{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:29:42Z","timestamp":1773520182127,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Shenzhen Sustainable Development Project under Grant","award":["KCXFZ20201221173013036"],"award-info":[{"award-number":["KCXFZ20201221173013036"]}]},{"name":"the Science and Technology Research Project of the Chongqing Education Commission","award":["KJQN202001705"],"award-info":[{"award-number":["KJQN202001705"]}]},{"name":"the Key Science and Technology Research Project of the Chongqing Education Commission","award":["KJZD-K202201701"],"award-info":[{"award-number":["KJZD-K202201701"]}]},{"name":"the Science and Technology Tackling Plan Project of the Chongqing Public Security Bureau","award":["G2021-20"],"award-info":[{"award-number":["G2021-20"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00521-026-11950-2","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:18:21Z","timestamp":1773508701000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring the evolution trends of network security research field based on P4OE heterogeneous network"],"prefix":"10.1007","volume":"38","author":[{"given":"Yanfei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Dezhi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chengbo","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,14]]},"reference":[{"issue":"8","key":"11950_CR1","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1111\/risa.13687","volume":"42","author":"MG Cains","year":"2022","unstructured":"Cains MG, Flora L, Taber D, King Z, Henshel DS (2022) Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation. Risk Anal 42(8):1643\u20131669","journal-title":"Risk Anal"},{"key":"11950_CR2","doi-asserted-by":"crossref","unstructured":"Liu S, Wang H, Liu J, Xian M (2019) Feasibility analysis of network security teaching platform based on kvm and gns3. In: International Conference on Information Technology, pp. 310\u2013313","DOI":"10.1109\/ITCA49981.2019.00075"},{"issue":"3","key":"11950_CR3","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s11192-016-1889-2","volume":"107","author":"I Tahamtan","year":"2016","unstructured":"Tahamtan I, Afshar AS, Ahamdzadeh K (2016) Factors affecting number of citations: a comprehensive review of the literature. Scientometrics 107(3):1195\u20131225","journal-title":"Scientometrics"},{"issue":"1","key":"11950_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s11192-014-1426-0","volume":"102","author":"G Cabanac","year":"2015","unstructured":"Cabanac G, Hubert G, Milard B (2015) Academic careers in computer science: continuance and transience of lifetime co-authorships. Scientometrics 102(1):135\u2013150","journal-title":"Scientometrics"},{"key":"11950_CR5","doi-asserted-by":"crossref","unstructured":"Tang J, Zhang J, Yao L, Li J, Zhang L, Su Z (2008) Arnetminer: extraction and mining of academic social networks. In: ACM SIGKDD Conference on Knowledge Discovery and Data Mining","DOI":"10.1145\/1401890.1402008"},{"key":"11950_CR6","first-page":"82","volume":"1","author":"H Mengting","year":"2021","unstructured":"Mengting H, Kai S, Congjing R (2021) Research on chinese academic contribution based on international co-authored papers. Libr J 1:82\u201392","journal-title":"Libr J"},{"issue":"4","key":"11950_CR7","doi-asserted-by":"publisher","first-page":"0283853","DOI":"10.1371\/journal.pone.0283853","volume":"18","author":"Y Gao","year":"2023","unstructured":"Gao Y, Ye L (2023) Characteristics and evolution of knowledge innovation network in the yangtze river delta urban agglomeration\u2014a case study of china national knowledge infrastructure. PLoS ONE 18(4):0283853","journal-title":"PLoS ONE"},{"issue":"1","key":"11950_CR8","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1186\/2193-1801-2-186","volume":"2","author":"M Song","year":"2013","unstructured":"Song M, Yang CC, Tang X (2013) Detecting evolution of bioinformatics with a content and co-authorship analysis. Springerplus 