You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

25 March 2022

Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields

,
and
1
Department of Computer Engineering, University of Anyang, Anyang-si 14058, Korea
2
Department of Software, University of Anyang, Anyang-si 14058, Korea
*
Author to whom correspondence should be addressed.

Abstract

Recently, as core technologies leading the fourth industrial revolution, such as the Internet of Things (IoT), 5G, the cloud, and big data, have promoted smart convergence across national socio-economic infrastructures, cyber systems are expanding and becoming complex, and they are not effective in responding to cyber safety risks and threats using security technology solutions limited to a single system. Therefore, we developed cyber security technology that combines machine learning and AI technology to solve complex problems related to cyber safety. In this regard, this study aims to identify technology development trends to prevent the risks and threats of various cyber systems by monitoring major cyber security convergence fields and technologies through the symmetrical thesis and patent analysis. Because thesis information can explain the superiority of technology and patent information can explain the usefulness of a technology, they can be effectively used for analyzing and predicting technology development trends. Therefore, in this study, latent Dirichlet allocation is applied to extract text-document-based technical topics for the symmetrical thesis and patent information to identify security convergence fields and technologies for cyber safety. In addition, it elucidates cyber security convergence fields and technology trends by applying a dynamic topic model and long short-term memory, which are useful for analyzing technological changes and predicting trends. Based on these results, cyber security administrators, system operators, and developers can effectively identify and respond to trends in related technologies to reduce threats, and companies and experts developing cyber security solutions can present a new security approach.

1. Introduction

The scale of cyber systems is increasing as cyberspace in various fields has rapidly converged, owing to the practical use of innovative technologies that lead the fourth industrial revolution such as IoT, cloud computing, big data, 5G, robots, and drones based on artificial intelligence. Accordingly, as various advanced technologies converge to cyber systems, dangerous fields and factors that cause serious security threats as well as conditions and actions have become extremely complex [1].
It is not effective to minimize cyber safety risks using conventional security technology approaches that focus on specific security issues in individual cyber systems or sectors [2]. It is crucial to focus on the common cyber safety issues shared by cyber sectors and systems across industries [3].
Therefore, cyber safety management, which reduces major risk factors by achieving security technology convergence in the core field of the fourth industrial revolution, has been emphasized [4]. Recently, an integrated security solution that can solve these complex cyber security problems has been developed [5,6,7,8,9,10,11].
With the development of the fourth industrial revolution, the era of “super-connection” has arrived, in which information technology (IT), physical (physical), manufacturing operation (OT), and Internet of Things (IoT) systems, which were previously operated in different networks, are connected to each other. Although the core technologies that led to the fourth industrial revolution, such as IoT, big data, artificial intelligence, and cloud computing, are advancing our lives, the scope of cyber threats is gradually expanding and increasing, and attacks that cross different industries or systems occur every year [12,13,14,15]. Therefore, a new security paradigm is required to respond to such complex threats.
Cyber security, such as information security, aims to ensure confidentiality, integrity, and availability [16]. The types of attacks that threaten cyber security goals continue to evolve as technology advances, causing significant problems in our lives, and they will have a greater impact in the future. To solve this problem, international standards related to cyber security and research on various cyber security technologies are in progress [17,18,19]. International standards related to cyber security are being established based on the ISO/IEC 27000 series, known as information security management systems. ISO/IEC 27000, and related organized information is shown in Table 1.
Table 1. Leading international cyber security standard.
ISO/IEC 27100 [20] contains general concepts on cyber security and definitions related to cyber security used in various standards, and ISO/IEC 27101 [21] contains guidelines for developing and implementing cyber security frameworks in organizations. ISO/IEC 27102 [22] includes guidelines for introducing cyber insurance as a measure for managing the impact of cyber incidents within an organization, and ISO/IEC 27103 [23] contains information on how organizations can systematically manage cyber security by utilizing cyber security frameworks based on information security standards.
ISO/IEC 27032 [24] contains an overview of cyber security, relationships between cyber security and other types of security, definitions of stakeholders and roles in cyber security, as well as guidelines for addressing general cyber security issues. These standards prevent unintended cyber risks and eliminate threats based on technical and engineering solutions [25]. Therefore, understanding technology convergence enables cyber security technicians and administrators to plan, develop, and maintain cyber security systems according to various standards [26].
Checkpoint, the world’s largest security solution company, based on the changes in cyber security incidents over the past decade by era, as shown in Figure 1, with the WannaCry attack that occurred in April 2017 as a boundary, is predicted as the process of transitioning from the time period to the fifth-generation security period [27]. The development of next-generation security technology can form the core of next-generation technology development to respond to mega-attacks against vulnerabilities in hyperconnected IT systems in real time. The implementation of the concept of zero trust or SOAR, which goes through an ID verification process before granting access rights to all objects that want to access the system, will become the center of the development of the fifth generation of cyber security technology.
Figure 1. Evolution process and characteristics of cyber security technology by generation.
Despite the importance of these cyber security standards and technological improvements, most previous studies have been limited to the development of individual security technology solutions by security technology experts or technology improvements related to the security management tasks of system administrators [28,29]. Conversely, various studies have been trying to identify research trends in cyber security technology based on empirical analysis of academic papers, patents, and technical reports [30,31]. However, the perspective of policy and management in terms of technological innovation for monitoring cyber security convergence fields and technology has not been sufficiently considered in academia and practice in the field of cyber security. To design a cyber system by predicting the requirements of cyber security convergence fields and technologies, research to understand the important trends in cyber security convergence fields and technologies is essential [32,33]. By identifying key cyber security convergence areas and technologies, policymakers can plan a holistic roadmap for related industries and cyber security [34,35]. In addition, monitoring technology trends in the field of cyber security enables cyber security managers, system operators, and developers to introduce effective and useful technologies for the development or operation of reliable and robust cyber systems.
Therefore, this study aims to monitor the main fields of cyber security technology and identify the convergence fields for its development. This objective can be achieved by analyzing papers and patents. Papers contain experimentally proven knowledge and skills, whereas patents contain practical technologies based on scientific principles; therefore, it is more efficient for meaningful empirical analysis [36,37]. Thus, the analysis of papers and patents is a useful way to provide an overview of the novelty and innovativeness of various technologies in the field of cyber security.
This study extracts and analyzes major keywords in cyber security convergence fields and technologies by focusing on probabilistic topic model techniques based on text analysis of papers and patents. Therefore, this study applies a systematic approach to applying these three techniques. First, the main topics and key keywords were extracted from papers and patents using the latent Dirichlet allocation (LDA) algorithm, which can estimate both the distribution of keywords by topic and the distribution of topics by document [38,39]. The extracted topic identifies the cyber security field composed of related technology keywords and derives the cyber security convergence field based on the connected keywords for each field. These results provide information that can be used to identify threats and risks in the new cyber security field.
Second, we analyze changes in cyber security convergence fields and technologies using the dynamic topic model (DTM) algorithm, which can analyze the changes in topics according to time series [40,41]. By monitoring the trends in the cyber security field and convergence field over time, the continuity of the convergence, new convergence, and non-convergence fields are extracted. These results can provide a clear overview of technological progress in cyber security as well as help researchers and practitioners examine emerging cyber security technologies and convergence issues.
Third, we predict trends in cyber security convergence fields and technologies using the long short-term memory (LSTM) algorithm, which can predict future data by considering not only previous data but also macroscopic past data [42,43]. The future development trend of the cyber security convergence field and technology is predicted based on the analysis of changes in the cyber security field and technology using the keywords connected by each cyber security convergence field. Additionally, we predicted the degree of binding and aggregation of the convergence field. These results suggest a novel security approach in cyber security and, in the long term, provide evidence for planning a technology roadmap.
The remainder of this paper is organized as follows: In the Introduction, the background of this study and the importance of identification and prediction of cyber security technology and convergence fields were mentioned. Additionally, three core research approaches based on deep learning were introduced. In Section 2, we examine ICT strategic and cyber security technology trends to derive cyber security technology convergence fields, cyber security keywords, and security areas. In addition, the contributions, discussion, and insights of this study are emphasized. Section 3 introduces the data collection method used in this study, and the cyber security technology and deep learning algorithms for convergence identification and prediction are described in detail. Section 4 describes the processed experimental data in detail and explains the recent cyber security trend analysis, cyber security keyword extraction, and domain identification analysis processes based on deep learning. In addition, trends in the convergence field were analyzed based on the extracted keywords and areas. Section 5 analyzes and predicts trends in the cyber security convergence area by extracting connection keyword information through in-depth analysis of the cyber security convergence area and applying it to a deep learning algorithm. Finally, the insights and limitations of this study and future research directions are presented in the conclusion.

