Research on the Evolutionary Pathway of Science–Technology Topic Associations: Discovering Collaborative and Symmetrical Effects
Abstract
1. Introduction
2. Related Work
2.1. The Interaction of Science–Technology
2.2. The Science–Technology Association Detection Method
3. Research Process
3.1. Research Framework
3.2. Data Acquisition and Preprocessing
3.2.1. Data Acquisition
- (1)
- Paper data. As the core embodiment of scientific research achievements, scientific papers can reflect the latest progress in current research [30]. In this paper, we select the scientific research papers in the field of cybersecurity from the Web of Science database between 2005 and 2024 as the source of paper data. The data samples for this study were collected in January 2025. Using the search formula “TS = (‘network security’ OR ‘cybersecurity’ OR ‘cyber security’ OR ‘cyber-security’)”, a total of 59,328 articles were ultimately obtained.
- (2)
- Patent data. Technological patents are important carriers of technological innovation and can indicate the potential direction of future development in the field [31]. In this paper, we select the Derwent Innovation Index database as the source of patent data. The search keywords are based on the paper data search keywords and include the Derwent manual classification numbers T01-N02B3 (Network security, Anti-Malware) and W05-D05B5E (Security based on preventing or detecting unauthorized network access) [32]. A total of 32,819 patent documents were obtained.
3.2.2. Data Preprocessing
- (1)
- Preprocessing: Remove numbers, punctuation marks, and symbols, etc., from the text. The purpose is to eliminate noise and reduce computational burden. At the same time, convert the words in the text into singular and lowercase forms, and conduct preprocessing operations such as word segmentation and part-of-speech restoration to enhance the accuracy and efficiency of text processing.
- (2)
- Construct the feature word list: Use natural language processing toolkits to perform feature word extraction and other operations on the initial corpus. Subsequently, perform deduplication and filtering operations to obtain the final feature word list and use it as the input for the LDA topic model.
- (3)
- Constructing the invalid word list: To reduce the interference of high-frequency invalid words and improve the accuracy of topic recognition, construct an invalid word list for the target domain based on a general stopword list. Specifically, examine the results after initial LDA topic model clustering, select words with a high frequency but no practical significance, and incorporate them into the general word list. Subsequently, repeatedly iterate the above process to form the final invalid word list.
- (4)
- Stage division: Considering the large time span of literature data, global data analysis may lead to the submergence of important topics, making it difficult to deeply analyze the association between science and technology in the field of cybersecurity. Therefore, following a time series, divide the literature data from 2005 to 2024 into ten stages, with each stage lasting two years.
3.3. Research Methodology
3.3.1. Topic Recognition
3.3.2. Similarity Calculation Based on Weighted Vectors
3.3.3. Recognition of the Evolutionary Types of Science–Technology Topic Associations
3.3.4. Construction of the Evolutionary Pathway of Science–Technology Topic Associations
4. Results
4.1. Stage Topic Recognition
4.1.1. Scientific Topic Recognition
- (1)
- Stage 1 (2005–2006). During this stage, researchers concentrated on cyber threats and carried out systematic research. Their research covered various aspects, including the construction of basic security architecture (“Key Elements”, “Identity”), protection of communication applications (“Blocking Servlet Communication”, “Authorized Passage of Servlets”, “Listing Information”), threat detection (“Detection of Cyberattack”, “Analysis of Cyberattacks”, “Network Traffic Analysis”), and active defense (“Enhancing Capacities to Defend”), with the aim of building a comprehensive cybersecurity defense system.
- (2)
- Stage 2 (2007–2008). With the emergence of trends in large-scale network services and increasing attack complexity, researchers in this stage focused their research on three key directions: identity and access control (“Password Rules”, “Identity Verification and Firewall Policies”, “Authentication”), threat detection and response (“Detection Techniques”, “Policies or Strategies Against DoS”, “Cyberattack”), and systematic defense strategies (“Solutions and Services”, “Data Acquisition and Replication Strategies”).
- (3)
- Stage 3 (2009–2010). Stage 3 continued the research of the previous stage and further advanced in depth. The access control system (“Roles and Access Control”), threat confrontation technologies (“Detection of Cyberattacks”, “Access Control List”, “Cybersecurity Threats”, “Analysis of Attack Graphs”), and defense strategies (“Policy-Based Network Traffic Analysis”) remained the core of the research. It is worth noting that the defense strategies in this stage focused more on the construction of rules (“Establishing Robust Rules”) and methods (“Security Approach”), reflecting the deepening trend from theory to practical application.
