Search Results

You are looking at 1 - 10 of 10 items for :

  • "information security" x
  • Mathematics and Statistics x
  • Refine by Access: All Content x
Clear All

Abstract  

In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the nation’s economic and social status. This research is aiming to provide indicators and visualization methods to measure the latest research trend and aspect underlying scientific and technological documents to researchers and policy planners using “co-word analysis”. Information Security field is a highly prospective market value. In this paper, we presented an analysis Information Security. Co-word analysis was employed to reveal patterns and trends in the Information Security fields by measuring the association strength of terms representatives of relevant publications or other texts produced in the Information Security field. Data were collected from SCI and the critical keywords could be extracted from the author keywords. These extracted keywords were further standardized. In order to trace the dynamic changes in the Information Security field, we presented a variety of technology mapping. The results showed that the Information Security field has some established research theme and also rapidly transforms to embrace new themes.

Restricted access
Studia Scientiarum Mathematicarum Hungarica
Authors:
Jaime Muñoz Masqué
,
María Eugenia Rosado María
, and
Ignacio Sánchez Rodríguez

Criteria for a diffeomorphism of a smooth manifold M to be lifted to a linear automorphism of a given real vector bundle p : V → M, are stated. Examples are included and the metric and complex vector-bundle cases are also considered.

Restricted access

45 23 Reference service 45 24 Information security 44

Restricted access

68 Network Storage NS-2 29 69 Information Security InfoSec 28

Restricted access

management system; Public sector reforms; Open government; Information sharing and systems integration Information technology law; Organizational performance framework; Inter-operability framework and standards; Information security

Restricted access

to reveal patterns and trends in the information security field by measuring the association strength of terms found in relevant publications and other texts within the field; they used the concept of “hub” to identify a new concept. Neff and Corley

Restricted access

. Lee , WH 2008 How to identify emerging research fields using scientometrics: An example in the field of information security . Scientometrics 76 3 1588 – 2861 10.1007/s11192

Restricted access

– 867 10.1007/s11192-009-2158-4 . Lee , YH 2008 How to identify emerging research fields using scientometrics: An examples in the field of Information Security . Scientometrics

Restricted access
Scientometrics
Authors:
Leonidas Akritidis
,
Dimitrios Katsaros
, and
Panayiotis Bozanis

. Lee , W. 2008 How to identify emerging research fields using scientometrics: An example in the field of Information Security . Scientometrics 76 3 503 – 525 10.1007/s11192

Restricted access

by Block Cipher Design Principles , in: Information Security , Springer Berlin Heidelberg, 2006 , p. 171 – 186 . [6] Eibach , T. , Pilz , E. and Völkel , G

Restricted access