2(1):186","journal-title":"Springerplus"},{"key":"11950_CR9","doi-asserted-by":"crossref","unstructured":"Ye J, Yan G, Li Z, Liu Y (2019) Research on interaction tracking between community discovery and theme evolution based on dblp scientific research cooperation network. In: IEEE International Conference on Big Data","DOI":"10.1109\/ICBDA.2019.8712844"},{"issue":"6","key":"11950_CR10","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s11442-023-2124-8","volume":"33","author":"Y Yu","year":"2023","unstructured":"Yu Y, Lyu L (2023) Spatial pattern of knowledge innovation function among Chinese cities and its influencing factors. J Geog Sci 33(6):1161\u20131184","journal-title":"J Geog Sci"},{"key":"11950_CR11","doi-asserted-by":"crossref","unstructured":"Pei S (2021) Analysis of scientific research cooperation network in cyberspace security. In: 2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN)","DOI":"10.1109\/ICICN52636.2021.9673815"},{"key":"11950_CR12","doi-asserted-by":"crossref","unstructured":"Chen L, Gao Y, Zhang Y, Jensen CS, Zheng B (2019) Efficient and incremental clustering algorithms on star-schema heterogeneous graphs. In: IEEE International Conference on Data Engineering, pp. 256\u2013267","DOI":"10.1109\/ICDE.2019.00031"},{"key":"11950_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107112","volume":"224","author":"V Moscato","year":"2021","unstructured":"Moscato V, Sperl\u00ec G (2021) A survey about community detection over on-line social and heterogeneous information networks. Knowl-Based Syst 224:107112","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"11950_CR14","first-page":"1","volume":"9","author":"VA Traag","year":"2019","unstructured":"Traag VA, Waltman L, Eck NJ (2019) From louvain to leiden: guaranteeing well-connected communities. Soc Inf Netw 9(1):1\u201312","journal-title":"Soc Inf Netw"},{"issue":"1","key":"11950_CR15","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1186\/s12859-019-2746-0","volume":"20","author":"S Rahiminejad","year":"2019","unstructured":"Rahiminejad S, Maurya MR, Subramaniam S (2019) Topological and functional comparison of community detection algorithms in biological networks. BMC Bioinform 20(1):212","journal-title":"BMC Bioinform"},{"issue":"6","key":"11950_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-8179-0","volume":"15","author":"X Meng","year":"2021","unstructured":"Meng X, Li W, Peng X, Li Y, Li M (2021) Protein interaction networks: centrality, modularity, dynamics, and applications. Front Comp Sci 15(6):156902","journal-title":"Front Comp Sci"},{"key":"11950_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.future.2020.07.011","volume":"113","author":"A Bouyer","year":"2020","unstructured":"Bouyer A, Roghani H (2020) LSMD: a fast and robust local community detection starting from low degree nodes in social networks. Futur Gener Comput Syst 113:41\u201357","journal-title":"Futur Gener Comput Syst"},{"issue":"10","key":"11950_CR18","doi-asserted-by":"publisher","DOI":"10.1063\/1.5144139","volume":"30","author":"B Zarei","year":"2020","unstructured":"Zarei B, Meybodi MR, Masoumi B (2020) Detecting community structure in signed and unsigned social networks by using weighted label propagation. Chaos 30(10):103118","journal-title":"Chaos"},{"key":"11950_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2017.10.005","volume":"94\u201395","author":"K Chen","year":"2020","unstructured":"Chen K, Zhang Y, Zhu G, Mu R (2020) Do research institutes benefit from their network positions in research collaboration networks with industries or\/and universities? Technovation 94\u201395:102002","journal-title":"Technovation"},{"key":"11950_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2022.100437","volume":"35","author":"M Saqr","year":"2022","unstructured":"Saqr M, Elmoazen R, Tedre M, Lopez-Pernas S, Hirsto L (2022) How well centrality measures capture student achievement in computer-supported collaborative learning?