- (4)
- Stage 4 (2011–2012). At this stage, scholars continued to follow the existing research directions, focusing on core issues such as identity authentication (“Cryptographic Applications”, “Authentication”), threat detection and response (“Cyberattack”, “Detection of Network Traffic”, “Policy Measures Against Botnet”, “Intrusion Detection Systems”), and defense frameworks (“Vulnerability Management”, “Strategies to Defend”, “The Role of Rules”).
- (5)
- Stage 5 (2013–2014). In this stage, with the outbreak of the Prism Gate incident, the academic community’s attention to privacy protection (“Privacy Protection”) and data security (“Cryptographic Measures Against DDoS”, “The Role and Importance of SSL”) significantly increased. Meanwhile, the continuous emergence of new threats also forced a deep reconstruction and innovation among threat confrontation technologies and defense systems. Specifically, it covered topics such as “Detection of Network Traffic”, “Identification of Cyberattacks”, “Intrusion Detection Systems”, “The Role of Vulnerabilities”, and “The Evolution and Impact of Botnets”.
- (6)
- Stage 6 (2015–2016). In this stage, in the face of severe threats brought about by privacy leaks and the industrialization of ransomware, researchers focused on key topics such as identity and data security (“Authentication Techniques”, “Encryption”, “Identification”) and threat confrontation (“Detection of Botnets”, “Rules for Malware Detection”, “Threat Detection”). Additionally, the emergence of the topic of “Cyberattacks and Defense Strategies” reveals that the cybersecurity defense system gradually started to expand towards proactive defense, highlighting a profound transformation from passive response to tactical prediction.
- (7)
- Stage 7 (2017–2018). In this stage, security authentication (“Password-Based Authentication”) and threat detection and defense technologies (“Detection of Network Traffic”, “Rule-Based Anomaly Detection”, “DoS Attack Consequences”, “Intrusion Detection Systems”) remained the core of research. In addition, researchers gradually attached importance to risk assessment and vulnerability management work, specifically including topics such as “Key Risks”, “The Role of Evaluation in x”, and “Vulnerability”.
- (8)
- Stage 8 (2019–2020). In this stage, cybersecurity was driven by the commercial use of 5G and the remote working wave caused by the COVID-19 pandemic, resulting in an explosive expansion of the attack surface. Meanwhile, cybercrime (“Network Traffic & Cybercrime”) began to emerge, and its means became more diverse and complex. The field of cybersecurity has gradually faced new challenges. Under this background, the focus of scientific research was mainly on threat detection technologies (“The Role of Intrusion Detection Systems”, “Detection of Malware”) and identity vulnerability management (“Role of Authentication in DDoS Defense”, “Validated Techniques for Intrusion”, “Key Identification Techniques”, “Identification of Vulnerabilities”), among other topics.
- (9)
- Stage 9 (2021–2022). In this stage, influenced by acts such as cybercrime (“Role of Cybercrime”), privacy protection and data security (“Private Data Capture and Utilization Precautions”) once again became the focus of researchers. Innovation in intrusion detection and defense technologies, including topics such as “Cyber Defense Strategies”, “Network Traffic Analysis in Intrusion Detection”, “Cyberattack Identification”, and “Firewall Configuration and Secure Network Access Controls”, along with the exploration of emerging technology applications like “Application of Encryption and Cryptographic Policies in Ransomware and Blockchain Technology”, became a research hotspot.
- (10)
- Stage 10 (2023–2024). In this stage, scholars continued to innovate, focusing on the optimization of attack and defense techniques (“Optimization of Intrusion Detection Technology”, “Network Security Risk Assessment”) and the cross-innovation of emerging technologies with traditional defense techniques (“The Application of Blockchain in Cybersecurity”, “Quantum Computing and Anti-Phishing Framework”). Meanwhile, the security requirements in emerging fields such as new infrastructure (“Network Attack Defense for Critical Infrastructure”), Internet of Vehicles (“The Network Security Integration Challenge of Connected Vehicles”), and healthcare Internet of Things (“Medical IoT Security Protection”) also began to attract the attention of researchers, emerging as new research hotspots.
