A Scopus-Based Bibliometric Landscape of Cybersecurity Research (2000–2026): Trends, Collaboration, and Research Directions
DOI:
https://doi.org/10.58812/wsist.v4i01.2806Keywords:
Cybersecurity, Bibliometric Analysis, Scopus, VOSviewer, Collaboration PatternsAbstract
The rapid advancement in digital technologies has resulted in a significant increase in the importance of cybersecurity, resulting in an upsurge in the number of studies conducted in this domain during the last two decades. Therefore, the present work is intended to investigate the intellectual structure, collaboration patterns, and evolution of themes in cybersecurity research through a bibliometric analysis. Data have been extracted from Scopus from the time period 2000-2026, and VOSViewer has been used to conduct the visualization process through the identification of the co-authorship network, citation network, and keywords co-occurrence network. As observed from the results obtained, there are a few dominant countries contributing to cybersecurity research, including the US, India, and China that play the roles of central hubs in the network of collaborations. It can be found from the citation network analysis that highly cited papers deal extensively with artificial intelligence, machine learning, and deep learning as they play a crucial role in cybersecurity research. Finally, through keyword analysis, it has been revealed that there is a transition in theme from intrusion detection and network security to newer themes such as artificial intelligence-based security, blockchain, Internet of Things (IoT), and behavioral cybersecurity. This study contributes to the literature by providing a comprehensive overview of the evolution and current state of cybersecurity research, while also identifying emerging trends and potential directions for future studies.
References
[1] H. M. Alzoubi et al., “Cyber Security Threats on Digital Banking,” in 2022 1st International Conference on AI in Cybersecurity (ICAIC), IEEE, 2022, pp. 1–4.
[2] M. A. Rahman, “Subduing Cyber Threats to Secure the Financial Sector of Bangladesh,” Cybersecurity, Privacy, & Networks eJournal, vol. 2, no. 78, 2019.
[3] I. Mustapha, Y. Vaicondam, A. Jahanzeb, B. A. Usmanovich, and S. H. B. Yusof, “Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem.,” Int. J. Interact. Mob. Technol., vol. 17, no. 22, 2023.
[4] R. Ganesen, A. A. Bakar, R. Ramli, F. A. Rahim, and M. N. A. Zawawi, “Cybersecurity Risk Assessment: Modeling Factors Associated with Higher Education Institutions,” Int. J. Adv. Comput. Sci. Appl., vol. 13, no. 8, 2022.
[5] D. Widiyati, “Pengaruh Literasi Keuangan, Perlindungan Data, dan Cybersecurity Terhadap Penggunaan Financial Technology,” Jae (Jurnal Akunt. dan Ekon., vol. 9, no. 1, pp. 130–141, 2024.
[6] O. P. Olaiya, T. O. Adesoga, A. Ojo, O. D. Olagunju, O. O. Ajayi, and Y. O. Adebayo, “Cybersecurity strategies in fintech: safeguarding financial data and assets,” GSC Adv. Res. Rev., vol. 20, no. 1, pp. 50–56, 2024.
[7] O. O. Amoo, A. Atadoga, F. Osasona, T. O. Abrahams, B. S. Ayinla, and O. A. Farayola, “GDPR’s impact on cybersecurity: A review focusing on USA and European practices,” Int. J. Sci. Res. Arch., vol. 11, no. 1, pp. 1338–1347, 2024.
[8] N. Donthu, S. Kumar, D. Mukherjee, N. Pandey, and W. M. Lim, “How to conduct a bibliometric analysis: An overview and guidelines,” J. Bus. Res., vol. 133, pp. 285–296, 2021.
[9] N. Van Eck and L. Waltman, “Software survey: VOSviewer, a computer program for bibliometric mapping,” Scientometrics, vol. 84, no. 2, pp. 523–538, 2010.
[10] L. Alzubaidi et al., “Review of deep learning: concepts, CNN architectures, challenges, applications, future directions,” J. big Data, vol. 8, no. 1, p. 53, 2021.
[11] I. H. Sarker, “Machine learning: Algorithms, real-world applications and research directions,” SN Comput. Sci., vol. 2, no. 3, pp. 1–21, 2021.
[12] I. H. Sarker, “Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions,” SN Comput. Sci., vol. 2, no. 6, pp. 1–20, 2021.
[13] M. Sallam, “ChatGPT utility in healthcare education, research, and practice: systematic review on the promising perspectives and valid concerns,” in Healthcare, MDPI, 2023, p. 887.
[14] R. Nishant, M. Kennedy, and J. Corbett, “Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda,” Int. J. Inf. Manage., vol. 53, p. 102104, 2020.
[15] B. Biggio and F. Roli, “Wild patterns: Ten years after the rise of adversarial machine learning,” in Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018, pp. 2154–2156.
[16] S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber–physical system security for the electric power grid,” Proc. IEEE, vol. 100, no. 1, pp. 210–224, 2011.
[17] Y. Xin et al., “Machine learning and deep learning methods for cybersecurity,” Ieee access, vol. 6, pp. 35365–35381, 2018.
[18] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. De Alvarenga, “A survey of intrusion detection in Internet of Things,” J. Netw. Comput. Appl., vol. 84, pp. 25–37, 2017.
[19] I. H. Sarker, “AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems,” SN Comput. Sci., vol. 3, no. 2, p. 158, 2022.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Loso Judijanto

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.