-A systematic review and meta-analysis. Educ Res Rev 35:100437","journal-title":"Educ Res Rev"},{"issue":"3","key":"11950_CR21","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s11192-016-1891-8","volume":"107","author":"SY Diallo","year":"2016","unstructured":"Diallo SY, Lynch CJ, Gore R, Padilla JJ (2016) Identifying key papers within a journal via network centrality measures. Scientometrics 107(3):1005\u20131020","journal-title":"Scientometrics"},{"issue":"2","key":"11950_CR22","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/00273171.2019.1614898","volume":"56","author":"PJ Jones","year":"2021","unstructured":"Jones PJ, Ma R, McNally RJ (2021) Bridge centrality: a network approach to understanding comorbidity. Multivar Behav Res 56(2):353\u2013367. https:\/\/doi.org\/10.1080\/00273171.2019.1614898. (PMID: 31179765)","journal-title":"Multivar Behav Res"},{"key":"11950_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2020.101991","volume":"140","author":"K-F Cheung","year":"2020","unstructured":"Cheung K-F, Bell MGH, Pan J-J, Perera S (2020) An eigenvector centrality analysis of world container shipping network connectivity. Transp Res E-Log 140:101991","journal-title":"Transp Res E-Log"},{"key":"11950_CR24","unstructured":"Cezarino LO (2015) Sustainable practices as dynamic capabilities on sugarcane industry in brazil. semanticscholar"},{"issue":"6","key":"11950_CR25","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1007\/s00778-020-00618-5","volume":"29","author":"R-H Li","year":"2020","unstructured":"Li R-H, Qin L, Ye F, Wang G, Yu JX, Xiao X, Xiao N, Zheng Z (2020) Finding skyline communities in multi-valued networks. VLDB J 29(6):1407\u20131432","journal-title":"VLDB J"},{"issue":"6","key":"11950_CR26","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1038\/s42256-020-0177-2","volume":"2","author":"C Fan","year":"2020","unstructured":"Fan C, Zeng L, Sun Y, Liu Y-Y (2020) Finding key players in complex networks through deep reinforcement learning. Nat Mach Intell 2(6):317\u2013324","journal-title":"Nat Mach Intell"},{"issue":"1","key":"11950_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TKDE.2016.2598561","volume":"29","author":"C Shi","year":"2017","unstructured":"Shi C, Li Y, Zhang J, Sun Y, Yu PS (2017) A survey of heterogeneous information network analysis. IEEE Trans Knowl Data Eng 29(1):17\u201337 arXiv:abs\/1511.04854","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"11950_CR28","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.3389\/fgene.2019.01381","volume":"10","author":"B Lee","year":"2020","unstructured":"Lee B, Zhang S, Poleksic A, Xie L (2020) Heterogeneous multi-layered network model for omics data integration and analysis. Front Genet 10:1381","journal-title":"Front Genet"},{"key":"11950_CR29","doi-asserted-by":"crossref","unstructured":"Aslan S, Kaya B (2019) Predicting collaboration relationships on social network. In: 2019 1st International Informatics and Software Engineering Conference (UBMYK), 1\u20134","DOI":"10.1109\/UBMYK48245.2019.8965485"},{"key":"11950_CR30","unstructured":"Frost HR (2022) Eigenvector centrality for multilayer networks with dependent node importance"},{"issue":"10","key":"11950_CR31","doi-asserted-by":"publisher","DOI":"10.1063\/5.0111151","volume":"32","author":"W Lin","year":"2022","unstructured":"Lin W, Xu L, Fang H (2022) Finding influential edges in multilayer networks: perspective from multilayer diffusion model. Chaos 32(10):103131","journal-title":"Chaos"},{"key":"11950_CR32","doi-asserted-by":"crossref","unstructured":"Wang X, Ji H, Shi C, Wang B, Ye Y, Cui P, Yu (2019) PSHeterogeneous graph attention network. In: The Web Conference, pp. 2022\u20132032","DOI":"10.1145\/3308558.3313562"},{"issue":"4","key":"11950_CR33","doi-asserted-by":"publisher","first-page":"2946","DOI":"10.1109\/TNSE.2021.3055762","volume":"8","author":"Y Xu","year":"2021","unstructured":"Xu Y, Yan X, Wu Y, Hu Y, Liang W, Zhang J (2021) Hierarchical bidirectional RNN