4.1.2. Technical Topic Recognition
- (1)
- Stage 1 (2005–2006). This stage coincides with the period of systematic construction of global cybersecurity technology systems, with technological research and development focusing on the exploration of fundamental security architectures and defense mechanisms. Specifically, it included “Communication Link Security and Authentication Technology”, “Vulnerability Detection and Security Policy Management”, “Network Intrusion Detection and Defense System”, and “Malicious Code and Host Log Analysis”. Furthermore, the widespread adoption of 3G networks and the rise in mobile office demands drove the adaptation of cybersecurity technologies to mobile scenarios. Topics such as “Network Address Security and Trusted Computing”, “Mobile Cybersecurity”, “Content Security and Data Protection”, and “Web Services and Portable Storage Security” became research and development hotspots.
- (2)
- Stage 2 (2007–2008). In this stage, the exploration of defense mechanisms remained the focus of technological research and development. The emergence of topics such as “Message Security and File Management”, “Network Vulnerability Management”, and “Security Operation” reflects the trend of defense mechanisms shifting from passive response to proactive defense. Meanwhile, with the gradual popularization of mobile devices, researchers began to pay attention to terminal security, specifically involving “Mobile Terminal Software and Communication Security”, “Client Security”, and “Memory Protection”. Additionally, with the continuous expansion of enterprise networks and the increase in data volume, the demand for technologies such as packet detection (“Packet Detection”) and communication protocol security (“Communication Protocol Security”) also grew.
- (3)
- Stage 3 (2009–2010). Cybersecurity technologies evolved towards fine-grained approaches during this stage. Building on the previous stage, developers continued to focus on research and development related to terminal security enhancement (“Terminal Control”, “Node Security”, “Terminal Configuration Management”), dynamic defense against network attacks (“Application Layer Protocol Security”, “Malicious Node Identification”, “Data Packet Detection”), and deep protection at the data layer (“Behavioral Pattern Analysis”, “Database Security”).
- (4)
- Stage 4 (2011–2012). During this stage, with the widespread popularity of mobile devices, security technologies built for such devices once again became a development focus. Specifically, it covered “Client-Based Virus Detection and File Scanning Technology” and “Mobile Applications and Server-Side Malicious Code Protection”. Identity management technologies also evolved from single-password authentication to the paradigm of identity verification (“Client Authentication”). Furthermore, the emergence of the two topics of “Service Interface” and “Rule-based Electronic Service Security Event Response Technology” marked a new stage in which security operation and maintenance technology moved from manual intervention to automated strategy execution. It also highlighted the urgent need for API security and compliance management in the context of cloud computing. The emergence of advanced persistent threats also drove the development of more sophisticated detection technologies. For example, topics emerged such as “Cybersecurity Detection Based on Packet Analysis”, “Malicious Code Detection”, and “Node Malware Detection”.
- (5)
- Stage 5 (2013–2014). During this stage, cloud computing and Internet technologies became deeply integrated, resulting in cybersecurity technologies exhibiting characteristics of cloud-based service architecture (“Cybersecurity Service Architecture”, “Web Service Communication Security”). Meanwhile, advanced threat defense (“Malware Detection”, “Malicious Code Addressing”, “Intrusion Detection and Resource Protection”) and mobile terminal device security (“Mobile Device Security”, “Network Content Security Control”) remained the focus of patent technology research and development.
- (6)
- Stage 6 (2015–2016). During this stage, the rapid development of cloud computing continued to bring new security challenges, and security defense technologies at the server and terminal device levels still received close attention from developers. Specifically, this stage included the topics of “Server Based Malicious Code Detection and File Protection” and “Terminal Device Security”. Meanwhile, with the outbreak of the Prism Gate incident, advanced persistent threats and ransomware attacks became more complex and diverse, leading to frequent data breaches. Developers began to intensify their research efforts on authentication technology, traffic analysis, and response management techniques. Specifically, they included topics such as “Network Security Authentication”, “Network Traffic Strategy”, “Domain Name and Content Security Detection”, “File and Image Security Risk Analysis”, “Security Event Response and Resource Management”, and “Malicious Message Detection”.
- (7)
- Stage 7 (2017–2018). During this stage, cloud computing and edge computing achieved large-scale deployment, driving the transformation of enterprise networks towards a distributed architecture. Developers focused on the research of distributed collaborative defense and threat intelligence perception technologies. Specifically, they included topics such as “Distributed Cybersecurity Resource Management”, “Remote Control and Dynamic Network Topology Security”, “Real-Time Threat Detection”, and “Multimedia Threat Detection”. Meanwhile, with the rapid development of the Internet of Things and Internet of Vehicles technologies, technological topics such as “Vehicle Networking and Communication Identity Authentication”, “Terminal Device Storage Security”, and “Security Management for IoT Devices” emerged, indicating that a new infrastructure security architecture was gradually being constructed.
