruptive trends by means of keyword network analysis. Technol. Forecast. Soc. Chang. 2017, 119, 114–127. [Google Scholar] [CrossRef] [Green Version]
  32. Song, B.; Suh, Y. Identifying convergence fields and technologies for industrial safety: LDA-based network analysis. Technol. Forecast. Soc. Chang. 2018, 138, 115–126. [Google Scholar] [CrossRef]
  33. Li, X.; Xie, Q.; Daim, T.; Huang, L. Forecasting technology trends using text mining of the gaps between science and technology: The case of perovskite solar cell technology. Technol. Forecast. Soc. Chang. 2019, 146, 432–449. [Google Scholar] [CrossRef]
  34. Abraham, C.; Chatterjee, D.; Sims, R.R. Muddling through cybersecurity: Insights from the U.S. healthcare industry. Bus. Horizons 2019, 62, 539–548. [Google Scholar] [CrossRef]
  35. Santos, C.; Mehrsai, A.; Barros, A.C.; Araujo, M.; Ares, E. Towards Industry 4.0: An overview of European strategic roadmaps. Procedia Manuf. 2017, 13, 972–979. [Google Scholar] [CrossRef]
  36. Chen, H.; Zhang, G.; Zhu, D.; Lu, J. Topic-based technological forecasting based on patent data: A case study of Australian patents from 2000 to 2014. Technol. Forecast. Soc. Chang. 2017, 119, 39–52. [Google Scholar] [CrossRef]
  37. Golembiewski, B.; Stein, N.V.; Sick, N.; Wiemhöfer, H.-D. Identifying trends in battery technologies with regard to electric mobility: Evidence from patenting activities along and across the battery value chain. J. Clean. Prod. 2015, 87, 800–810. [Google Scholar] [CrossRef]
  38. Blei, D.M.; Ng, A.Y.; Jordan, M.I. Latent dirichlet allocation. J. Mach. Learn. Res. 2003, 3, 993–1022. [Google Scholar]
  39. Sievert, C.; Shirley, K. LDAvis: A method for visualizing and interpreting topics. In Proceedings of the Workshop on Interactive Language Learning, Visualization, and Interfaces, Baltimore, MD, USA, 27 June 2014; pp. 63–70. [Google Scholar]
  40. Blei, D.M.; Lafferty, J.D. Dynamic topic models. In Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh Pennsylvania, USA, 25–29 June 2006; pp. 113–120. [Google Scholar]
  41. Yao, F.; Wang, Y. Tracking urban geo-topics based on dynamic topic model. Comput. Environ. Urban Syst. 2019, 79, 101419. [Google Scholar] [CrossRef]
  42. Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]
  43. Tian, Y.; Zhang, K.; Li, J.; Lin, X.; Yang, B. LSTM-based traffic flow prediction with missing data. Neurocomputing 2018, 318, 297–305. [Google Scholar] [CrossRef]
  44. Panetta, K. Gartner Top 10 Strategic Technology Trends for 2020. 2019. Available online: https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020/ (accessed on 11 December 2020).
  45. Gartner, Hype Cycle for Risk Management. 2019. Available online: https://www.gartner.com/en/documents/3953584 (accessed on 23 March 2022).
Figure 1. Evolution process and characteristics of cyber security technology by generation.
Figure 1. Evolution process and characteristics of cyber security technology by generation.
Symmetry 14 00683 g001
Figure 2. Gartner’s risk management criteria for next-generation security technology area prediction.
Figure 2. Gartner’s risk management criteria for next-generation security technology area prediction.
Symmetry 14 00683 g002
Figure 3. Schematic of LDA.
Figure 3. Schematic of LDA.
Symmetry 14 00683 g003
Figure 4. Schematic of DTM.
Figure 4. Schematic of DTM.
Symmetry 14 00683 g004
Figure 5. LSTM network architecture.
Figure 5. LSTM network architecture.
Symmetry 14 00683 g005
Figure 6. Cyber-security-related papers and patent trends.
Figure 6. Cyber-security-related papers and patent trends.
Symmetry 14 00683 g006
Figure 7. Changes in the average number of papers and patents by cyber security field on an annual basis.
Figure 7. Changes in the average number of papers and patents by cyber security field on an annual basis.