2. Cyber Security Technology Convergence

2.1. ICT Strategic Technology Trend

To identify the cyber security convergence field and the related core technologies and conduct research to suggest future cyber security technology convergence directions, it is necessary to understand the trends in ICT technology to which cyber security technologies are applied and utilized. The 10 strategic technologies that Gartner, a global IT research firm, announces every year are representative trend predictions that predict how the IT industry will change [44]. Table 2 summarizes Gartner’s forecasts for the top 10 IT strategic technologies from 2011 to 2020.
Table 2. Gartner IT top 10 strategic technologies for 11 years (2011–2020).
To obtain a more meaningful look at Gartner’s announcement, we need to look at the trends in technology that changed over the past 11 years, not just what we have picked as strategic technologies for the next year. That is, the period for which a particular technology is included in the Gartner’s top ten technologies depends on the period in which the technology takes root, and some technologies disappear within a short period of time after being selected or reappearing over the years. IT trends, such as artificial intelligence, robots, 5G, drones, interactive platforms, immersive media, and blockchain, seem to be different technologies, but technologies will be connected and intelligent in the era of the fourth industrial revolution; therefore, it is necessary to look at them in connection. For instance, as IT technologies have a very close interrelationship, the security technologies of cyber systems to which IT technologies are applied also emphasize new ultra-security to which various types of convergence security technologies are applied.

2.2. Cyber Security Technology Trends

When estimating next-generation security technologies, it is useful to utilize the hype cycle developed by Gartner, as shown in Figure 2. The cycle consisted of five phases: technology trigger, peak of inflated expectations, trough of disillusionment, slope of enlightenment, and plateau of productivity. The next-generation security technology area is mainly located in the first, the technology trigger, and second stages, the peak stage of expectations [45].
Figure 2. Gartner’s risk management criteria for next-generation security technology area prediction.
As a result of analyzing the above data, next-generation security technology is an integrated cyber security technology that can respond to mega-attacks targeting all areas of cyber security in real time to realize the safety, reliability, and resilience of a hyper-connected platform based on IoT and 5G. Technological development can proceed with the goal of cyber risk management.
Therefore, from the development of security-equipment-centered technology that has been mainstream up to the fourth generation of security, using AI-related techniques such as deep learning to proactively respond to the evolution of attackers (predictive intelligence) and abnormal behavior through the automatic learning of normal behavior, behavioral analytics/anomaly detection that detects behavior, automated security that protects and processes large volumes of traffic from endpoints, deception security that responds to mutant viruses and zombies, and low-risk unnecessary dark data identification technology that automatically deletes data can form the mainstream of next-generation security technology development.
In addition, at the national level, in preparation for the evolution of cyber-attacks that are systematic and intentionally attempted to create social chaos or steal state secrets, the cyber kill chain, a so-called cyber-strike cycle, is a concept that blocks threats applied at each stage of attack in advance. Cyber kill chain technology and security rating services (SRS) for the security supply chain could be actively studied. To actively respond to the uncertain and dynamic changes in future, it is essential to strengthen forecasts for the future and establish a strategy based on the results. Therefore, it is important to identify future-oriented cyber security convergence fields and technologies.