for safety-enhanced b5g heterogeneous networks. IEEE Trans Netw Sci Eng 8(4):2946\u20132957","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"9","key":"11950_CR34","first-page":"37","volume":"4","author":"J Zhao","year":"2019","unstructured":"Zhao J, Yang C (2019) Research on academic innovation community discovery based on heterogeneous network: taking gene editing research field as an example. J Libr Inf Sci 4(9):37\u201344","journal-title":"J Libr Inf Sci"},{"issue":"2","key":"11950_CR35","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1007\/s11227-023-05537-0","volume":"80","author":"A Mewada","year":"2024","unstructured":"Mewada A, Dewang RK (2024) NRWalk2Vec-HIN: spammer group detection based on heterogeneous information network embedding over social media. J Supercomput 80(2):1818\u20131851","journal-title":"J Supercomput"},{"key":"11950_CR36","unstructured":"Chuan S, Rui-Jia W, Xiao W (2020) A survey of heterogeneous information networks analysis and applications. Ruan Jian Xue Bao\/J Softw 33(2):598\u2013621"},{"key":"11950_CR37","doi-asserted-by":"crossref","unstructured":"Dong Y, Chawla NV, Swami A (2017) metapath2vec: Scalable representation learning for heterogeneous networks. In: ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 135\u2013144","DOI":"10.1145\/3097983.3098036"},{"key":"11950_CR38","doi-asserted-by":"crossref","unstructured":"Shi C, Zhang Z, Luo P, Yu PS, Yue Y, Wu B (2015) Semantic path based personalized recommendation on weighted heterogeneous information networks. In: International Conference on Information and Knowledge Management","DOI":"10.1145\/2806416.2806528"},{"key":"11950_CR39","doi-asserted-by":"crossref","unstructured":"Hu B, Zhang Z, Shi C, Zhou J, Li X, Qi, Y (2019) Cash-out user detection based on attributed heterogeneous information network with a hierarchical attention mechanism. In: AAAI Conference on Artificial Intelligence, pp. 946\u2013953","DOI":"10.1609\/aaai.v33i01.3301946"},{"key":"11950_CR40","doi-asserted-by":"crossref","unstructured":"Fan Y, Zhang Y, Hou S, Chen L, Ye Y, Shi C, Zhao L, Xu S (2019) idev - enhancing social coding security by cross-platform user identification between github and stack overflow. In: International Joint Conference on Artificial Intelligence, pp. 2272\u20132278","DOI":"10.24963\/ijcai.2019\/315"},{"key":"11950_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2021.125795","volume":"570","author":"N Assouli","year":"2021","unstructured":"Assouli N, Benahmed K, Gasbaoui B (2021) How to predict crime: informatics-inspired approach from link prediction. Phys A-Stat Mech Appl 570:125795","journal-title":"Phys A-Stat Mech Appl"},{"key":"11950_CR42","unstructured":"Khan BS, Niazi MA (2017) Network community detection: A review and visual survey. Social and Information Networks arXiv:abs\/1708.00977"},{"key":"11950_CR43","unstructured":"Held M, Velden T(2019) How to interpret algorithmically constructed topical structures of research specialties? a case study comparing an internal and an external mapping of the topical structure of invasion biology. Computing Research Repository arXiv:abs\/1905.03485, 1933\u20131939"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11950-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-026-11950-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11950-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:18:25Z","timestamp":1773508705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-026-11950-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["11950"],"URL":"https:\/\/doi.org\/10.1007\/s00521-026-11950-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"20 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research data is open-source data, and the website is\n                      \n                      . The authors state that this research complies with ethical standards. This research does not involve either human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"168"}}