Symmetry 14 00683 g007
Figure 8. Changes in the average ratio of papers and patents by cyber security field on a yearly basis.
Figure 8. Changes in the average ratio of papers and patents by cyber security field on a yearly basis.
Symmetry 14 00683 g008
Figure 9. Cyber security domain networks for all years (2010–2019).
Figure 9. Cyber security domain networks for all years (2010–2019).
Symmetry 14 00683 g009
Figure 10. Changes in the average ratio of papers and patents by cyber security convergence area on a yearly basis.
Figure 10. Changes in the average ratio of papers and patents by cyber security convergence area on a yearly basis.
Symmetry 14 00683 g010
Figure 11. Prediction of trends in convergence areas (12, 9, and 8) that had a high proportion.
Figure 11. Prediction of trends in convergence areas (12, 9, and 8) that had a high proportion.
Symmetry 14 00683 g011
Figure 12. Trend prediction of convergence areas (18, 17, 6, and 13) that increased.
Figure 12. Trend prediction of convergence areas (18, 17, 6, and 13) that increased.
Symmetry 14 00683 g012
Figure 13. Prediction of trends in convergence areas (15, 14, and 7) that decreased.
Figure 13. Prediction of trends in convergence areas (15, 14, and 7) that decreased.
Symmetry 14 00683 g013
Figure 14. Key linking keyword trend prediction.
Figure 14. Key linking keyword trend prediction.
Symmetry 14 00683 g014
Table 1. Leading international cyber security standard.
Table 1. Leading international cyber security standard.
International Standard for Cyber SecurityContentsStatus
ISO/IEC 27100Information technology—Cyber security—Overview and conceptsWD
ISO/IEC 27101Information technology—Security techniques—Cyber security—Framework development guidelinesWD
ISO/IEC 27102Information security management—Guidelines for cyber insuranceIS
ISO/EIC 27103Information technology—Security techniques—Cyber security and ISO and IEC StandardsIS (TR)
ISO/EIC 27032Information technology—Security techniques—Guidelines for cyber securityIS (Under revision)
Table 2. Gartner IT top 10 strategic technologies for 11 years (2011–2020).
Table 2. Gartner IT top 10 strategic technologies for 11 years (2011–2020).
20102011201220132014201520162017201820192020
Cloud ComputingCloud ComputingMedia Tablets and BeyondMobile Device BattlesMobile Device Diversity and ManagementComputing EverywhereThe Device MeshAI and Advanced Machine LearningAI FoundationAutonomous ThingsHyperautomation
Virtualization for AvailabilityMobile Applications and Media TabletsMobile-centric Applications and InterfacesMobile Applications and HTML 5Mobile Apps and ApplicationsThe Internet of ThingsAmbient User ExperienceIntelligent AppsIntelligent Apps and AnalyticsAugmented AnalyticsMultiexperience
Reshaping the Data CenterSocial Communications and CollaborationSocial and Contextual User ExperiencePersonal CloudThe Internet of Everything3D Printing3D Printing MaterialsIntelligent ThingsIntelligent ThingsAI-Driven DevelopmentDemocratization of Expertise
IT for GreenVideoApplication Stores and MarketplaceInternet of ThingsHybrid Cloud and IT as Service BrokerAdvanced, Pervasive, and Invisible AnalyticsInformation of EverythingVirtual and Augmented RealityDigital TwinDigital TwinsHuman Augmentation
Client ComputingNext-Generation AnalyticsThe Internet of everythingHybrid IT and Cloud ComputingCloud/ClientContext-Rich SystemsAdvanced Machine LearningDigital TwinCloud to the EdgeEmpowered EdgeTransparency and Traceability
Mobile applicationsSocial AnalyticsNext-Generation AnalyticsStrategic Big DataThe Era of Personal CloudSmart MachinesAutonomous Agents and ThingsBlockchain and Distributed LedgersConversational PlatformstImmersive ExperienceThe Empowered Edge
Advanced AnalyticsContext-Aware ComputingBig DataActionable AnalyticsSoftware-Defined AnythingCloud/Client ComputingAdaptive Security ArchitectureConversational SystemImmersive ExperienceBlockchainDistributed Cloud
Social ComputingStorage Class MemoryIn-Memory ComputingMainstream In-Memory ComputingWeb-Scale ITSoftware-Defined Applications and InfrastructureAdvanced System ArchitectureMesh App and Service ArchitectureBlockchainSmart SpacesAutonomous Things
Security—Activity MonitoringUbiquitous ComputingExtreme Low-Energy ServersIntegrated EcosystemsSmart MachinesWeb-Scale ITMesh App and Service ArchitectureDigital Technology PlatformsEvent DrivenDigital Ethics and PrivacyPractical Blockchain
Flash MemoryFabric-Based Infrastructure and ComputersCloud ComputingEnterprise App Stores3D PrintingRisk-Based Security and Self-ProtectionInternet of Things PlatformsAdaptive Security ArchitectureContinuous Adaptive Risk and TrustQuantum ComputingAI Security
Table 3. Strategic skills and keywords.