2.3. Field of Cyber Security

In this study, the cyber security field was derived based on the Gartner’s IT strategy technology trend in Section 2.1 and the Gartner’s hype cycle in Section 2.2. First, key keywords related to the 10 strategic technologies selected from the IT trends by year from 2010 to 2020 were derived. As introduced in Section 2.1, Gartner selects and announces 10 trend keywords expected to appear in the next year under the name of “Top 10 Strategic Trends” in October every year. The 10 strategic trends are based on analysts’ analysis, and the final 10 trend keywords are determined by considering the interests of the company and its customers. In the early stages of the study, we attempted to select a “10 trends” similarly to Gartner, but authors and experts gathered to line up dozens of keywords and compress the trends through regular online meetings and several offline meetings to extract more optimal trends. The strategic technologies and keywords derived from the top ten strategic technologies in 2019 are listed in Table 3 [44].
Table 3. Strategic skills and keywords.
Based on the compressed strategic technology trends listed in Table 3, we first classified the major categories, middle classes using the technology names of the hype cycle from 2016 to 2019, and finally sub-classifications using the relevant detailed technology names (keywords). For instance, as summarized in Table 4, network security is set as a major classification essential for “artificial intelligence”, “5G”, and an “interactive platform” strategic technology, and it is classified as a medium classification using “cloud security assessments”, the technology name of the 2019 hype cycle. Select “Cloud Security”. In addition, when mapping topics extracted from future research experiments, “virtualization platform security”, cloud security services, and “software-defined security” are specified as sub-categories for the comparison of related keywords.
Table 4. Cyber security field.
The cyber security areas derived based on keywords derived from IT strategy technology from 2010 to 2020 and keywords mentioned in the hype cycle are summarized in Table 4.
The final cyber security domain derived, as summarized in Table 4, was divided into five major categories, 22 medium categories, and 65 small categories. In this study, using keywords in topics extracted from papers and patents, the topics were mapped to the cyber security areas in Table 4.

2.4. Contribution, Discussion, and Insights from This Study

The contributions of this study are as follows:
First, it monitors key cyber security convergence fields and technologies to provide practical insights to companies and experts for developing cyber security solutions. This is the first approach to understanding the types of cyber security technology convergence fields and the changes in the development of cyber security technology.
Second, by visualizing cyber security convergence fields and technologies, it monitors the core technologies that are being developed, mainly for cyber security.
The main discussions of this study are as follows:
First, according to the cyber security convergence trend, cyber security technology is mainly being developed in the fields of home city, wireless network, application, authentication/authorization technology, wired network, security vulnerabilities, threat analysis, and control. Cyber security technology is directly or indirectly related to cyber security administrators as well as system operators and developers.
Second, this study shows core cyber security technologies based on keywords extracted from papers and patents; however, detailed technical specifications for safety innovation are not mentioned. To provide more implications for cyber security managers and technology researchers, individual characteristics such as author information, number of citations, citation relationship, commercialization, institution, and country of papers and patents should be examined. If these studies are supported, more accurate and specific results for each cyber security field can be derived in future studies.
Third, trend prediction for cyber security convergence fields and technologies can be used to prevent and solve the security problems of various cyber systems used in ICT and related industries. When the risk keywords extracted from the cyber safety accident report are used together, new insights can be obtained to discover and predict new cyber security technologies that can solve not only actual security problems but also various security problems that may occur in the future.
The insight of this study is that understanding changes and trends in the field of cyber security convergence is the most efficient way to respond to cyber security threats and risks proactively, and it is crucial in the development of next-generation cyber security technologies.

3. Research Methodology

3.1. Introduction to the Research Process

In this study, papers published for 11 years (2010–2020) and patents in the information security field were collected from four major societies (ACM CCS, Usenix Security, IEEE Security & Privacy, and NDSS) that boast the highest authority in the field of information security. Through the developed web crawler, metadata including title, author, abstract, publication year, thesis, and patent files were collected. Accordingly, approximately 4200 papers and 3100 patents were collected as experimental subjects.
In this study, major topics and key keywords were extracted from the collected papers and patents, and the cyber security field was derived. Based on keywords connected by field, it analyzes changes in cyber security convergence fields and technologies over time to monitor newly emerged convergence fields and convergence fields that have continued or disappeared. Finally, the cyber security convergence field and technology trends were predicted through an analysis of the convergence field and technology trends. To conduct such a rational study, we analyzed various existing technology prediction methodologies and applied them to our experiments by optimizing them.
In terms of technology, the advantage of this study is that it utilizes the latest deep learning technologies, such as LDA, DTM, and LSTM, which will be introduced next. In general, the Delphi method, which listens to the opinions of experts, is used to predict the future of science and technology, but the accuracy is not high at approximately 30%. Using self-learning AI deep learning technology, the network structure information, keywords, and research fields of each technology group were digitized. Based on the deep learning future prediction model created in this way, it is possible to derive cyber security technology and show a high level of prediction accuracy.

3.2. Deep Learning Algorithm for Identification and Prediction of Cyber Security Technology and Convergence Fields

Technological forecasting methods have been developed in various forms, depending on the purpose of forecasting, the scope of forecasting, the nature of technology, and the degree of data accumulation. Recently, rather than using each method individually, a form of using a mixture was developed, and the method was modified and optimized according to the subject of use. The following introduces the algorithms (LDA, DTM, and LSTM) used as text-analysis-based probabilistic topic model techniques applied to actual research experiments in this study.
LDA is a topic-modeling technique for detecting potential topics for a given large number of documents. LDA clusters documents by using hidden topics. LDA assumes that documents contain one or more topics, selects the nth word from each document, and has the largest multiplication value of the probability distribution of the topic for the document containing that word, and the probability distribution of the word for the topic is assigned to the nth word. That is, LDA is a probabilistic model for which topics exist in each document for a given document, and the schematic diagram is shown in Figure 3.
Figure 3. Schematic of LDA.
In Figure 3, the probabilities that the words attack, privacy, and detection appear in the yellow topic are 0.04, 0.02, and 0.01, respectively, indicating that it is an information-security-related topic. Because the proportion of words corresponding to yellow topics is greater than that corresponding to blue and red topics in each document, the main topic of the document is likely to be a yellow topic (related to information security). The LDA is a useful method in natural language processing, such as classification, summary, similarity, and relevance judgment.
LDA has been used in fields related to academic literature analysis, and attempts to use topic modeling for trend analysis have increased since then. A representative example is the DTM. Figure 4 shows a schematic of the DTM.
Figure 4. Schematic of DTM.
The DTM is a probabilistic time-series model for analyzing the evolution of subjects over time. For instance, in the case of LDA, assuming that there is a document set created between 2016 and 2020, the entire document set is first divided into five sets by year to analyze the subject change over the five years. If the number of topics is designated as 10 and LDA topic modeling is performed for each year, 50 (5 × 10) topics are derived. However, it is impossible to analyze trends, because all 50 derived topics may differ. Therefore, for trend analysis, it is necessary to show that themes are connected and change by year. That is, the nth theme of 2018 should be similar to that of 2017. The DTM adds the condition that the topics of the current year are similar to those of the previous year; therefore, the proportion of literature belonging to the topic and how the topic changes over time.
Because conventional neural networks currently only consider the input data, a recurrent neural network (RNN) has emerged to process continuous data. An RNN is an artificial neural network for learning data that changes over time, such as time-series data, and the present result is related to the previous result because it recursively refers to past output data. However, learning ability is significantly reduced when the distance between the information related to the past and the point where the information is used is long. To overcome this problem, long short-term memory (LSTM) was devised by adding the cell-state to the RNN’s state. Figure 5 shows the network structure of the LSTM.
Figure 5. LSTM network architecture.
Figure 5 shows the overall network structure of the LSTM, which consists of four gates. The forget gate decides which information to forget from the hidden state information of the previous step, and the input gate decides which information to store. That is, it determines how much of the value of the previous cell state is reflected in the value of the current cell state. The value determined by the forget gate and the input gate is updated from the previous cell state to the new cell state in the update gate. Finally, the output gate determines the value to transfer to the hidden state of the next stage from the finally obtained cell state value. These LSTMs exhibit good performance in predicting time-series data by solving the long-term dependency problem.
In this study, LDA was used to extract major topics (areas) and key keywords (techniques), DTM was used to analyze changes in topics and keywords, LSTM was used to predict trends of topics and keywords that were optimized for collected papers and patents, and research experiments were conducted.

