{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:58:21Z","timestamp":1769921901192,"version":"3.49.0"},"reference-count":45,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Recently, as core technologies leading the fourth industrial revolution, such as the Internet of Things (IoT), 5G, the cloud, and big data, have promoted smart convergence across national socio-economic infrastructures, cyber systems are expanding and becoming complex, and they are not effective in responding to cyber safety risks and threats using security technology solutions limited to a single system. Therefore, we developed cyber security technology that combines machine learning and AI technology to solve complex problems related to cyber safety. In this regard, this study aims to identify technology development trends to prevent the risks and threats of various cyber systems by monitoring major cyber security convergence fields and technologies through the symmetrical thesis and patent analysis. Because thesis information can explain the superiority of technology and patent information can explain the usefulness of a technology, they can be effectively used for analyzing and predicting technology development trends. Therefore, in this study, latent Dirichlet allocation is applied to extract text-document-based technical topics for the symmetrical thesis and patent information to identify security convergence fields and technologies for cyber safety. In addition, it elucidates cyber security convergence fields and technology trends by applying a dynamic topic model and long short-term memory, which are useful for analyzing technological changes and predicting trends. Based on these results, cyber security administrators, system operators, and developers can effectively identify and respond to trends in related technologies to reduce threats, and companies and experts developing cyber security solutions can present a new security approach.<\/jats:p>","DOI":"10.3390\/sym14040683","type":"journal-article","created":{"date-parts":[[2022,3,27]],"date-time":"2022-03-27T21:31:25Z","timestamp":1648416685000},"page":"683","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields"],"prefix":"10.3390","volume":"14","author":[{"given":"Seung-Yeon","family":"Hwang","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, University of Anyang, Anyang-si 14058, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9957-0489","authenticated-orcid":false,"given":"Dong-Jin","family":"Shin","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Anyang, Anyang-si 14058, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0125-1907","authenticated-orcid":false,"given":"Jeong-Joon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Software, University of Anyang, Anyang-si 14058, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"Nepal","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/j.dss.2004.06.004","article-title":"Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach","volume":"41","author":"Gupta","year":"2006","journal-title":"Decis. Support Syst."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Razzaq, A., Hur, A., Ahmad, H.F., and Masood, M. (2013, January 6\u20138). Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. Proceedings of the 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), Mexico City, Mexico.","DOI":"10.1109\/ISADS.2013.6513420"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1080\/17517575.2019.1600041","article-title":"Integration of social and IoT technologies: Architectural framework for digital transformation and cyber security challenges","volume":"15","author":"Mendhurwar","year":"2019","journal-title":"Enterp. Inf. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Soni, S., and Bhushan, B. (2019, January 5\u20136). Use of Machine Learning algorithms for designing efficient cyber security solutions. Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India.","DOI":"10.1109\/ICICICT46008.2019.8993253"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"106946","DOI":"10.1016\/j.comnet.2019.106946","article-title":"Cybersecurity in industrial control systems: Issues, technologies, and challenges","volume":"165","author":"Asghar","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tawalbeh, L., Muheidat, F., Tawalbeh, M., and Quwaider, M. (2020). IoT Privacy and Security: Challenges and Solutions. Appl. Sci., 10.","DOI":"10.3390\/app10124102"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1016\/j.future.2020.06.028","article-title":"Enhancing cyber\u2013physical systems with hybrid smart city cyber security architecture for secure public data-smart network","volume":"112","author":"Sengan","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/TAC.2020.2987307","article-title":"The Vulnerability of Cyber-Physical System Under Stealthy Attacks","volume":"66","author":"Tianju","year":"2021","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","article-title":"Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks","volume":"4","author":"Abomhara","year":"2015","journal-title":"J. Cyber Secur. Mobil."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"109869","DOI":"10.1016\/j.automatica.2021.109869","article-title":"The vulnerability of distributed state estimator under stealthy attacks","volume":"133","author":"Sui","year":"2021","journal-title":"Automatica"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ilhan, I., and Karakose, M. (2019, January 21\u201322). Requirement Analysis for Cybersecurity Solutions in Industry 4.0 Platforms. Proceedings of the 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, Turkey.","DOI":"10.1109\/IDAP.2019.8875930"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/EMR.2019.2927559","article-title":"Addressing Industry 4.0 Cybersecurity Challenges","volume":"47","author":"Culot","year":"2019","journal-title":"IEEE Eng. Manag. Rev."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Alani, M.M., and Alloghani, M. (2019). Security Challenges in the Industry 4.0 Era. Ind. 4.0 Eng. Sustain. Future, 117\u2013136.","DOI":"10.1007\/978-3-030-12953-8_8"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.jare.2014.02.006","article-title":"Cyber security challenges in Smart Cities: Safety, security and privacy","volume":"5","author":"Elmaghraby","year":"2014","journal-title":"J. Adv. Res."