Table 3. Strategic skills and keywords.
Strategy TechnologyKeyword
Artificial intelligenceBig Data, Artificial Intelligence, Machine Learning, Deep Learning
5GALL IP, Network Slicing, Network Neutrality, Cord-cutting
RobotArtificial Intelligence, Smart Factory, Human–Robot Collaboration, Humanoid
DroneQuadcopter, 4 Channels, Calibration, Hovering, Flight Controller
Interactive platformSmart Secretary, Natural Language Processing, Amazon Skills, Corpus, Chatbot Builder
Realistic mediaRealistic Media, Virtual Reality, Augmented Reality, Mixed Reality
BlockchainDistributed Ledger Technology, Blockchain, Initial Coin Offering, Byzantine Generals Problem, Consensus Algorithm, Oracle Problems
Table 4. Cyber security field.
Table 4. Cyber security field.
Main CategoryMiddle CategorySmall CategoryHype Cycle Technology Name
Network SecurityWired network securityPerimeter securityIDPS
Secure connection
DDoS response
Wireless network securityMobile communication network securityMobile Threat Defense
Wireless local area network security
Cloud securityVirtualization platform securityCloud Security Assessments
Cloud security service
Software defined security
Data and application service securityApplication securityWeb securitySecure Web/Gateways
Email security
Database security
Data securityPrivacy protectionData Loss/Prevention
Data leakage prevention
Digital copyright infringement/right protection
E-money, Fintech securityE-money securityThe Programmable/Economy
Blockchain security
Electronic transaction/abnormal behavior detection
Prevention of transactions and fraud
Digital forensicsDigital Evidence/Collection and AnalysisE-Discovery Software
Anti-Forensic Response
Physical SecurityHuman/bio-recognitionBiometric sensorBiometric/Authentication/Methods
Biometric engine
Human recognition and search
Human/bio-recognition application
CCTV surveillance/controlCamera and storage deviceVideo/Image Analytics
VMS/integrated control
Intelligent video surveillance
CCTV infrastructure protection
Secure search and unmanned electronic guardInterpersonal Search Machine
Luggage/Luggage Finder
Alarm monitoring
Unmanned electronic security service
System and password securityCryptographic techniquePassword designDatabase Encryption
Cryptographic side channel analysis
Password analysis
Certification/authorization techniqueUniversal authenticationExternalized Authorization Management
ID management and access control
Bio certification
Security vulnerabilitySW vulnerability analysisVulnerability Assessment
HW vulnerability analysis
System securityOperating system securityData Loss Prevention
Virtualization security
System access control
MalwareMalware responseDLP for Mobile Devices
Ransomware response
Threat analysis and controlIntelligent cyber threat analysisSIEM
Security information analysis and log management
Security control
IoT SecurityHome city securityHome City Device Security and ControlSmart City Framework
Home City Data Privacy
Industrial control system securitySmart factory securityOperational Technology Security
Infrastructure security
Smart energy security
Vehicle securityCommunication security inside and outside the vehicleMobile Device Integration Into Automobiles
Access control inside and outside the vehicle
Car intrusion detection
Vehicle security vulnerability diagnosis
Ship, ocean, and air securityPrevention of hacking of autonomous shipsAutonomous Vehicles
Shipping port communication security
Marine infrastructure security control
Unmanned vehicle security
Aviation infrastructure security control
Healthcare, Medical securityHealthcare device/sensor securityReal-Time Health System Command Center
Medical data security and sharing
Other ICT securityArtificial intelligence and robot securityIoT Securities
Table 5. Examples of papers and patent information as well as metadata.