4. Research Experiments

4.1. Experimental Data

In this research experiment, the 2010–2020 papers from four major societies (ACM CCS, Usenix Security, NDSS, IEEE Security & Privacy), which boast the highest authority in the field of information security, and patents collected through keyword searches in various security fields were utilized. Approximately 1600 papers from the ACM CCS conference, 800 papers from the Usenix Security conference, 600 papers from the NDSS conference, and 1200 papers from the IEEE Security & Privacy journal were collected. Additionally, approximately 3100 pieces were collected. In addition, related metadata were collected. Table 5 presents specific information and examples of metadata for the collected papers and patents.
Table 5. Examples of papers and patent information as well as metadata.

4.2. Cyber Security Related Papers and Patent Trend Analysis

Cyber security technology is rapidly advancing daily, and the rationale for this is presented through conferences, journals, and patents. Therefore, continuous monitoring of these major papers and patents is essential for identifying and analyzing the technological development and research direction of the research community of leading global countries. The recent changes in the number of papers and patents per year in the cyber security field are shown in Figure 6.
Figure 6. Cyber-security-related papers and patent trends.
As shown in Figure 6, except for 2020, the number of papers and patents has continued to increase. This suggests that the importance of technology development and related research on cyber security has been steadily maintained over the past 11 years. However, the decrease in the number of patents in 2019 could be because it takes some time from application to registration for patents, and the slight decrease in the number of papers and patents in 2020 is attributed to COVID-19. Therefore, the number of papers and patents in 2020 should be viewed from a relative point of view rather than interpreted as an absolute number. Through such monitoring, we can estimate the direction of the advancement of future cyber security technology, and it can be used to predict the commercialization potential and timing of the technology.

4.3. Cyber Security Keyword Extraction and Domain Identification

The keywords for each topic of the thesis and patents from 2010 to 2020 extracted using the LDA algorithm are summarized in Table 2. Keywords in these topics can provide detailed descriptions of papers and patents. Therefore, the subject of this thesis and patent documents can be derived from the technical keywords extracted from the LDA algorithm. In this case, unnecessary keywords are automatically removed by the technical stop word dictionary in the text mining process, which is the preprocessing stage of the LDA algorithm. Table 6 summarizes examples of the top 10 keywords by recent papers and patent topics in 2020.
Table 6. Examples of keywords by LDA papers and patent topics (2020).
As summarized in Table 6, the topic was determined by mapping the keywords for each topic extracted from the papers and patents for each year to the cyber security area derived based on the IT strategy technology and hype cycle in Section 2.3. It may be difficult to classify papers and patents that contain technical keywords into specific fields because general keywords that describe cyber security technologies may be included in this process. In this case, subject classification was performed while manually analyzing the thesis and patent with an expert. As this is the first study to identify the cyber security convergence field and technology, the cyber security field was finally specified with the help of experts after targeting as many and various keywords as possible. Table 7 summarizes the topic mapping results of papers and patents by year according to cyber security area. To view the topic tendency of the thesis and patents together, topics extracted from the thesis are indicated in red and topics extracted from patents are indicated in blue.
Table 7. LDA’s cyber security field mapping.
As summarized in Table 7, the cyber security area is divided into five major categories: network, data and application service, physical, system and password, and IoT security. The thesis mainly focused on the middle classification of network, data and application service security, as well as system and password security, and patents were mainly focused on physical and IoT security. This is because papers mainly contain experimental techniques, and patents contain practical techniques. Network security is divided into three major categories: wired, wireless, and the cloud. Although related topics appear every year in the wired network security area, the wireless network security area has shown a more pronounced technological growth since 2012 than the wired network security area. Along with cloud security, technological development has been steadily progressing from 2010 to 2020.
Data and application service security can be divided into four major categories: application, data, electronic money/fintech, and digital forensics. Generally, the application security area and electronic money/fintech security area occupied a large proportion, and the applied security area mainly focused on related topics in 2012, 2013, and 2015. The related topics were concentrated in 2019. Related topics appeared every year in the data security area and intermittently in the digital forensics area. Physical security is divided into four major categories: human/bio-recognition, CCTV monitoring/control, security searches, and unmanned electronic security. Technological advances were strong in 2010 in the areas of human/bio-recognition, security search, and unmanned electronic security, and the human/bio-recognition area showed strength again in 2018 and 2020, and the CCTV monitoring/control area started in 2014. After the rebound in 2016, the security screening and unmanned electronic security sectors rebounded in 2015.
System and password security are divided into six major categories: encryption technology, authentication/authorization technology, security vulnerability, system security, malicious codes, as well as threat analysis and control. Generally, authentication/authorization technology, security vulnerability, and malicious code areas account for a large proportion, and technology development is being made steadily every year. In addition, cryptographic technology, threat analysis, and control areas have shown strength again since 2018. Related topics in the area of system security appear sporadically. IoT security is divided into nine major categories: home city, industrial control system, automobile, shipping, marine, aviation, healthcare, medical security, and other ICT security. Home city security occupies the largest share, followed by healthcare, medical, and automobile security. In addition, related topics sporadically appeared in the industrial control system security area, ship, marine, aviation security, and other ICT security areas.
Table 8 summarizes the network visualization of the LDA results and convergence regions to identify convergence regions by major year. Network analysis in the cyber security convergence field by major year analyzed the period from 2010 to 2020 in two-year units. Keywords connected between topics were used to identify the cyber convergence field.
Table 8. Cybersecurity convergence area network by major years.
As summarized in Table 8, seven convergence areas existed in 2010 based on the connection keywords authentication, device, malware, method, network, security, and user. A convergence area is formed around CCTV surveillance/control, cloud security, secure search, and unmanned electronic guards. In 2012, two convergence areas existed based on the connection keywords device and security, and convergence areas centered on e-money and fintech security areas were created.
In 2014, two convergence areas existed based on the connection keywords device and security, and convergence areas centered on cloud security and wireless network security areas were created. In 2016, three convergence areas existed based on the connection keywords data, device, and security, and convergence areas have been created centered on application security, cloud security, and malware areas.
In 2018, there were six convergence areas based on the connection keywords data, device, malware, method, security, as well as user, and convergence areas were created around cloud security, e-money, fintech security, and security variability areas. In 2020, there were eight convergence areas based on the connection keywords attack, data, device, network, security, server, system, as well as viability, and convergence areas were created around application security, cloud security, malware, application security, and security.
Based on these connection keywords, it is possible to analyze the convergence relationship by year between the cyber security domains. However, there is a limit to grasping the flow of the convergence area because the topics extracted by LDA by year do not have connectivity by year. Therefore, in Section 4.4, we used the DTM algorithm.