- (8)
- Stage 8 (2019–2020). In this stage, following the development trend of the previous stage, there was an explosive growth in IoT devices, with their security technologies advancing further. This specifically involved topics such as “Embedded System Protection” and “Node Collaborative Defense”. Meanwhile, with the emergence of COVID-19, there was a surge in demand for remote work and cloud services, accelerating the transformation of the zero-trust architecture concept (“Communication Security and Service Authentication”) into technological practice. The application of artificial intelligence technology in the field of cybersecurity became increasingly prevalent and gradually became deeply integrated into the entire process of threat defense. This specifically included topics such as “Malicious Software Detection Technology Based on Multidimensional Feature and Behavior Analysis” and “Terminal Threat Response”.
- (9)
- Stage 9 (2021–2022). In this stage, the impact of COVID-19 continued, and the application of AI in threat detection (“Network Attack Monitoring”) became more sophisticated. Meanwhile, hardware security (“Hardware Security Module for Network”), and zero-trust architecture (“Security Detection and Defense of Terminal Devices”, “Network Node Vulnerability Management”), and other related technologies continued to attract the attention of developers. Furthermore, as more enterprises migrated to the cloud, “Cloud Storage Security” became a key focus area for researchers.
- (10)
- Stage 10 (2023–2024). In this stage, with the continuous evolution and generalization of artificial intelligence technology in the field of cybersecurity, network security technology gradually moved towards autonomous threat detection (“Abnormal Behavior Detection and Log Analysis”, “Malware Detection and Defense”) and automated attack and defense (“Automated Attack and Defense of Attack Surface”, “Hardware Blocks Reinforcement”). The paradigm of AI governance gradually became established. Furthermore, the emergence of emerging computing, such as quantum computing, posed new challenges to communication security. The integrated architecture of quantum cryptography and encryption systems (“Secure Transmission of Data Streams”) attracted the attention of developers.
4.2. Similarity Calculation
- (1)
- The evolutionary type of topic associations: division
- (2)
- The evolutionary type of topic associations: merging
- (3)
- The evolutionary type of topic associations: inheritance
- (4)
- The evolutionary type of topic associations: co-occurrence
5. Discussion
5.1. Discovery of Collaborative Effect
- (1)
- Stage 1 to Stage 4 (2005–2012): the intensive emergence of basic collaboration
- (2)
- Stage 5 to Stage 7 (2013–2018): fluctuation and differentiation of scenario-based collaboration
- (3)
- Stage 8 to Stage 10 (2019–2024): exploration and integration of emerging technologies
5.2. Discovery of Symmetrical Effect
- (1)
- The inter-stage “technology–science–technology” topic evolution
- 1.
- Technology-driven science (problem identification–theoretical abstraction)
- 2.
- Science feeds back into technology (theoretical abstraction–technological innovation)
- (2)
- The same-stage “science–technology/technology–science” topic evolution
6. Conclusions and Future Work
6.1. Conclusions
6.2. Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Zheng, Z.; Ma, Y.; Ba, Z.; Pei, L. Tree knowledge structure for better insight: Capturing biomedical science-technology knowledge linkage with MeSH. J. Informetr. 2024, 18, 101568. [Google Scholar] [CrossRef]
- Cao, K.; Wu, X.N.; Bai, G.Z.; Jin, J.B.; Li, L. Research on Early Identification of Science and Technology Security Risks in Emerging Technologies from the Perspective of “Science-Technology” Linkage. Inf. Stud. Theory Appl. 2025, accepted. [Google Scholar]
- Ba, Z.; Liang, Z. A novel approach to measuring science-technology linkage: From the perspective of knowledge network coupling. J. Informetr. 2021, 15, 101167. [Google Scholar] [CrossRef]
