{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:06:29Z","timestamp":1775667989268,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11192-019-03279-6","type":"journal-article","created":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T08:33:54Z","timestamp":1572683634000},"page":"267-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Not all areas are equal: analysis of citations in information security research"],"prefix":"10.1007","volume":"122","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1913-5912","authenticated-orcid":false,"given":"Steffen","family":"Wendzel","sequence":"first","affiliation":[]},{"given":"C\u00e9dric","family":"L\u00e9vy-Bencheton","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"issue":"2","key":"3279_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1145\/1531793.1531815","volume":"43","author":"T Anderson","year":"2009","unstructured":"Anderson, T. (2009). Conference reviewing considered harmful. ACM SIGOPS Operating Systems Review, 43(2), 108\u2013116. \nhttps:\/\/doi.org\/10.1145\/1531793.1531815\n\n.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"3279_CR2","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-73951-9_16","volume-title":"Cyber threat intelligence","author":"J Baldwin","year":"2018","unstructured":"Baldwin, J., Alhawi, O. M., Shaughnessy, S., Akinbi, A., & Dehghantanha, A. (2018). Emerging from the cloud: A bibliometric analysis of cloud forensics studies. In A. Dehghantanha, M. Conti, & T. Dargahi (Eds.), Cyber threat intelligence (pp. 311\u2013331). Cham: Springer."},{"issue":"2","key":"3279_CR3","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1007\/s11192-018-2682-1","volume":"115","author":"L Bornmann","year":"2018","unstructured":"Bornmann, L., & Leydesdorff, L. (2018). Count highly-cited papers instead of papers with h citations: Use normalized citation counts and compare \u201clike with like\u201d!. Scientometrics, 115(2), 1119\u20131123. \nhttps:\/\/doi.org\/10.1007\/s11192-018-2682-1\n\n.","journal-title":"Scientometrics"},{"key":"3279_CR4","doi-asserted-by":"publisher","unstructured":"Burcham, M., Al-Zyoud, M., Carver, J. C., Alsaleh, M., Du, H., Gilani, F., Jiang, J., Rahman, A., Kafal\u0131, O., Al-Shaer, E., & Williams, L. (2017). Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In Proceedings of the hot topics in science of security: Symposium and bootcamp, HoTSoS (pp. 13\u201323). ACM, New York. \nhttps:\/\/doi.org\/10.1145\/3055305.3055307","DOI":"10.1145\/3055305.3055307"},{"issue":"3","key":"3279_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MITP.2018.032501746","volume":"20","author":"K Cabaj","year":"2018","unstructured":"Cabaj, K., Caviglione, L., Mazurczyk, W., Wendzel, S., Woodward, A., & Zander, S. (2018). The new threats of information hiding: the road ahead. IT Professional, 20(3), 31\u201339.","journal-title":"IT Professional"},{"key":"3279_CR6","doi-asserted-by":"publisher","unstructured":"Carver, J. C., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., King, J., Markkula, J., Oivo, M., Sauerwein, C., & Williams, L. (2016). Establishing a baseline for measuring advancement in the science of security: An analysis of the 2015 IEEE security and privacy proceedings. In Proceedings of the symposium and bootcamp on the science of security, HotSos\u201916 (pp. 38\u201351). ACM, New York. \nhttps:\/\/doi.org\/10.1145\/2898375.2898380","DOI":"10.1145\/2898375.2898380"},{"issue":"2","key":"3279_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.17645\/pag.v6i2.1385","volume":"6","author":"MD Cavelty","year":"2018","unstructured":"Cavelty, M. D. (2018). Cybersecurity research meets science and technology studies. Politics and Governance, 6(2), 22\u201330.","journal-title":"Politics and Governance"},{"key":"3279_CR8","unstructured":"Chakraborty, J., Pradhan, D., Dutta, H. S., Nandi, S., & Chakraborty, T. (2018). On good and bad intentions behind anomalous citation patterns among journals in computer sciences. CoRR \narXiv:1807.10804"},{"issue":"3","key":"3279_CR9","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1007\/s11192-017-2628-z","volume":"114","author":"T Chakraborty","year":"2018","unstructured":"Chakraborty, T. (2018). Role of interdisciplinarity in computer sciences: Quantification, impact and life trajectory. Scientometrics, 114(3), 1011\u20131029. \nhttps:\/\/doi.org\/10.1007\/s11192-017-2628-z\n\n.","journal-title":"Scientometrics"},{"key":"3279_CR10","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.procs.2018.10.278","volume":"139","author":"M Cobo","year":"2018","unstructured":"Cobo, M., J\u00fcrgens, B., Herrero-Solana, V., Mart\u00ednez, M., & Herrera-Viedma, E. (2018). Industry 4.0: A perspective based on bibliometric analysis. Procedia Computer Science, 139, 364\u2013371. \nhttps:\/\/doi.org\/10.1016\/j.procs.2018.10.278\n\n. (6th International Conference on Information Technology and Quantitative Management).","journal-title":"Procedia Computer Science"},{"issue":"3","key":"3279_CR11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/2812803","volume":"59","author":"C