4.4. Trend Analysis of Cyber Security Area and Convergence Field

The second approach applied to analyze changes in cyber security and convergence fields is to use the DTM algorithm to identify theses and patent trends for the entire year.
The DTM algorithm, a probabilistic time series model, was applied to papers and patents from 2010 to 2020. When a topic is derived for each year using LDA, it is impossible to analyze the topic change because the topics are different. Therefore, to analyze topic trends, it is necessary to show that topic changes by year are connected. The DTM extracts topics by year by adding the condition that the topics of the current year are similar to those of the previous year; therefore, it is possible to identify the trends of topics.
In this section, the topics derived from the DTM results are mapped to the cyber security domain, just as the topics derived from the LDA results are mapped to the cyber security domain in Section 4.3. In this case, the entire year was input as one dataset without dividing the thesis and patent by year. Table 9 and Table 10 summarize the mapping results of the DTM topic keywords and DTM topics according to the cyber security domain. As mentioned above, the DTM shows the keywords of the recent 2020 topics as examples because topics by year have similar keywords. Similar to LDA, topics extracted from the thesis are displayed in red and topics extracted from patents are displayed in blue.
Table 9. Examples of keywords by DTM thesis and patent topic (2020).
Table 10. DTM’s cyber security field mapping.
As summarized in Table 10, most security areas appeared as topics of DTM because of continuous technological developments over the past 11 years. However, eight areas (digital forensics, human/bio-recognition, CCTV surveillance/control, system security, industrial control system security, automobile security, ship, marine, aviation security, and other ICT security areas) are similar to Section 4.3. As seen in the LDA results of the section, the topics did not appear in the results of the DTM because the topics appeared sporadically in a specific year or intermittently during a specific year period.
In this study, the average number of papers and patents for each area, proportion of the total area, and compound annual growth rate (CAGR) were analyzed, as summarized in Table 11, to grasp the technology trends in the cyber security area dynamically. During trend analysis, as observed in Section 4.2, the latest year standard was set for 2019, as paper publications and patent registrations were not active in 2020 owing to the impact of COVID-19.
Table 11. Statistical information on papers and patents in the field of cyber security.
Cyber security fields, where many papers and patents have recently appeared, include home city (183), application (155), malicious code (129), cloud (104), wireless network, and security vulnerabilities (103). To develop and operate safe cyber systems in various fields that utilize cyber systems in the era of the fourth industrial revolution, various security fields have received attention from academia and practice. Table 11 summarizes the statistical information on papers and patents in the field of cyber security.
From 2010 to 2019, the fields of cyber security that consistently produced many papers and patents were home city security (144.00), application security (121.90), malicious code (96.10), and electronic money/fintech security (81.00). Naturally, the average ratio shows a similar pattern to the average number, with home city security accounting for a large proportion (14.57%) and then followed by application security (12.54%), malicious code (9.73%), and electronic money/fintech security (8.47%). These results indicate that the importance of cyber security has been continuously focused on in various fields over the past decade, and most of the interest in cyber security has arisen from attempts to solve problems and prevent risks using advanced technologies. For instance, home cities, which have converged with cutting-edge technology with the highest number of papers and patents, are increasingly targeted by cyber-attacks. If a security incident occurs in cyber–physical systems, such as the energy infrastructure constituting the home city, connected IoT, and the cloud, the destructive power will not be limited to cyberspace, but it will destroy the physical real world. Therefore, technological advances have been made.
As shown in Figure 7 and Figure 8, the change in the average number and ratio of papers and patents by the cyber security field on an annual basis is useful for understanding trends in the cyber security field. Furthermore, the rate of increase in the number and ratio of papers and patents in the cyber security field is an effective indicator for estimating cyber security technology trends. Among them, the measurement of CAGR is useful for monitoring cyber security technology trends. CAGR was calculated to identify typical exponential growth rates when the exponential growth interval was one year. Therefore, the growth rate of several cyber-safety fields is important for trend identification.
Figure 7. Changes in the average number of papers and patents by cyber security field on an annual basis.
Figure 8. Changes in the average ratio of papers and patents by cyber security field on a yearly basis.
The fields with a significant increase in the number of papers and patents were threat analysis and control (23.64%), home city security (12.78%), wireless network security (12.05%), data security (10.51%), and security vulnerabilities (10.48%). In addition, although the CAGR of most cyber security fields is increasing, wired network security (−0.57%), electronic money/fintech security (−2.41%), and authentication/authorization technology (−5.61%) have recorded negative CAGR. The encryption technology showed a significant decrease (−10.45%).
In this study, to intuitively understand and analyze the cyber security convergence field according to the cyber security domain that has this continuity, the network visualization technique and the connection keyword were used, as in the LDA in Section 4.3. Figure 9 and Table 12 present the visualization results of the DTM network for the entire year, convergence area, and connection keywords.
Figure 9. Cyber security domain networks for all years (2010–2019).
Table 12. Cyber security convergence areas and connection keywords for a full year.
As shown in Figure 9, if we analyze the DTM network visualization result, it consists of 19 convergence regions. If we analyze the trends of the 19 convergence areas, we can confirm the results in Table 13 and Figure 10.
Table 13. Papers and patent statistical information in cyber security convergence area.
Figure 10. Changes in the average ratio of papers and patents by cyber security convergence area on a yearly basis.
From 2010 to 2019, the convergence field with a high proportion of papers and patents was convergence 12 (11.90%), followed by convergences 6 (7.82%), 9 (7.56%), 8 (7.54%), and 17 (7.02%). These results indicate that cyber security technology is also developing in the form of convergence security according to the convergence development flow of ICT technology.
Convergence fields with a steady increase in the number of papers and patents were typically convergences 18 (3.03%), 17 (2.65%), 6 (2.62%), and 13 (2.36%). In addition, although the CAGR of most cyber security convergence fields is small, they show an increasing trend, but convergences 15 (−9.71%), 14 (−6.20%), and 7 (−5.79%) show a significant decrease. These results indicate that in the conventional security field (convergences 15, 14, and 7), an integrated security control center (SOC) was established to respond to security threats, and information protection and personal information protection systems were established to counter human security control and infringement. Recently, with the advent of the untact era, the use of cloud services has rapidly increased and security threats are increasing accordingly. It is necessary to build an automated security system in these cloud services (convergences 18, 17, 6, and 13), unlike conventional security, which shows that related technologies are developing.