- Zhang, T.; Cui, W.B.; Liu, X.L.; Jiang, L.; Li, J.L. Research on Topic Evolution Path Recognition Based on LDA2vec Symmetry Model. Symmetry 2023, 15, 820. [Google Scholar] [CrossRef]
- Liu, C.L.; Zang, D.Y.; Chen, S. Research on the Correlation Measure and Theme Evolution Law of Science-Technology-Industry: Taking the Field of Biomedicine as an Example. Libr. Inf. Serv. 2024, 68, 95–116. [Google Scholar]
- Carpenter, M.P.; Narin, F. Validation study: Patent citations as indicators of science and foreign dependence. World Pat. Inf. 1983, 5, 180–185. [Google Scholar] [CrossRef]
- Narin, F.; Noma, E. Is technology becoming science? Scientometrics 1985, 7, 369–381. [Google Scholar] [CrossRef]
- Stokes, D.E. Pasteur’s Quadrant: Basic Science and Technological Innovation, 1st ed.; Brookings Institution Press: Washington, WA, USA, 2011. [Google Scholar]
- Yu, Y.Z.; Yang, Z. How to Promote the Effective Play of the Leading Enterprise’s Innovation Chain: A Synergy Innovation Perspective Based on the New Pasteur Quadrant. Nankai Bus. Rev. 2020, 23, 4–15. [Google Scholar]
- Liu, J.; Zhong, Y.H.; He, X.D.; Li, Z.Z.; Zhao, Z.Y. Research on Scientific-Technological-Industrial Association Patterns Based on Multi-relationships Fusion. J. Mod. Inf. 2024, 44, 67–81. [Google Scholar]
- Leung, T.Y.; Sharma, P. Differences in the impact of R&D intensity and R&D internationalization on firm performance–Mediating role of innovation performance. J. Bus. Res. 2021, 131, 81–91. [Google Scholar]
- Liu, X.L.; Tan, Z.Y.; Zhang, C.X. Research Review of “Science-technology Relationship” Research Methods: Highlights on Bibliometrics Method. Libr. Inf. Serv. 2015, 59, 142–148. [Google Scholar]
- Sorenson, O.; Fleming, L. Science and the diffusion of knowledge. Res. Policy 2004, 33, 1615–1634. [Google Scholar] [CrossRef]
- Bassecoulard, E.; Zitt, M. Patents and publications: The lexical connection. In Handbook of Quantitative Science and Technology Research: The Use of Publication and Patent Statistics in Studies of S&T Systems, 1st ed.; Moed, H.F., Wolfgang, G., Ulrich, S., Eds.; Springer: Dordrecht, Netherlands, 2004; pp. 665–694. [Google Scholar]
- Li, X. On Similarities and Differences of Science and Technology. J. Dialectics Nat. 2007, 52, 1–9+110. [Google Scholar]
- Gardner, P. Representations of the Relationship between Science and Technology in the Curriculum. Stud. Sci. Educ. 1994, 24, 1–28. [Google Scholar] [CrossRef]
- Liang, Z.; Mao, J.; Li, G. Integrating Science-Technology Knowledge Linkage to Predict Disruptive Patents. J. China Soc. Sci. Tech. Inf. 2023, 42, 649–662. [Google Scholar]
- Dong, K.; Xu, H.Y.; Luo, R.; Wang, C.; Fang, S. Review of the Research on Relationship between Science and Technology. J. China Soc. Sci. Tech. Inf. 2018, 37, 642–652. [Google Scholar]
- Teng, Z.; Zhu, X. Measuring the global and domestic technological impact of Chinese scientific output: A patent-to-paper citation analysis of science-technology linkage. Scientometrics 2024, 129, 5181–5210. [Google Scholar] [CrossRef]
- Xu, S.; Liu, Z.; An, X.; Wang, H.; Pang, H. Linkages among science, technology, and industry on the basis of main path analysis. J. Informetr. 2025, 19, 101617. [Google Scholar] [CrossRef]
- Li, X.; Zhao, D.; Hu, X. Gatekeepers in knowledge transfer between science and technology: An exploratory study in the area of gene editing. Scientometrics 2020, 124, 1261–1277. [Google Scholar] [CrossRef]
- Zhao, H.; Leng, F.H. Relationship Between Science and Technology Research Frontiers from the Perspective of Academic Inventors. China Invent. Pat. 2021, 18, 3–12. [Google Scholar]
- Song, Y.H.; Chen, X.Q. Co-occurrence Mapping between Chinese Library Classification and International Patent Classification Categories Based on Author’s Research Similarity. J. China Soc. Sci. Tech. Inf. 2024, 43, 927–935. [Google Scholar]