Table 5. Examples of papers and patent information as well as metadata.
TypeConference and Journal Scope and Patent Search Keywords
Paper ScopeACMCCSCryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy, etc.
Usenix SecuritySystem security, network security, security analysis, data-driven security and measurement studies, privacy-enhancing technologies and anonymity, language-based security, hardware security, social issues and security, applications of cryptography, etc.
NDSSCyber-crime defense and forensics, security and privacy for blockchains and cryptocurrencies, security for cloud/edge computing, security and privacy of mobile/smartphone platforms, security for cyber–physical systems, security and privacy of systems based on machine learning and AI, etc.
IEEE Security & PrivacyApplication security, attacks and defenses, authentication, blockchains and distributed ledger security, cloud security, cyber physical systems security, distributed systems security, embedded systems security, forensics, etc.
Patent Search KeywordsApplication security, authentication technique, cloud security, cryptographic technology, digital forensics, home city security, ICT security, industrial control system security, malware, threat analysis and control, wireless network security, etc.
Example of Metadata of Paper and PatentTitleFinding File Upload Bugs via Penetration Testing
AuthorTaekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son
AbstractAn Unrestricted File Upload (UFU) vulnerability is a critical security threat that enables an adversary to upload her choice of a forged file to a target web server.
Date9 November 2020
FileNDSS2020_17.pdf
Table 6. Examples of keywords by LDA papers and patent topics (2020).
Table 6. Examples of keywords by LDA papers and patent topics (2020).
Paper TopicKeywordsPatent TopicKeywords
Topic 1strategy, vulnerability, payment, crash_report, merchant, circumvention, algorithm, flash, card, attackTopic 1merchandise, patient, file, method, item, clinician, device, includes, base, programming
Topic 2cache, extension, server, device, packed, defense, packing, chaperone, blacklist, complianceTopic 2security, data, programmable, code, switching, cloud, metadata, home, physical, vulnerability
Topic 3access, speech, attack, service, webassembly, device, macao, keyvalue, oram, delegationTopic 3medical, threat, payment, data, binary, device, rolling, vehicle, healthcare, provisioning
Topic 4unpublished_manuscript_inclusion_upcoming, prospective_author_requested_submit, event_described_paper, manager, keyless_entry, project, genetic, custos, phmon, finauthTopic 4token, resource, control, server, node, characteristic, packet, message, network, monitoring
Topic 5coverage, collision, stealthy, impact, investigation, document, protection, accident, vulnerability, malwareTopic 5provider, platform, identity, service, network, subscriber, policy, security, layer_signaling, application
Topic 6firmware, isolation, grid, revocation, inverter, system, preview, attack, sender, emailTopic 6droplet, related, analyte, molecule, portion, commitment, quality, warm, performance, constraint
Topic 7skill, functional, dongle, uiscope, block, mining, ecommerce, conversation, unsolicited, privacy sensitiveTopic 7module, extracted, registered, evidence, verification, set, copy, card, sending, artifact
Topic 8allegation, trusted, poisoning, twitter, label, path, sealer, tkperm, package, escrowTopic 8credential, image, pixel, administrative, standard, digital, private, encoded, region, portion
Topic 9advice, droplet, filtering, netwarden, database, packet, besfs, seal, covert, intelligenceTopic 9domain_name, training, score, accelerator, test, model, legitimate, train, learning, target
Topic 10plane, censor, upload, proxy, nonce_leakage, vulnerability, fuzzing, ecdsa, enclave, tripTopic 10authentication, radar, principal, computing, advanced, weather, banking, login, mobile, surveillance
Table 7. LDA’s cyber security field mapping.
Table 7. LDA’s cyber security field mapping.