Collberg","year":"2016","unstructured":"Collberg, C., & Proebsting, T. A. (2016). Repeatability in computer systems research. Communications of the ACM, 59(3), 62\u201369. \nhttps:\/\/doi.org\/10.1145\/2812803\n\n.","journal-title":"Communications of the ACM"},{"key":"3279_CR12","unstructured":"Corporation, M. (2010). The science of cyber security. Tech. Rep. JSR-10-102, MITRE. \nhttp:\/\/www.fas.org\/irp\/agency\/dod\/jason\/cyber.pdf"},{"key":"3279_CR13","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s11192-016-2214-9","volume":"110","author":"JM Fernandes","year":"2017","unstructured":"Fernandes, J. M., & Monteiro, M. P. (2017). Evolution in the number of authors of computer science publications. Scientometrics, 110, 529\u2013539.","journal-title":"Scientometrics"},{"issue":"4","key":"3279_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/publications5040023","volume":"5","author":"D Fiala","year":"2017","unstructured":"Fiala, D., & Tutoky, G. (2017). Computer science papers in web of science: A bibliometric analysis. Publications, 5(4), 23. \nhttps:\/\/doi.org\/10.3390\/publications5040023\n\n.","journal-title":"Publications"},{"issue":"5","key":"3279_CR15","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/S0306-4573(00)00047-9","volume":"37","author":"AA Goodrum","year":"2001","unstructured":"Goodrum, A. A., McCain, K. W., Lawrence, S., & Giles, C. L. (2001). Scholarly publishing in the internet age: A citation analysis of computer science literature. Information Processing & Management, 37(5), 661\u2013675.","journal-title":"Information Processing & Management"},{"key":"3279_CR16","doi-asserted-by":"publisher","unstructured":"Herley, C., & van Oorschot, P. C. (2017). Sok: Science, security and the elusive goal of security as a scientific pursuit. In 2017 IEEE symposium on security and privacy (SP) (pp. 99\u2013120). IEEE. \nhttps:\/\/doi.org\/10.1109\/SP.2017.38","DOI":"10.1109\/SP.2017.38"},{"issue":"6","key":"3279_CR17","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-physical systems security-a survey. IEEE Internet of Things Journal, 4(6), 1802\u20131831.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"3279_CR18","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1007\/s11192-019-03086-z","volume":"119","author":"W Iqbal","year":"2019","unstructured":"Iqbal, W., Qadir, J., Tyson, G., Mian, A. N., Hassan, Su, & Crowcroft, J. (2019). A bibliometric analysis of publications in computer networking research. Scientometrics, 119(2), 1121\u20131155. \nhttps:\/\/doi.org\/10.1007\/s11192-019-03086-z\n\n.","journal-title":"Scientometrics"},{"issue":"1","key":"3279_CR19","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TVCG.2016.2598827","volume":"23","author":"P Isenberg","year":"2017","unstructured":"Isenberg, P., Isenberg, T., Sedlmair, M., Chen, J., & M\u00f6ller, T. (2017). Visualization as seen through its research paper keywords. IEEE Transactions on Visualization and Computer Graphics, 23(1), 771\u2013780. \nhttps:\/\/doi.org\/10.1109\/TVCG.2016.2598827\n\n.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"3279_CR20","doi-asserted-by":"publisher","unstructured":"Jia, H., & Saule, E. (2017). An analysis of citation recommender systems: Beyond the obvious. In Proceedings of the 2017 IEEE\/ACM international conference on advances in social networks analysis and mining 2017, ASONAM \u201917 (pp. 216\u2013223). ACM, New York, NY. \nhttps:\/\/doi.org\/10.1145\/3110025.3110150","DOI":"10.1145\/3110025.3110150"},{"key":"3279_CR21","first-page":"1","volume-title":"Network science and cybersecurity","author":"A Kott","year":"2014","unstructured":"Kott, A. (2014). Towards fundamental science of cyber security. In R. E. Pino (Ed.), Network science and cybersecurity (pp. 1\u201313). New York: Springer."},{"issue":"7","key":"3279_CR22","first-page":"1055","volume":"58","author":"K Kousha","year":"2007","unstructured":"Kousha, K., & Thelwall, M. (2007). Google scholar citations and google web\/url citations: A multi-discipline exploratory analysis. Journal of the Association for Information Science and Technology, 58(7), 1055\u20131065.","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"3279_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11192-018-2741-7","volume":"116","author":"M Li","year":"2018","unstructured":"Li, M. (2018). Classifying and ranking topic terms based on a novel approach: Role differentiation of author keywords. Scientometrics, 116(1), 77\u2013100.","journal-title":"Scientometrics"},{"issue":"2","key":"3279_CR24","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1080\/0194262X.2017.1415183","volume":"37","author":"KI MacDonald","year":"2018","unstructured":"MacDonald, K. I., & Dressler, V. (2018). Using citation analysis to identify research fronts: A case study with the internet of things. Science & Technology Libraries, 37(2), 171\u2013186. \nhttps:\/\/doi.org\/10.1080\/0194262X.2017.1415183\n\n.","journal-title":"Science & Technology Libraries"},{"key":"3279_CR25","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-981-10-5523-2_20","volume-title":"Intelligent Communication and Computational Technologies","author":"PR Makawana","year":"2018","unstructured":"Makawana, P. R., & Jhaveri, R. H. (2018). A bibliometric analysis of recent research on machine learning for cyber security. In Y. C. Hu, S. Tiwari, K. K. Mishra, & M. C. Trivedi (Eds.), Intelligent Communication and Computational Technologies (pp. 213\u2013226). Singapore: Springer Singapore."