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.cose.2019.07.003","article-title":"The least secure places in the universe? A systematic literature review on information security management in higher education","volume":"86","author":"Bongiovanni","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.future.2018.09.063","article-title":"Government regulations in cyber security: Framework, standards and recommendations","volume":"92","author":"Srinivas","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1093\/scipol\/scy061","article-title":"Regulating risks within complex sociotechnical systems: Evidence from critical infrastructure cybersecurity standards","volume":"46","author":"Slayton","year":"2019","journal-title":"Sci. Public Policy"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chhaya, L., Sharma, P., Kumar, A., and Bhagwatikar, G. (2020). Cybersecurity for Smart Grid: Threats, Solutions and Standardization. Adv. Greener Energy. Technol., 17\u201329.","DOI":"10.1007\/978-981-15-4246-6_2"},{"key":"ref_20","unstructured":"(2020, December 11). ISO\/IEC 27100. Information Technology-Security Techniques-Cyber Security-Overview and Concepts. Available online: https:\/\/www.iso27001security.com\/html\/27100.html."},{"key":"ref_21","unstructured":"(2020, December 11). ISO\/IEC 27101. Information Security, Cyber Security and Privacy Protection-Cyber Security Framework Development Guidelines. Available online: https:\/\/www.iso27001security.com\/html\/27101.html."},{"key":"ref_22","unstructured":"(2020, December 11). ISO\/IEC 27102. Information Security Management-Guidelines for Cyber-Insurance. Available online: https:\/\/www.iso27001security.com\/html\/27102.html."},{"key":"ref_23","unstructured":"(2020, December 11). ISO\/IEC 27103. Information Technology-Security Techniques-Cyber Security and ISO and IEC Standards. Available online: https:\/\/www.iso27001security.com\/html\/27103.html."},{"key":"ref_24","unstructured":"(2020, December 11). ISO\/IEC 27032. Information Technology-Security Techniques-Guidelines for Cyber Security. Available online: https:\/\/www.iso27001security.com\/html\/27032.html."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.cose.2019.02.009","article-title":"Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership","volume":"83","author":"Vitunskaite","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"102364","DOI":"10.1016\/j.scs.2020.102364","article-title":"Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city","volume":"63","author":"Singh","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"50","DOI":"10.13005\/ojcst12.02.04","article-title":"A Review on Cyber Security and the Fifth Generation Cyberattacks","volume":"12","author":"Saravanan","year":"2016","journal-title":"Orient. J. Comput. Sci. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.ymssp.2013.06.004","article-title":"Prognostics and health management design for rotary machinery systems\u2014Reviews, methodology and applications","volume":"42","author":"Lee","year":"2013","journal-title":"Mech. Syst. Signal Process."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.jlp.2017.07.015","article-title":"Accidents and the technology","volume":"49","author":"Silva","year":"2017","journal-title":"J. Loss Prev. Process Ind."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1016\/j.techfore.2006.04.004","article-title":"Forecasting emerging technologies: Use of bibliometrics and patent analysis","volume":"73","author":"Daim","year":"2006","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.techfore.2017.03.020","article-title":"Identifying potentially disruptive trends by means of keyword network analysis","volume":"119","author":"Dotsika","year":"2017","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.techfore.2018.08.013","article-title":"Identifying convergence fields and technologies for industrial safety: LDA-based network analysis","volume":"138","author":"Song","year":"2018","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.techfore.2019.01.012","article-title":"Forecasting technology trends using text mining of the gaps between science and technology: The case of perovskite solar cell technology","volume":"146","author":"Li","year":"2019","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.bushor.2019.03.010","article-title":"Muddling through cybersecurity: Insights from the U.S. healthcare industry","volume":"62","author":"Abraham","year":"2019","journal-title":"Bus. Horizons"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1016\/j.promfg.2017.09.093","article-title":"Towards Industry 4.0: An overview of European strategic roadmaps","volume":"13","author":"Santos","year":"2017","journal-title":"Procedia Manuf."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.techfore.2017.03.009","article-title":"Topic-based technological forecasting based on patent data: A case study of Australian patents from 2000 to 2014","volume":"119","author":"Chen","year":"2017","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1016\/j.jclepro.2014.10.034","article-title":"Identifying trends in battery technologies with regard to electric mobility: Evidence from patenting activities along and across the battery value chain","volume":"87","author":"Golembiewski","year":"2015","journal-title":"J. Clean. Prod."},{"key":"ref_38","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Sievert, C., and Shirley, K. (2014, January 27). LDAvis: A method for visualizing and interpreting topics. Proceedings of the Workshop on Interactive Language Learning, Visualization, and Interfaces, Baltimore, MD, USA.","DOI":"10.3115\/v1\/W14-3110"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Blei, D.M., and Lafferty, J.D. (2006, January 25\u201329). Dynamic topic models. Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh Pennsylvania, USA.","DOI":"10.1145\/1143844.1143859"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"101419","DOI":"10.1016\/j.compenvurbsys.2019.101419","article-title":"Tracking urban geo-topics based on dynamic topic model","volume":"79","author":"Yao","year":"2019","journal-title":"Comput. Environ. Urban Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.neucom.2018.08.067","article-title":"LSTM-based traffic flow prediction with missing data","volume":"318","author":"Tian","year":"2018","journal-title":"Neurocomputing"},{"key":"ref_44","unstructured":"Panetta, K. (2020, December 11). Gartner Top 10 Strategic Technology Trends for 2020. Available online: https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-10-strategic-technology-trends-for-2020\/."},{"key":"ref_45","unstructured":"(2022, March 23). Gartner, Hype Cycle for Risk Management. Available online: https:\/\/www.gartner.com\/en\/documents\/3953584."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/4\/683\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:43:32Z","timestamp":1760136212000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/4\/683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":45,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["sym14040683"],"URL":"https:\/\/doi.org\/10.3390\/sym14040683","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,25]]}}}