Main CategoryMiddle Category20102011201220132014201520162017201820192020
Network Security1. Wired network securityT3T7
T3
T1, T10 T4 T7T1T1T7T2
T3
2. Wireless network securityT5, T6T1, T3T3, T5 T3, T4, T10T1, T8 T2, T3, T6T4
T2, T3, T8
T3
T3, T8
T9
T4, T9
T1, T2, T8T2, T7
T8, T10
T1
T1, T5, T8, T10
T9
T5
3. Cloud securityT5, T8, T3
T2
T2, T6, T7
T2, T4
T2, T3, T10
T2, T4
T2, T4
T3, T6, T9
T5, T6, T7
T4, T5, T6, T7
T6
T2, T4
T7, T8
T1, T7
T2, T5
T3, T7
T3, T4, T5, T8T6, T7T3, T5
T2
Data and application service security4. Application securityT1, T7, T3T5T1, T2, T6, T4, T8T5, T6, T7, T8, T2, T4, T9T5T1, T2, T7
T4, T10
T10
T1, T7
T1T4T1
T4
T2, T6
T2
5. Data securityT2, T4 T4
T3
T10T8, T10T8, T9
T8
T1
T7
T7T3T2, T3T4
T2, T6, T7
6. E-money, Fintech securityT4, T10,
T1, T10
T7
T1, T2, T3, T6
T5
T2, T10
T1T4, T10
T9
T10
T3
T3, T10
T9
T6, T7, T8
T1, T3, T4
T2, T7, T10
T1, T3, T4, T8
T2, T7
7. Digital forensicsT3 T4 T9 T3, T5 T9T3, T10
Physical Security8. Human/bio-recognitionT2, T8T10T4, T7T2T2 T9T9
T9, T10
T3, T9
T10
9. CCTV surveillance/controlT4, T7, T9 T6, T7T7T2
10. Secure search and unmanned electronic guardT3, T5, T9T8, T10T1T2, T4T2, T9T1, T4, T7T10T10T7T7T4
System and password security11. Cryptographic technique T9T4T2T3T7
T5
T6T2T3, T10T3, T5, T9
T9
T8
12. Certification/authorization techniqueT8T3, T5
T1, T7
T1
T7
T3, T9
T7
T4, T6
T1, T8, T9
T7
T9
T1
T2
T4, T6, T7, T9
T3
T2, T4, T9
T4, T7
T3, T6T4, T9
T8, T10
13. Security vulnerabilityT6T4, T6, T7
T2, T9
T8, T10T1, T2, T4, T5, T1, T4, T7T1, T2
T4
T5T5
T4, T6
T9
T4
T1, T5
T2, T5
T2, T6, T8
T6
T1, T6
T4
14. System securityT8T1
T4, T6
T1, T2T6T6
15. MalwareT1, T9T1, T3, T4T2, T6, T7, T9T4, T6
T3
T2T6
T8
T2, T4
T1, T4, T7, T9
T2, T7, T9
T2, T7
T3, T8T1, T8, T10T2, T5
T1, T4
16. Threat analysis and controlT8
T9
T2
T10
T7
T6, T10
T8
T8
T5
T7
T10
T6
T7, T9
T3
T5
T1, T5
T8
T5, T7
T7
T4, T5, T10
T10
T4
IoT Security17. Home city securityT9
T2
T8
T7
T6
T1, T9
T1, T3, T4, T6
T8
T2
T3, T5, T10
T8
T1
T9
T7
T6, T7T2
T5
T4
T2
T2
T7
18. Industrial control system security T8 T3 T8T6
19. Vehicle securityT1 T9
T10
T4
T5
T1
T1, T5, T8
T6T4
T1, T5
T7
T3
20. Ship, ocean, and air security T5 T9 T10
21. Healthcare, Medical securityT6T8
T6
T5, T6, T10, T7T1
T5
T1, T2, T6T3
T2, T3, T8
T2, T6T1 T1
T6
T1, T3
22. Other ICT security T8T3T8 T5T5
T9
Table 8. Cybersecurity convergence area network by major years.
Table 8. Cybersecurity convergence area network by major years.
