Supercomputers and quantum computing on the axis of cyber security

被引:3
作者
Yalcin, Haydar [1 ,2 ]
Daim, Tugrul [2 ]
Moughari, Mahdieh Mokhtari [4 ]
Mermoud, Alain [3 ]
机构
[1] Ege Univ, Management Informat Syst, Izmir, Turkiye
[2] Portland State Univ, Mark O Hatfield Cybersecur & Cyber Def Policy Ctr, Portland, OR 97201 USA
[3] Armasuisse Sci & Technol, Cyber Def Campus,EPFL Innovat Pk, Lausanne, Switzerland
[4] Portland State Univ, Engn & Technol Management, Portland, OR 97207 USA
关键词
Cybersecurity; Quantum computing; Bibliometrics; Research landscape; SCIENCE-AND-TECHNOLOGY; INTERNATIONAL COLLABORATION; BETWEENNESS CENTRALITY; CYBERSECURITY; SCIENTISTS; KNOWLEDGE; IMPACT; MAPS;
D O I
10.1016/j.techsoc.2024.102556
中图分类号
D58 [社会生活与社会问题]; C913 [社会生活与社会问题];
学科分类号
摘要
Cybersecurity has become a very critical area to address for governments, industry and the academic community. Cyber attacks are on the rise so is research to address the challenges presented by these attacks. Research yields several technological advancements. This paper explores the development of quantum computing and supercomputers within the context of cybersecurity. As many governments and organizations are under the threat of cyber-attacks, it is critical and timely to explore the status of technological development. We use advanced scientometric techniques to disclose the development status and identify the centers of excellence. The research uses bibliometric data of published papers and utilizes an integration of scientometric methods including social network analysis, entropy analysis, cluster analysis, overlay maps and knowledge diffusion analysis as well as keyword and source analyses.
引用
收藏
页数:13
相关论文
共 50 条
[41]   Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management [J].
Sharbaf, Mehrdad S. .
IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, :332-337
[42]   Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices [J].
Oyelami, Julius Olusegun ;
Kassim, Azleena Mohd .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) :131-138
[43]   Governing Cyber Security through Networks: An Analysis of Cyber Security Coordination in Belgium [J].
Rondelez, Rafael .
INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2018, 12 (01) :300-315
[44]   Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing [J].
Xi, Wei ;
Li, Xiaobo ;
Feng, Qihui ;
Yao, Hao ;
Cai, Tiantian ;
Yu, Yang .
FRONTIERS IN ENERGY RESEARCH, 2022, 10
[45]   Cyber security as the basis for the national security of Ukraine [J].
Tarasenko, Oleh ;
Mirkovets, Dmytro ;
Shevchyshen, Artem ;
Nahorniuk-Danyliuk, Oleksandr ;
Yermakov, Yurii .
CUESTIONES POLITICAS, 2022, 40 (73) :583-599
[46]   Systems Security Affectation with the Implementation of Quantum Computing [J].
Novoa Torres, Norberto ;
Suarez Garcia, Juan Carlos ;
Valderrama Guancha, Erik Alexis .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (04) :30-39
[47]   Information security economics: cyber security threats [J].
Hojda, Mihaela Hortensia .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01) :584-592
[48]   An Intelligent Security Assistant for Cyber Security Operations [J].
Sayan, Carla Maria ;
Hariri, Salim ;
Ball, George .
2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, :375-376
[49]   The Nexus Between Cyber Security and Energy Security [J].
Nussbaum, Daniel ;
Pickl, Stefan ;
Dupuy, Arnold ;
Nistor, Marian Sorin .
PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, :228-236
[50]   Quantum Computing: Bridging the National Security-Digital Sovereignty Divide [J].
Liman, Anders ;
Weber, Kate .
EUROPEAN JOURNAL OF RISK REGULATION, 2023, 14 (03) :476-483