5. In-Depth Analysis of Cyber Security Convergence Area

5.1. Connection Strength in the Cyber Security Convergence Domain

In Section 4.4, to extract the cyber security convergence field, the keywords that occurred simultaneously among the keywords of the topics within each cyber security area were used as a link. These connection keywords may indicate the degree of convergence in the cyber-convergence field. That is, according to the high and low frequency of the appearance of connected keywords, or the large and small number of connected keywords, it was found to have a high correlation in cyber convergence. Therefore, because the connection keyword indicates the degree of connection of convergence, it is possible to analyze the trend of changes in the cyber security area and related technologies over the past decade. Table 14 presents the DTM network visualization results for the entire year according to the strength of the connection keywords, convergence area, and connection keywords.
Table 14. Cyber security field and convergence sector network for the full year.
The strength of the connection keyword was expressed by adding all the number of co-appearances by year in the cyber security domain, constituting the convergence domain and then normalizing it to a value between 1 and 10. That is, the lower the intensity, the lower the degree of cohesion, and the higher the intensity, the higher is the degree of cohesion. Therefore, as summarized in Table 14, 19 convergence regions appeared when the intensity was one; in the case of two and five, as well as in the case of three and four, three convergence regions appeared. In addition, it can be analyzed as a convergence relationship with a higher degree of binding, as there are more linking keywords and a low degree of binding with fewer linking keywords. For instance, in strength one, five convergence domains (malware, wired network security, wireless network security), convergence domains (e-money, fintech security, healthcare, medical security), and convergence domains (home city security, wireless) network security) are fused with three connection keywords; therefore, the internal cyber security field is more closely related than other convergence areas composed of one connection keyword.

5.2. Trend Analysis and Forecasting of Cyber Security Convergence Area

The third approach applied to analyze the development trend of the cyber security convergence field is to analyze and predict trends in the field using the LSTM algorithm.
In Section 4, the LSTM algorithm, an artificial neural network that forms a circular structure, was applied to cyber security convergence analysis using the DTM algorithm. First, to predict the trend in the cyber security convergence area, the trend was analyzed and predicted based on the annual frequency of keywords in the topic constituting each cyber security area within the convergence area. The following figures present the trend prediction results of the convergence areas. In the prediction of the convergence region, only the case of intensity one was considered because it includes all convergence regions of intensities two, three, and four. Additionally, among the cyber security convergence fields, as in Section 4.4, we focused on the convergence fields where the CAGR ratio was higher or significantly increased or decreased compared to other cyber security convergence fields. Figure 11 presents the prediction results for convergences 12, 9, and 8, which are convergence areas with high proportions. Figure 12 presents the predicted results for convergences 18, 17, 6, and 13, which are the increased convergence regions. Figure 13 presents the predicted results for convergences 15, 14, and 7, which are the decreased convergence regions.
Figure 11. Prediction of trends in convergence areas (12, 9, and 8) that had a high proportion.
Figure 12. Trend prediction of convergence areas (18, 17, 6, and 13) that increased.
Figure 13. Prediction of trends in convergence areas (15, 14, and 7) that decreased.
Analyzing the above prediction results, it is predicted that the areas of convergence with a high proportion will develop steadily in the future or they will maintain the current state. Although the convergence areas that have increased could continue to develop in the future, those that have decreased show different prediction results for each convergence area. Convergence region 15 was predicted to continue to decrease, convergence region 14 was predicted to increase, and convergence region seven was predicted to remain the same. Owing to the recent increase in network-based medical devices and medical information systems as well as the rapid introduction of cutting-edge technologies such as artificial intelligence and big data into various related systems inside and outside medical institutions, sensitive personal information, including patient information, is collected and distributed. This shows that the threat of cyber-attacks targeting medical institutions and medical information is rapidly increasing. In addition, cyber security companies have recently strengthened their growth engines with the blockchain, a priority factor for becoming industry leaders in financial services, energy, and manufacturing. This reflects the active movement to link blockchain businesses, specifically companies with technologies in the cryptographic authentication field.
In this study, the prediction of the increase/decrease trend of the cyber security convergence domain as well as the strength of connection keywords was analyzed to predict mutual organicity between convergence domains. Although it is difficult to predict perfect mutual organicity using only connected keywords, it is considered to have sufficient meaning to estimate future trends.
For mutual organicity prediction, trends were analyzed and predicted based on the annual frequency of connected keywords, such as trend prediction. In addition, only the case of intensity one was considered, and the connection keywords that converged to four or more cyber security domains were focused on. Figure 14 shows the prediction results of the control, environment, device, network, and systems, which are key connection keywords that converge to four or more security domains (convergences 6, 8, 12, and 17).
Figure 14. Key linking keyword trend prediction.
As shown in Figure 14, the connection keywords control and environment constituting convergence area six, the connection keyword device constituting convergence area eight, and the system, the connection keyword constituting convergence area 17, are expected to increase. Owing to the high degree of cohesion, they are expected to develop into a deeper relationship with each other in the future, forming an organic relationship with each other. Conversely, because the network, which is the connection keyword constituting convergence area 12, is predicted to decrease, significant differentiation is recognized over time, and detailed technologies within the convergence area can be technically commercialized from their own domains to independent domains. For example, Wi-Fi, one of the technologies in the wireless network field, is a core technology in the cloud, AI, and IoT fields; however, Wi-Fi is also changing. Wi-Fi technology has been developed around speed and performance, but recently, starting with Wi-Fi 6 (802.11ax), it has required high technology support suitable for the cloud, AI, and IoT era, such as higher speed and performance, efficiency in high-density environments, and power consumption. That is, the wireless network solution goes beyond supporting the latest technology, and its agility, simplified management, and intelligent management functions are emerging as differentiators.

6. Conclusions

This study analyzed the development, change, and evolution of related technologies that are essential for recognizing and understanding cyber security safety issues from various perspectives. Cyber security technology has been continuously developed to protect cyber systems from threats and risk factors, and it covers all aspects of cyber systems. However, very little research has been conducted on this topic.
Therefore, the contribution of this study is to monitor major cyber security convergence fields and technologies to provide practical insights for cyber security solution development companies and experts. This is almost the first approach for understanding the types of cyber security technology convergence fields and the changes in cyber security technology development. In addition, by visualizing cyber security convergence fields and technologies, it monitors which core technologies are being developed, mainly for cyber security.
That is, the innovation and novelty of this study are that, although there have been many cases of technology trend analysis research in cyber security, this is the first time a study has tried to identify and predict the flow of cyber security convergence. In addition, the research method that develops and applies the latest deep learning model will become a source technology for technology prediction studies in various fields in the future.
According to cyber security convergence trends, cyber security technology is mainly being developed in the fields of home city security, wireless network security, application security, authentication/authorization technology, wired network security, security vulnerability, and threat analysis and control. Each cyber security technology is directly or indirectly related to cyber security administrators, system operators, and developers. The highlight of this study is that understanding changes and trends in the field of cyber security convergence is the most efficient way to respond to cyber security threats and risks proactively, and it is crucial in the development of next-generation cyber security technologies.
Nonetheless, our work has several limitations, which can be addressed in future research. First, this study shows core cyber security technologies based on keywords extracted from papers and patents; however, detailed technical specifications for safety innovation are not mentioned. To provide more implications for cyber security managers and technology researchers, individual characteristics such as author information, number of citations, citation relationship, commercialization, institution, and country of papers and patents should be examined. If these studies are supported, accurate and specific results for each cyber security field can be derived in future studies. Second, trend predictions for cyber security convergence fields and technologies can be used to prevent and solve the security problems of various cyber systems used in ICT and related industries. When the risk keywords extracted from the cyber safety accident report are used together, new insights can be obtained to discover and predict new cyber security technologies that can solve not only actual security problems but also various security problems that may occur in the future. Future studies will ultimately provide detailed technical specifications and applicable technologies to deal with cyber security issues and present practical guidelines based on an analysis of papers and patents.