Visualization in 2010Convergence AreaConnection Keyword
Symmetry 14 00683 i001Healthcare, medical security
Wireless network security
Authentication
CCTV surveillance/control
Cloud security
Data security
Home city security
Human/bio-recognition
Secure search and unmanned electronic guard
Device
Application security
Malware
Malware
CCTV surveillance/control
E-money, fintech security
Secure search and unmanned electronic guard
Method
Cloud security
E-money, fintech security
Secure search and unmanned electronic guard
Network
CCTV surveillance/control
E-money, fintech security
Secure search and unmanned electronic guard
Threat analysis and control
Vehicle security
Security
Cloud security
Secure search and unmanned electronic guard
Wireless network security
User
Visualization in 2012Convergence AreaConnection Keyword
Symmetry 14 00683 i002E-money, fintech security
Home city security
Secure search and unmanned electronic guard
Device
Cloud security
E-money, fintech security
Security
Visualization in 2014Convergence AreaConnection Keyword
Symmetry 14 00683 i003Cloud security
Healthcare, medical security
Human/bio-recognition
Secure search and unmanned electronic guard
Wireless network security
Device
Cloud security
Home city security
Security vulnerability
Wireless network security
Security
Visualization in 2016Convergence AreaConnection Keyword
Symmetry 14 00683 i004Application security
Cloud security
Malware
Data
Healthcare, medical security
Malware
Device
Application security
Cloud security
Malware
Security vulnerability
Wireless network security
Security
Visualization in 2018Convergence AreaConnection Keyword
Symmetry 14 00683 i005Cloud security
E-money, fintech security
Security vulnerability
Threat analysis and control
Data
Certification/authorization technique
Cloud security
E-money, fintech security
Security vulnerability
Device
Cloud security
Eata security
E-money, fintech security
Malware
Malware
Cloud security
E-money, fintech security
Method
E-money, fintech security
Security vulnerability
Security
Certification/authorization technique
E-money, fintech security
User
Visualization in 2020Convergence AreaConnection Keyword
Symmetry 14 00683 i006Application security
Certification/authorization technique
Cloud security
Data security
E-money, fintech security
Home city security
Human/bio-recognition
Malware
Security vulnerability
Wired network security
Attack
Application security
Cloud security
Data security
Healthcare, medical security
Data
Application security
Cloud security
Digital forensics
E-money, fintech security
Healthcare, medical security
Home city security
Human/bio-recognition
Malware
Wired network security
Device
Malware
Security vulnerability
Wireless network security
Network
Application security
Cloud security
Data security
Healthcare, medical Security
Malware
Wireless network security
Security
Malware
Wired network security
Server
Application security
Malware
Security vulnerability
System
Application security
Cloud security
Malware
Security vulnerability
Vulnerability
Table 9. Examples of keywords by DTM thesis and patent topic (2020).
Table 9. Examples of keywords by DTM thesis and patent topic (2020).
Paper TopicKeywordsPatent TopicKeywords
Topic 1computation, efficient, protocol, secure, cryptographic, encryption, practical, implementation, scheme, server, encryptedTopic 1associated, request, access, server, communication, device, network, second, client, authentication, wireless
Topic 2adversary, channel, cache, attacker, defense, network, attack, mechanism, vulnerability, server, threat, authentication, vulnerable, system, demonstrateTopic 2communication, packet, system, mobile, device, network, node, includes, vehicle, computing, control
Topic 3software, policy, control, tool, flow, memory, fuzzing, bug, implementation, vulnerability, application, program, kernelTopic 3memory, industrial, device, cryptographic, processor, includes, value, unit, operation, control
Topic 4binary, detection, feature, detecting, accuracy, tool, classifier, malware, spam, model, detect, technique, domain, maliciousTopic 4software, target, object, test, vulnerability, network, detection, malware, includes, source, sample, identifying, embodiment
Topic 5password, website, user, payment, internet, network, account, site, content, online, service, transactionTopic 5medical, financial, patient, communication, encrypted, healthcare, device, document, transaction, record, secure, message
Topic 6software, policy, author, challenge, technology, risk, issue, trust, secure, cyber security, development, article, community, threat, systemTopic 6home, method, user, searching, system, smart, network, search, result, database, engine, provides, query
Topic 7android, device, user, image, permission, mechanism, mobile, location, access, application, authenticationTopic 7associated, threat, process, system, event, detection, second, includes, action, automation, control
Topic 8enclave, intel, phone, attack, voice, manager, processor, hardware, trusted, system, audioTopic 8service, said, platform, access, customer, entity, container, environment, storage, cloud, policy, virtual
Topic 9router, anonymity, advertisement, workshop, society, internet, network, networking, routing, edge, paper, nodeTopic 9merchandise, component, plurality, system, sensor, vulnerability, configured, includes, risk, score, item
Topic 10storage, provenance, service, provider, process, memory, cloud, monitoring, access, cloud computing, system, overhead, eventTopic 10image, display, camera, content, forensic, digital, position, portion, structure, apparatus, includes, circuit, capture
Table 10. DTM’s cyber security field mapping.