},{"issue":"2","key":"3279_CR26","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/MSP.2015.33","volume":"13","author":"W Mazurczyk","year":"2015","unstructured":"Mazurczyk, W., & Caviglione, L. (2015). Information hiding as a challenge for malware detection. IEEE Security Privacy, 13(2), 89\u201393.","journal-title":"IEEE Security Privacy"},{"key":"3279_CR27","unstructured":"Meyer, B. (2011). The nastiness problem in computer science. Posting in the blog of Comm. ACM. \nhttp:\/\/cacm.acm.org\/blogs\/blog-cacm\/123611-the-nastiness-problem-in-computer-science\/fulltext"},{"issue":"3","key":"3279_CR28","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/2500098.2500112","volume":"43","author":"JC Mogul","year":"2013","unstructured":"Mogul, J. C. (2013). Towards more constructive reviewing of CS papers. ACM SIGCOMM Computer Communication Review, 43(3), 90\u201394. \nhttps:\/\/doi.org\/10.1145\/2500098.2500112\n\n.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"3279_CR29","first-page":"62","volume":"65","author":"RI Muhamedyev","year":"2018","unstructured":"Muhamedyev, R. I., Aliguliyev, R. M., Shokishalov, Z. M., & Mustakayev, R. R. (2018). New bibliometric indicators for prospectivity estimation of research fields. Annals of Library and Information Studies, 65, 62\u201369.","journal-title":"Annals of Library and Information Studies"},{"key":"3279_CR30","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s11192-018-2691-0","volume":"115","author":"S Shen","year":"2018","unstructured":"Shen, S., Rousseau, R., & Wang, D. (2018). Do papers with an institutional e-mail address receive more citations than those with a non-institutional one? Scientometrics, 115, 1039\u20131050.","journal-title":"Scientometrics"},{"key":"3279_CR31","unstructured":"Stanton, J., Mastrangelo, P., Stam, K., & Jolton, J. (2004). Behavioral information security: Two end user survey studies of motivation and security practices. In AMCIS 2004 proceedings (pp. 175)."},{"issue":"3","key":"3279_CR32","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.joi.2016.04.016","volume":"10","author":"X Sun","year":"2016","unstructured":"Sun, X., Ding, K., & Lin, Y. (2016). Mapping the evolution of scientific fields based on cross-field authors. Journal of Informetrics, 10(3), 750\u2013761.","journal-title":"Journal of Informetrics"},{"key":"3279_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.joi.2009.06.002","volume":"4","author":"ES Vieira","year":"2009","unstructured":"Vieira, E. S., & Gomes, J. A. (2009). Citations to scientific articles: Its distribution and dependence on the article features. Journal of Informetrics, 4, 1\u201313.","journal-title":"Journal of Informetrics"},{"key":"3279_CR34","doi-asserted-by":"publisher","unstructured":"Wendzel, S. (2018). Get me cited, Scotty! Analysis of academic publications in covert channel\/steganography research. In Proceedings of the 13th international conference on availability, reliability and security (ARES\u201918) (pp. 13:1\u201313:8). ACM, New York, NY. \nhttps:\/\/doi.org\/10.1145\/3230833.3233265","DOI":"10.1145\/3230833.3233265"},{"issue":"2","key":"3279_CR35","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s11192-015-1740-1","volume":"105","author":"BN Yan","year":"2015","unstructured":"Yan, B. N., Lee, T. S., & Lee, T. P. (2015). Mapping the intellectual structure of the internet of things (IoT) field (2000\u20132014): a co-word analysis. Scientometrics, 105(2), 1285\u20131300.","journal-title":"Scientometrics"},{"issue":"1","key":"3279_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2015.1450520100128","volume":"43","author":"K Yang","year":"2006","unstructured":"Yang, K., & Meho, L. I. (2006). Citation analysis: A comparison of google scholar, scopus, and web of science. Proceedings of the Association for Information Science and Technology, 43(1), 1\u201315.","journal-title":"Proceedings of the Association for Information Science and Technology"}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-019-03279-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-019-03279-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-019-03279-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:35:40Z","timestamp":1604190940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-019-03279-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["3279"],"URL":"https:\/\/doi.org\/10.1007\/s11192-019-03279-6","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"value":"0138-9130","type":"print"},{"value":"1588-2861","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"28 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}