Supercomputers and quantum computing on the axis of cyber security

被引:2
|
作者
Yalcin, Haydar [1 ,2 ]
Daim, Tugrul [2 ]
Moughari, Mahdieh Mokhtari [4 ]
Mermoud, Alain [3 ]
机构
[1] Ege Univ, Management Informat Syst, Izmir, Turkiye
[2] Portland State Univ, Mark O Hatfield Cybersecur & Cyber Def Policy Ctr, Portland, OR 97201 USA
[3] Armasuisse Sci & Technol, Cyber Def Campus,EPFL Innovat Pk, Lausanne, Switzerland
[4] Portland State Univ, Engn & Technol Management, Portland, OR 97207 USA
关键词
Cybersecurity; Quantum computing; Bibliometrics; Research landscape; SCIENCE-AND-TECHNOLOGY; INTERNATIONAL COLLABORATION; BETWEENNESS CENTRALITY; CYBERSECURITY; SCIENTISTS; KNOWLEDGE; IMPACT; MAPS;
D O I
10.1016/j.techsoc.2024.102556
中图分类号
D58 [社会生活与社会问题]; C913 [社会生活与社会问题];
学科分类号
摘要
Cybersecurity has become a very critical area to address for governments, industry and the academic community. Cyber attacks are on the rise so is research to address the challenges presented by these attacks. Research yields several technological advancements. This paper explores the development of quantum computing and supercomputers within the context of cybersecurity. As many governments and organizations are under the threat of cyber-attacks, it is critical and timely to explore the status of technological development. We use advanced scientometric techniques to disclose the development status and identify the centers of excellence. The research uses bibliometric data of published papers and utilizes an integration of scientometric methods including social network analysis, entropy analysis, cluster analysis, overlay maps and knowledge diffusion analysis as well as keyword and source analyses.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] THE SCIENCE OF COMPUTING - EVALUATING SUPERCOMPUTERS
    DENNING, PJ
    AMERICAN SCIENTIST, 1987, 75 (02) : 130 - 132
  • [22] The role and security of firewalls in cyber-physical cloud computing
    Ullrich, Johanna
    Cropper, Jordan
    Fruehwirt, Peter
    Weippl, Edgar
    EURASIP JOURNAL ON INFORMATION SECURITY, 2016,
  • [23] Cyber security threats, challenges and defence mechanisms in cloud computing
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    IET COMMUNICATIONS, 2020, 14 (07) : 1185 - 1191
  • [24] Assessing cyber security coverage in non-computing disciplines
    Furnell S.
    Stavrou E.
    Computer Fraud and Security, 2023, 2023 (10):
  • [25] Network Intrusion Detection for Cyber Security on Neuromorphic Computing System
    Alom, Md Zahangir
    Taha, Tarek M.
    2017 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2017, : 3830 - 3837
  • [26] Defining and computing a value based cyber-security measure
    Ben Aissa, Anis
    Abercrombie, Robert K.
    Sheldon, Frederick T.
    Mili, Ali
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 433 - 453
  • [27] Applying Parallel and Distributed Computing Curriculum to Cyber Security Courses
    Velea, Radu
    Ilie, Valentin
    Bica, Ion
    PROCEEDINGS OF EDUHPC 2020: WORKSHOP ON EDUCATION FOR HIGH PERFORMANCE COMPUTING, 2020, : 12 - 18
  • [28] State-of-The-Art of Cloud Computing Cyber-Security
    Bennasar, Hanane
    Essaaidi, Mohammad
    Bendahmane, Ahmed
    Ben-othman, Jalel
    PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [29] Defining and computing a value based cyber-security measure
    Anis Ben Aissa
    Robert K. Abercrombie
    Frederick T. Sheldon
    Ali Mili
    Information Systems and e-Business Management, 2012, 10 : 433 - 453
  • [30] A Cloud Computing Based Architecture for Cyber Security Situation Awareness
    Yu, Wei
    Xu, Guobin
    Chen, Zhijiang
    Moulema, Paul
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 488 - 492