Table 10. DTM’s cyber security field mapping.
Main CategoryMiddle Category2010 Year–2020 Year
Network Security1. Wired network securityT2
2. Wireless network securityT2
T2
3. Cloud securityT10
T8
Data and application service security4. Application securityT9
T6
5. Data securityT6
6. E-money, Fintech securityT5
T5, T10
7. Digital forensics-
Physical Security8. Human/bio-recognition-
9. CCTV surveillance/control-
10. Secure search and unmanned electronic guardT9
System and password security11. Cryptographic techniqueT1
12. Certification/authorization techniqueT8
T1
13. Security vulnerabilityT3
T3
14. System security-
15. MalwareT2, T4
T4
16. Threat analysis and controlT6
T7
IoT Security17. Home city securityT7
T2, T6
18. Industrial control system security-
19. Vehicle security-
20. Ship, ocean, and air security-
21. Healthcare, Medical securityT5, T8
22. Other ICT security-
Table 11. Statistical information on papers and patents in the field of cyber security.
Table 11. Statistical information on papers and patents in the field of cyber security.
Security FieldsNumber of Paper and Patent in Last Year (2019)Average Number of Papers and PatentPaper and Patent CAGR (Number)Average Proportion of Papers and PatentsPaper and Patent CAGR (Proportion)
1. Wired network security5841.408.87%4.25%−0.57%
2. Wireless network security10373.2012.05%7.37%2.33%
3. Cloud security10465.6010.03%6.61%0.49%
4. Application security155121.9010.14%12.54%0.59%
5. Data security5953.2010.51%5.55%0.93%
6. E-money, Fintech security6981.006.85%8.47%−2.41%
10. Secure search and unmanned electronic guard2830.409.87%3.20%0.34%
11. Cryptographic technique6269.50−1.95%7.81%−10.45%
12. Certification/authorization technique3527.203.36%2.94%−5.61%
13. Security vulnerability10377.8010.48%7.74%0.90%
15. Malware12996.1010.16%9.73%0.61%
16. Threat analysis and control8143.7023.64%4.20%12.91%
17. Home city security183144.0012.78%14.57%3.00%
21. Healthcare, Medical security5549.209.65%5.01%0.14%
Table 12. Cyber security convergence areas and connection keywords for a full year.
Table 12. Cyber security convergence areas and connection keywords for a full year.
Convergence NumberConvergence AreaConnection Keywords
1Certification/authorization technique
Home city security
Access
2Malware
Wired network security
Wireless network security
Adversary, attack, attacker, channel, defense
3Home city security
Security vulnerability
Application
4Cloud security
Healthcare, medical security
Cloud
5Certification/authorization technique
Home city security
Wireless network security
Communication
6Home city security
Security vulnerability
Threat analysis and control
Wireless network security
Control, environment
7Cryptographic technique
Security vulnerability
Cryptographic, implementation
8Certification/authorization technique
Home city security
Security vulnerability
Wireless network security
Device
9Application security
Data security
Home city security
Home, search
10E-money, fintech security
Healthcare, medical security
Medical, patient, transaction
11Home city security
Wireless network security
Mobile, node, vehicle
12Application security
Certification/authorization technique
Home city security
Malware
Wired network security
Wireless network security
Network
13Cloud security
Healthcare, medical security
Threat analysis and control
Policy
14Cryptographic technique
E-money, fintech security
Healthcare, medical security
Secure
15Certification/authorization technique
Cryptographic technique
Server
16Malware
Security vulnerability
Software, vulnerability
17Home city security
Threat analysis and control
Wired network security
Wireless network security
System
18Malware
Threat analysis and control
Threat
19E-money, fintech security
Home city security
User
Table 13. Papers and patent statistical information in cyber security convergence area.
Table 13. Papers and patent statistical information in cyber security convergence area.
