{"title":"近十年来计算机安全研究趋势分析","authors":"D. Lee, Hyoungshick Kim","doi":"10.1109/ICSSA45270.2018.00030","DOIUrl":null,"url":null,"abstract":"Recently, text mining has popularly been used not only to identify important topics but also predict future tends in a research field. In this paper, we apply text mining to analyze the research trends in the field of computer security over the last decade. We collected 2,256 papers published in the four major security conferences (CCS, NDSS, USENIX Security and S&P) between 2008 and 2017. We extracted keywords from the title and abstract in each paper and used them to identify important topics based on word frequency counts for each keyword. We analyzed the rankings and the changes in the most frequent keywords every year. Our observations from the analysis would be useful for understanding the popularity of computer security research, and predict potentially important research topics (e.g., SGX, Fuzzing, Blockchain, IoT and SDN) in the near future.","PeriodicalId":223442,"journal":{"name":"2018 International Conference on Software Security and Assurance (ICSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Analysis of Research Trends in Computer Security over the Last Decade\",\"authors\":\"D. Lee, Hyoungshick Kim\",\"doi\":\"10.1109/ICSSA45270.2018.00030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, text mining has popularly been used not only to identify important topics but also predict future tends in a research field. In this paper, we apply text mining to analyze the research trends in the field of computer security over the last decade. We collected 2,256 papers published in the four major security conferences (CCS, NDSS, USENIX Security and S&P) between 2008 and 2017. We extracted keywords from the title and abstract in each paper and used them to identify important topics based on word frequency counts for each keyword. We analyzed the rankings and the changes in the most frequent keywords every year. Our observations from the analysis would be useful for understanding the popularity of computer security research, and predict potentially important research topics (e.g., SGX, Fuzzing, Blockchain, IoT and SDN) in the near future.\",\"PeriodicalId\":223442,\"journal\":{\"name\":\"2018 International Conference on Software Security and Assurance (ICSSA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Software Security and Assurance (ICSSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSA45270.2018.00030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Software Security and Assurance (ICSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSA45270.2018.00030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Analysis of Research Trends in Computer Security over the Last Decade
Recently, text mining has popularly been used not only to identify important topics but also predict future tends in a research field. In this paper, we apply text mining to analyze the research trends in the field of computer security over the last decade. We collected 2,256 papers published in the four major security conferences (CCS, NDSS, USENIX Security and S&P) between 2008 and 2017. We extracted keywords from the title and abstract in each paper and used them to identify important topics based on word frequency counts for each keyword. We analyzed the rankings and the changes in the most frequent keywords every year. Our observations from the analysis would be useful for understanding the popularity of computer security research, and predict potentially important research topics (e.g., SGX, Fuzzing, Blockchain, IoT and SDN) in the near future.