- Xu, S.; Sun, T.F.; Luo, G.Y.; Yuan, Z.T.; Lian, J.X. Science-Technology Interactions from the Perspective of Bidirectional Mapping of Classification Systems. China Invent. Pat. 2024, 21, 4–15. [Google Scholar]
- Chen, X.; Ye, P.; Huang, L.; Wang, C.; Cai, Y.; Deng, L.; Ren, H. Exploring science-technology linkages: A deep learning-empowered solution. Inf. Process. Manage. 2023, 60, 103255. [Google Scholar] [CrossRef]
- Liu, T. Knowledge Correlation and Its Pattern Characteristics: Analysis Based on Fundamental Research and Technological Innovation. Inf. Sci. 2024, 42, 64–71+79. [Google Scholar]
- Blei, D.M.; Ng, A.Y.; Jordan, M.I. Latent dirichlet allocation. J. Mach. Learn. Res. 2003, 3, 993–1022. [Google Scholar]
- Zhang, T.; Li, Z.; Qi, Y. Research on digital literacy literature: Topic mining and evolutionary analysis. J. Librariansh. Inf. Sci. 2025, 35, 09610006241309645. [Google Scholar] [CrossRef]
- Feng, S.; Li, H.; Qi, Y. How to detect the sleeping beauty papers and princes in technology considering indirect citations? J. Informetr. 2023, 17, 101431. [Google Scholar] [CrossRef]
- Zhang, T.; Wang, H.; Yu, T.; Ma, H. Research on Data Security Policies and Scientific Topics Collaborative in China Based on Text Computing. J. Mod. Inf. 2024, 44, 99–107. [Google Scholar]
- Zhang, Y.J.; Ba, Z.C.; Meng, K.; Liu, L.L.; Wang, L.H. Multidimensional Coupling and Co-evolution of Frontier Science and Technology in Emerging Industries: A “Network-to-Time Series” Equivalence Transformation Perspective. J. Mod. Inf. 2025. accepted. [Google Scholar]
- Zhao, R.Y.; Chang, R.R.; Li, D.Y.; Dai, W.B. Research on the Evaluation of Patentee’s Discourse Power Based on Author-Topic Model: Take the Network Security Field as an Example. Inf. Stud. Theory Appl. 2021, 44, 36–43. [Google Scholar]
- Li, Z. Cybersecurity_science-technology_data. Figshare. Dataset. Available online: https://doi.org/10.6084/m9.figshare.28788071.v1 (accessed on 14 April 2025).
- Ma, Y.H.; Kong, L.K.; Lin, C.R.; Yang, X.M.; Ni, H.L. Research on the Identification of Disruptive Technologies Based on Heterogeneous Data——An Example in the Field of Intelligent Manufacturing Equipment. J. Mod. Inf. 2022, 42, 92–104. [Google Scholar]
- Mikolov, T.; Chen, K.; Corrado, G.; Dean, J. Efficient estimation of word representations in vector space. arXiv 2013, arXiv:1301.3781. [Google Scholar]
- Mikolov, T.; Sutskever, I.; Chen, K.; Corrado, G.; Dean, J. Distributed representations of words and phrases and their compositionality. Adv. Neural Inf. Process. Syst. 2013, 26, 3111–3119. [Google Scholar]
- Yang, H.; Wang, Y.; Zhang, L. Technology prediction based on core patents technology topic recognition and evolution analysis. J. Intell. 2022, 7, 49–56. [Google Scholar]
- Zhu, Y.; Li, Z.; Li, T.; Jiang, L. Topic recognition and refined evolution path analysis of literature in the field of cybersecurity. PLoS ONE 2025, 20, e0319201. [Google Scholar] [CrossRef]
- Silva, S.; Silva, R.; Pinto, R.; Salles, R. Botnets: A survey. Comput. Netw. 2013, 57, 378–403. [Google Scholar] [CrossRef]
- Hameed, S.; Kloht, T.; Fu, X. Identity based email sender authentication for spam mitigation. In Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), Islamabad, Pakistan, 10–12 September 2013; pp. 14–19. [Google Scholar]
- Rabash, A.J.; Nazri, M.Z.A.; Shapii, A.; Hasan, M.K. Non-dominated sorting genetic algorithm-based dynamic feature selection for intrusion detection system. IEEE Access 2023, 11, 125080–125093. [Google Scholar] [CrossRef]
- Lin, H.; Xue, Q.; Feng, J.; Bai, D. Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digit. Commun. Netw. 2023, 9, 111–124. [Google Scholar] [CrossRef]
- Getman, A.I.; Rybolovlev, D.A.; Nikolskaya, A.G. Deep Learning Applications for Intrusion Detection in Network Traffic. Program. Comput. Softw. 2024, 50, 493–510. [Google Scholar] [CrossRef]
- Diaba, S.Y.; Anafo, T.; Tetteh, L.A.; Oyibo, M.A.; Alola, A.A.; Shafie-Khah, M.; Elmusrati, M. SCADA securing system using deep learning to prevent cyber infiltration. Neural Netw. 2023, 165, 321–332. [Google Scholar] [CrossRef]
Topic Types | Description of Determination Criteria |
---|---|
Division | When s > γ, a scientific/technological topic in the previous stages can be divided into two or more technological/scientific topics in the current stage. |
Merging | When s > γ, two or more scientific/technological topics in the previous stages can be merged into a single technological/scientific topic in the current stage. |
Inheritance | When s > γ, the scientific/technological topic at the previous stage has a collaborative relationship with the technological/scientific topic in the current stage. |
Co-occurrence | When s > γ, there is collaboration between the scientific and technological topics in the current stage. |
Independent development | When s < γ, the science–technology topic has low similarity. |
Stages | Topic Words |
---|---|
Stage 1 | 1_1 (Key Elements); 1_2 (Detection of Cyberattack); 1_3 (Blocking Servlet Communication); 1_4 (Authorized Passage of Servlets); 1_5 (Analysis of Cyberattacks); 1_6 (Listing Information); 1_7 (Identity); 1_8 (Enhancing Capacities to Defend); 1_9 (Network Traffic Analysis); |
Stage 2 | 2_1 (Detection Techniques); 2_2 (Policies or Strategies Against DoS); 2_3 (Password Rules); 2_4 (Identity Verification and Firewall Policies); 2_5 (Solutions and Services); 2_6 (Cyberattack); 2_7 (Authentication); 2_8 (Data Acquisition and Replication Strategies); |
Stage 3 | 3_1 (Establishing Robust Rules); 3_2 (Detection of Cyberattacks); 3_3 (Roles and Access Control); 3_4 (Access Control List); 3_5 (Cybersecurity Threats); 3_6 (Analysis of Attack Graphs); 3_7 (Security Approach); 3_8 (Policy-Based Network Traffic Analysis); |
Stage 4 | 4_1 (Cyberattack); 4_2 (Detection of Network Traffic); 4_3 (Vulnerability Management); 4_4 (Policy Measures Against Botnet); 4_5 (Strategies to Defend); 4_6 (Intrusion Detection Systems); 4_7 (The Role of Rules); 4_8 (Cryptographic Applications); 4_9 (Authentication); |
Stage 5 | 5_1 (Detection of Network Traffic); 5_2 (Identification of Cyberattacks); 5_3 (Cryptographic Measures Against DDoS); 5_4 (Intrusion Detection Systems); 5_5 (Privacy Protection); 5_6 (The Role of Vulnerabilities); 5_7 (The Role and Importance of SSL); 5_8 (The Evolution and Impact of Botnets); |
Stage 6 | 6_1 (Authentication Techniques); 6_2 (Detection of Botnets); 6_3 (Rules for Malware Detection); 6_4 (Encryption); 6_5 (Identification); 6_6 (Threat Detection); 6_7 (Cyberattacks and Defense Strategies); |
Stage 7 | 7_1 (Password-Based Authentication); 7_2 (Detection of Network Traffic); 7_3 (Key Risks); 7_4 (The Role of Evaluation in x); 7_5 (Rule-Based Anomaly Detection); 7_6 (DoS Attack Consequences); 7_7 (Vulnerability); 7_8 (Intrusion Detection System); |
Stage 8 | 8_1 (Role of Authentication in DDoS Defense); 8_2 (The Role of Intrusion Detection Systems); 8_3 (Network Traffic & Cybercrime); 8_4 (Validated Techniques for Intrusion); 8_5 (Key Identification Techniques); 8_6 (Identification of Vulnerabilities); 8_7 (Detection of Malware); |
Stage 9 | 9_1 (Cyber Defense Strategies); 9_2 (Network Traffic Analysis in Intrusion Detection); 9_3 (Role of Cybercrime); 9_4 (Cyberattack Identification); 9_5 (Firewall Configuration and Secure Network Access Controls); 9_6 (Private Data Capture and Utilization Precautions); 9_7 (Application of Encryption and Cryptographic Policies in Ransomware and Blockchain Technology); |
Stage10 | 10_1 (Optimization of Intrusion Detection Technology); 10_2 (Network Security Risk Assessment); 10_3 (The Application of Blockchain in Cybersecurity); 10_4 (Network Attack Defense for Critical Infrastructure); 10_5 (The Network Security Integration Challenge of Connected Vehicles); 10_6 (Medical IoT Security Protection); 10_7 (Quantum Computing and Anti Phishing Framework); |
Stages | Topic Words |
---|---|