Security FieldsNumber of Papers and Patents in Last Year (2019)Average Number of Papers and PatentsPaper and Patent CAGR (Number)Average Proportion of Papers and PatentsPaper and Patent CAGR (Proportion)
Convergence 1218171.201 Wiki 0.61%4.05%0.20%
Convergence 2290210.7010.51%4.94%0.11%
Convergence 3286221.8011.90%5.16%1.37%
Convergence 4159114.809.90%2.70%−0.44%
Convergence 5321244.4011.05%5.75%0.60%
Convergence 6470338.7013.28%7.82%2.62%
Convergence 7165147.303.99%3.62%−5.79%
Convergence 8424322.2010.91%7.54%0.47%
Convergence 9397319.1011.34%7.56%0.87%
Convergence 10124130.208.01%3.14%−2.15%
Convergence 11286217.2012.51%5.07%1.93%
Convergence 12663503.8010.45%11.90%0.06%
Convergence 13240158.5012.98%3.66%2.36%
Convergence 14186199.703.54%4.96%−6.20%
Convergence 159796.70−0.34%2.51%−9.71%
Convergence 16232173.9010.30%4.04%−0.07%
Convergence 17425302.3013.31%7.02%2.65%
Convergence 18210139.8013.72%3.22%3.03%
Convergence 19252225.0010.82%5.34%0.39%
Table 14. Cyber security field and convergence sector network for the full year.
Table 14. Cyber security field and convergence sector network for the full year.
Connection Strength (1)Convergence AreaConnection Keyword
Symmetry 14 00683 i007Certification/authorization technique
Home city security
Access
Malware
Wired network security
Wireless network security
Adversary, attack, attacker, channel, defense
Home city security
Security vulnerability
Application
Cloud security
Healthcare, medical security
Cloud
Certification/authorization technique
Home city security
Wireless network security
Communication
Home city security
Security vulnerability
Threat analysis and control
Wireless network security
Control, environment
Cryptographic technique
Security vulnerability
Cryptographic, implementation
Certification/authorization technique
Home city security
Security vulnerability
Wireless network security
Device
Application security
Data security
Home city security
Home, search
E-money, fintech security
Healthcare, medical security
Medical, patient, transaction
Home city security
Wireless network security
Mobile, node, vehicle
Application security
Certification/authorization technique
Home city security
Malware
Wired network security
Wireless network security
Network
Cloud security
Healthcare, medical security
Threat analysis and control
Policy
Cryptographic technique
E-money, fintech security
Healthcare, medical security
Secure
Certification/authorization technique
Cryptographic technique
Server
Malware
Security vulnerability
Software, vulnerability
Home city security
Threat analysis and control
Wired network security
Wireless network security
System
Malware
Threat analysis and control
Threat
E-money, fintech security
Home city security
User
Connection Strength (2)Convergence AreaConnection Keyword
Symmetry 14 00683 i008Malware
Wired network security
Wireless network security
Attack, attacker
Cloud security
Healthcare, medical security
Cloud
Certification/authorization technique
Home city security
Wireless network security
Device
Application security
Certification/authorization technique
Home city security
Malware
Wired network security
Wireless network security
Network
Application security
Data security
Home city security
Search
Connection Strength (3)Convergence AreaConnection Keyword
Symmetry 14 00683 i009Malware
Wired network security
Wireless network security
Attack
Certification/authorization technique
Home city security
Wireless network security
Device
Application security
Home city security
Wireless network security
Network
Connection Strength (4)Convergence AreaConnection Keyword
Symmetry 14 00683 i010Malware
Wired network security
Wireless network security
Attack
Certification/authorization technique
Home city security
Wireless network security
Device
Home city security
Wireless network security
Network
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hwang, S.-Y.; Shin, D.-J.; Kim, J.-J. Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields. Symmetry 2022, 14, 683. https://doi.org/10.3390/sym14040683

AMA Style

Hwang S-Y, Shin D-J, Kim J-J. Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields. Symmetry. 2022; 14(4):683. https://doi.org/10.3390/sym14040683

Chicago/Turabian Style

Hwang, Seung-Yeon, Dong-Jin Shin, and Jeong-Joon Kim. 2022. "Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields" Symmetry 14, no. 4: 683. https://doi.org/10.3390/sym14040683

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop