Supercomputers and quantum computing on the axis of cyber security

被引:2
作者
Yalcin, Haydar [1 ,2 ]
Daim, Tugrul [2 ]
Moughari, Mahdieh Mokhtari [4 ]
Mermoud, Alain [3 ]
机构
[1] Ege Univ, Management Informat Syst, Izmir, Turkiye
[2] Portland State Univ, Mark O Hatfield Cybersecur & Cyber Def Policy Ctr, Portland, OR 97201 USA
[3] Armasuisse Sci & Technol, Cyber Def Campus,EPFL Innovat Pk, Lausanne, Switzerland
[4] Portland State Univ, Engn & Technol Management, Portland, OR 97207 USA
关键词
Cybersecurity; Quantum computing; Bibliometrics; Research landscape; SCIENCE-AND-TECHNOLOGY; INTERNATIONAL COLLABORATION; BETWEENNESS CENTRALITY; CYBERSECURITY; SCIENTISTS; KNOWLEDGE; IMPACT; MAPS;
D O I
10.1016/j.techsoc.2024.102556
中图分类号
D58 [社会生活与社会问题]; C913 [社会生活与社会问题];
学科分类号
摘要
Cybersecurity has become a very critical area to address for governments, industry and the academic community. Cyber attacks are on the rise so is research to address the challenges presented by these attacks. Research yields several technological advancements. This paper explores the development of quantum computing and supercomputers within the context of cybersecurity. As many governments and organizations are under the threat of cyber-attacks, it is critical and timely to explore the status of technological development. We use advanced scientometric techniques to disclose the development status and identify the centers of excellence. The research uses bibliometric data of published papers and utilizes an integration of scientometric methods including social network analysis, entropy analysis, cluster analysis, overlay maps and knowledge diffusion analysis as well as keyword and source analyses.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Quantum computing and security of information systems
    Berezin, A. A.
    [J]. SAFETY AND SECURITY ENGINEERING II, 2007, 94 : 149 - 159
  • [22] Quantum Computing for Enhancing Grid Security
    Eskandarpour, Rozhin
    Gokhale, Pranav
    Khodaei, Amin
    Chong, Frederic T.
    Passo, Aleksi
    Bahramirad, Shay
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (05) : 4135 - 4137
  • [23] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [24] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    [J]. INTERNET POLICY REVIEW, 2018, 7 (02):
  • [25] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    [J]. CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [26] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    [J]. COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [27] Genomic privacy and security in the era of artificial intelligence and quantum computing
    Richard Annan
    Justin Noland
    Kamaria Perkins
    Xiaohong Yuan
    Kaushik Roy
    Letu Qingge
    [J]. Discover Computing, 28 (1)
  • [28] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    [J]. ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441
  • [29] NATO AND CYBER SECURITY
    Kazakovtsev, A. V.
    [J]. VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2012, 17 (02): : 109 - 114
  • [30] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    [J]. LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664