Stage 1 | 1_1 (Communication Link Security and Authentication Technology); 1_2 (Vulnerability detection and security policy management); 1_3 (Network Intrusion Detection and Defense System); 1_4 (Malicious Code and Host Log Analysis); 1_5 (Network Address Security and Trusted Computing); 1_6 (Mobile Cybersecurity); 1_7 (Content Security and Data Protection); 1_8 (Web Services and Portable Storage Security); |
Stage 2 | 2_1 (Mobile Terminal Software and Communication Security); 2_2 (Packet Detection); 2_3 (Communication Protocol Security); 2_4 (Client Security); 2_5 (Memory Protection); 2_6 (Message Security and File Management); 2_7 (Network Vulnerability Management); 2_8 (Security Operation); |
Stage 3 | 3_1 (Terminal Control); 3_2 (Node Security); 3_3 (Application Layer Protocol Security); 3_4 (Malicious Node Identification); 3_5 (Data Packet Detection); 3_6 (Terminal Configuration Management); 3_7 (Behavioral Pattern Analysis); 3_8 (Database Security); |
Stage 4 | 4_1 (Client Based Virus Detection and File Scanning Technology); 4_2 (Cybersecurity Detection Based on Packet Analysis); 4_3 (Malicious Code Detection); 4_4 (Service Interface); 4_5 (Mobile Applications and Server-Side Malicious Code Protection); 4_6 (Node Malware Detection); 4_7 (Rule based Electronic Service Security Event Response Technology); 4_8 (Client Authentication); |
Stage 5 | 5_1 (Malware Detection); 5_2 (Intrusion Detection and Resource Protection); 5_3 (Malicious Code Addressing); 5_4 (Mobile Device Security); 5_5 (Cybersecurity Service Architecture); 5_6 (Web Service Communication Security); 5_7 (Network Content Security Control); |
Stage 6 | 6_1 (Server Based Malicious Code Detection and File Protection); 6_2 (Network Security Authentication); 6_3 (Terminal Device Security); 6_4 (Network Traffic Strategy); 6_5 (Domain Name and Content Security Detection); 6_6 (File and Image Security Risk Analysis); 6_7 (Security Event Response and Resource Management); 6_8 (Malicious Message Detection); |
Stage 7 | 7_1 (Distributed Cybersecurity Resource Management); 7_2 (Remote Control and Dynamic Network Topology Security); 7_3 (Real Time Threat Detection); 7_4 (Vehicle Networking and Communication Identity Authentication); 7_5 (Multimedia Threat Detection); 7_6 (Terminal Device Storage Security); 7_7 (Security Management for IoT Devices); |
Stage 8 | 8_1 (Malicious Software Detection Technology Based on Multidimensional Feature and Behavior Analysis); 8_2 (Terminal Threat Response); 8_3 (Embedded System Protection); 8_4 (Node Collaborative Defense); 8_5 (Communication Security and Service Authentication); |
Stage 9 | 9_1 (Security Detection and Defense of Terminal Devices); 9_2 (Network Attack Monitoring); 9_3 (Cloud Storage Security); 9_4 (Hardware Security Module for Network); 9_5 (Network Node Vulnerability Management); |
Stage 10 | 10_1 (Abnormal Behavior Detection and Log Analysis); 10_2 (Malware Detection and Defense); 10_3 (Secure Transmission of Data Streams); 10_4 (Automated Attack and Defense of Attack Surface); 10_5 (Hardware Blocks Reinforcement); |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Feng, Y.; Li, Z.; Zhang, T. Research on the Evolutionary Pathway of Science–Technology Topic Associations: Discovering Collaborative and Symmetrical Effects. Appl. Sci. 2025, 15, 6865. https://doi.org/10.3390/app15126865
Feng Y, Li Z, Zhang T. Research on the Evolutionary Pathway of Science–Technology Topic Associations: Discovering Collaborative and Symmetrical Effects. Applied Sciences. 2025; 15(12):6865. https://doi.org/10.3390/app15126865
Chicago/Turabian StyleFeng, Yin, Zheng Li, and Tao Zhang. 2025. "Research on the Evolutionary Pathway of Science–Technology Topic Associations: Discovering Collaborative and Symmetrical Effects" Applied Sciences 15, no. 12: 6865. https://doi.org/10.3390/app15126865
APA StyleFeng, Y., Li, Z., & Zhang, T. (2025). Research on the Evolutionary Pathway of Science–Technology Topic Associations: Discovering Collaborative and Symmetrical Effects. Applied Sciences, 15(12), 6865. https://doi.org/10.3390/app15126865