Author Contributions

Conceptualization, S.-Y.H. and J.-J.K.; Methodology, D.-J.S. and J.-J.K.; Software, S.-Y.H.; Validation, D.-J.S. and J.-J.K.; Formal analysis, D.-J.S. and J.-J.K.; Investigation, S.-Y.H. and D.-J.S.; Resources, S.-Y.H. and J.-J.K.; Data curation, S.-Y.H. and D.-J.S.; Writing—original draft preparation, S.-Y.H. and D.-J.S.; Writing—review and editing, J.-J.K.; Visualization, D.-J.S.; Supervision, J.-J.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jang-Jaccard, J.; Nepal, S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014, 80, 973–993. [Google Scholar] [CrossRef]
  2. Gupta, M.; Rees, J.; Chaturvedi, A.; Chi, J. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach. Decis. Support Syst. 2006, 41, 592–603. [Google Scholar] [CrossRef]
  3. Razzaq, A.; Hur, A.; Ahmad, H.F.; Masood, M. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Proceedings of the 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), Mexico City, Mexico, 6–8 March 2013; pp. 1–6. [Google Scholar] [CrossRef]
  4. Mendhurwar, S.; Mishra, R. Integration of social and IoT technologies: Architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst. 2019, 15, 565–584. [Google Scholar] [CrossRef]
  5. Soni, S.; Bhushan, B. Use of Machine Learning algorithms for designing efficient cyber security solutions. In Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, 5–6 July 2019; pp. 1496–1501. [Google Scholar] [CrossRef]
  6. Asghar, M.R.; Hu, Q.; Zeadally, S. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Netw. 2019, 165, 106946. [Google Scholar] [CrossRef]
  7. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
  8. Sengan, S.; Subramaniyaswamy, V.; Nair, S.K.; Indragandhi, V.; Manikandan, J.; Ravi, L. Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network. Future Gener. Comput. Syst. 2020, 112, 724–737. [Google Scholar] [CrossRef]
  9. Tianju, S.; Yilin, M.; Damián Marelli Ximing, S.; Minyue, F. The Vulnerability of Cyber-Physical System Under Stealthy Attacks. IEEE Trans. Autom. Control 2021, 66, 637–650. [Google Scholar]
  10. Abomhara, M.; Køien, G.M. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
  11. Sui, T.; Sun, X.M. The vulnerability of distributed state estimator under stealthy attacks. Automatica 2021, 133, 109869. [Google Scholar] [CrossRef]
  12. Ilhan, I.; Karakose, M. Requirement Analysis for Cybersecurity Solutions in Industry 4.0 Platforms. In Proceedings of the 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, Turkey, 21–22 September 2019; pp. 1–7. [Google Scholar] [CrossRef]
  13. Culot, G.; Fattori, F.; Podrecca, M.; Sartor, M. Addressing Industry 4.0 Cybersecurity Challenges. IEEE Eng. Manag. Rev. 2019, 47, 79–86. [Google Scholar] [CrossRef]
  14. Alani, M.M.; Alloghani, M. Security Challenges in the Industry 4.0 Era. Ind. 4.0 Eng. Sustain. Future 2019, 117–136. [Google Scholar] [CrossRef]
  15. Elmaghraby, A.S.; Losavio, M.M. Cyber security challenges in Smart Cities: Safety, security and privacy. J. Adv. Res. 2014, 5, 491–497. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Bongiovanni, I. The least secure places in the universe? A systematic literature review on information security management in higher education. Comput. Secur. 2019, 86, 350–357. [Google Scholar] [CrossRef]
  17. Srinivas, J.; Das, A.K.; Kumar, N. Government regulations in cyber security: Framework, standards and recommendations. Futur. Gener. Comput. Syst. 2018, 92, 178–188. [Google Scholar] [CrossRef]
  18. Clark-Ginsberg, A.; Slayton, R. Regulating risks within complex sociotechnical systems: Evidence from critical infrastructure cybersecurity standards. Sci. Public Policy 2019, 46, 339–346. [Google Scholar] [CrossRef]
  19. Chhaya, L.; Sharma, P.; Kumar, A.; Bhagwatikar, G. Cybersecurity for Smart Grid: Threats, Solutions and Standardization. Adv. Greener Energy. Technol. 2020, 17–29. [Google Scholar] [CrossRef]
  20. ISO/IEC 27100. Information Technology-Security Techniques-Cyber Security-Overview and Concepts. 2019. Available online: https://www.iso27001security.com/html/27100.html (accessed on 11 December 2020).
  21. ISO/IEC 27101. Information Security, Cyber Security and Privacy Protection-Cyber Security Framework Development Guidelines. 2019. Available online: https://www.iso27001security.com/html/27101.html (accessed on 11 December 2020).
  22. ISO/IEC 27102. Information Security Management-Guidelines for Cyber-Insurance. 2019. Available online: https://www.iso27001security.com/html/27102.html (accessed on 11 December 2020).
  23. ISO/IEC 27103. Information Technology-Security Techniques-Cyber Security and ISO and IEC Standards. 2019. Available online: https://www.iso27001security.com/html/27103.html (accessed on 11 December 2020).
  24. ISO/IEC 27032. Information Technology-Security Techniques-Guidelines for Cyber Security. 2012. Available online: https://www.iso27001security.com/html/27032.html (accessed on 11 December 2020).
  25. Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef] [Green Version]
  26. Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
  27. Saravanan, A.; Bama, S.S. A Review on Cyber Security and the Fifth Generation Cyberattacks. Orient. J. Comput. Sci. Technol. 2016, 12, 50–56. [Google Scholar] [CrossRef]
  28. Lee, J.; Wu, F.; Zhao, W.; Ghaffari, M.; Liao, L.; Siegel, D. Prognostics and health management design for rotary machinery systems—Reviews, methodology and applications. Mech. Syst. Signal Process. 2013, 42, 314–334. [Google Scholar] [CrossRef]
  29. Silva, E.C. Accidents and the technology. J. Loss Prev. Process Ind. 2017, 49, 319–325. [Google Scholar] [CrossRef]
  30. Daim, T.U.; Rueda, G.; Martin, H.; Gerdsri, P. Forecasting emerging technologies: Use of bibliometrics and patent analysis. Technol. Forecast. Soc. Chang. 2006, 73, 981–1012. [Google Scholar] [CrossRef]
  31. Dotsika, F.; Watkins, A. Identifying potentially disruptive trends by means of keyword network analysis. Technol. Forecast. Soc. Chang. 2017, 119, 114–127. [Google Scholar] [CrossRef] [Green Version]
  32. Song, B.; Suh, Y. Identifying convergence fields and technologies for industrial safety: LDA-based network analysis. Technol. Forecast. Soc. Chang. 2018, 138, 115–126. [Google Scholar] [CrossRef]
  33. Li, X.; Xie, Q.; Daim, T.; Huang, L. Forecasting technology trends using text mining of the gaps between science and technology: The case of perovskite solar cell technology. Technol. Forecast. Soc. Chang. 2019, 146, 432–449. [Google Scholar] [CrossRef]
  34. Abraham, C.; Chatterjee, D.; Sims, R.R. Muddling through cybersecurity: Insights from the U.S. healthcare industry. Bus. Horizons 2019, 62, 539–548. [Google Scholar] [CrossRef]
  35. Santos, C.; Mehrsai, A.; Barros, A.C.; Araujo, M.; Ares, E. Towards Industry 4.0: An overview of European strategic roadmaps. Procedia Manuf. 2017, 13, 972–979. [Google Scholar] [CrossRef]
  36. Chen, H.; Zhang, G.; Zhu, D.; Lu, J. Topic-based technological forecasting based on patent data: A case study of Australian patents from 2000 to 2014. Technol. Forecast. Soc. Chang. 2017, 119, 39–52. [Google Scholar] [CrossRef]
  37. Golembiewski, B.; Stein, N.V.; Sick, N.; Wiemhöfer, H.-D. Identifying trends in battery technologies with regard to electric mobility: Evidence from patenting activities along and across the battery value chain. J. Clean. Prod. 2015, 87, 800–810. [Google Scholar] [CrossRef]
  38. Blei, D.M.; Ng, A.Y.; Jordan, M.I. Latent dirichlet allocation. J. Mach. Learn. Res. 2003, 3, 993–1022. [Google Scholar]
  39. Sievert, C.; Shirley, K. LDAvis: A method for visualizing and interpreting topics. In Proceedings of the Workshop on Interactive Language Learning, Visualization, and Interfaces, Baltimore, MD, USA, 27 June 2014; pp. 63–70. [Google Scholar]
  40. Blei, D.M.; Lafferty, J.D. Dynamic topic models. In Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh Pennsylvania, USA, 25–29 June 2006; pp. 113–120. [Google Scholar]
  41. Yao, F.; Wang, Y. Tracking urban geo-topics based on dynamic topic model. Comput. Environ. Urban Syst. 2019, 79, 101419. [Google Scholar] [CrossRef]
  42. Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]
  43. Tian, Y.; Zhang, K.; Li, J.; Lin, X.; Yang, B. LSTM-based traffic flow prediction with missing data. Neurocomputing 2018, 318, 297–305. [Google Scholar] [CrossRef]
  44. Panetta, K. Gartner Top 10 Strategic Technology Trends for 2020. 2019. Available online: https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2020/ (accessed on 11 December 2020).
  45. Gartner, Hype Cycle for Risk Management. 2019. Available online: https://www.gartner.com/en/documents/3953584 (accessed on 23 March 2022).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.