The number of citations attracted by publications is a key crite- ria for measuring their success. To avoid discriminating newer research, such a metric is usually measured in average yearly ci- tations. Understanding and characterizing how citations behave have been prime research topics, yet investigations targeting the cybersecurity domain seem to be particularly scarce. In this perspective, the paper aims at filling this gap by analyzing average yearly citations for 6, 693 papers published in top-tier conferences and journals in cybersecurity. Results indicate the existence of three clusters, i.e., general security conferences, general security journals, and cryptography-centered publications. The analysis also sug- gests that the amount of conference-to-conference citations stands out compared to journal-to-journal and conference-to-journal ci- tations. Besides, papers published at top conferences attract more citations although a direct comparison against other venues is not straightforward. To better quantify the impact of works dealing with cybersecurity aspects, the paper introduces two new metrics, namely the number of main words in the title, and the combined number of unique main words in title, abstract and keywords. Collected results show that they can be associated with average yearly citations (together with the number of cited references). Finally, the paper draws some ideas to take advantage from such findings.

Crème de la Crème: Lessons from Papers in Security Publications

L Caviglione;
2021

Abstract

The number of citations attracted by publications is a key crite- ria for measuring their success. To avoid discriminating newer research, such a metric is usually measured in average yearly ci- tations. Understanding and characterizing how citations behave have been prime research topics, yet investigations targeting the cybersecurity domain seem to be particularly scarce. In this perspective, the paper aims at filling this gap by analyzing average yearly citations for 6, 693 papers published in top-tier conferences and journals in cybersecurity. Results indicate the existence of three clusters, i.e., general security conferences, general security journals, and cryptography-centered publications. The analysis also sug- gests that the amount of conference-to-conference citations stands out compared to journal-to-journal and conference-to-journal ci- tations. Besides, papers published at top conferences attract more citations although a direct comparison against other venues is not straightforward. To better quantify the impact of works dealing with cybersecurity aspects, the paper introduces two new metrics, namely the number of main words in the title, and the combined number of unique main words in title, abstract and keywords. Collected results show that they can be associated with average yearly citations (together with the number of cited references). Finally, the paper draws some ideas to take advantage from such findings.
2021
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
978-1-4503-9051-4
bibliometrics
cybersecurity
File in questo prodotto:
File Dimensione Formato  
prod_454730-doc_175404.pdf

solo utenti autorizzati

Descrizione: Crème de la Crème: Lessons from Papers in Security Publications
Tipologia: Versione Editoriale (PDF)
Dimensione 1.21 MB
Formato Adobe PDF
1.21 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
prod_454730-doc_176568.pdf

solo utenti autorizzati

Descrizione: Crème de la Crème: Lessons from Papers in Security Publications - Published Version
Tipologia: Versione Editoriale (PDF)
Dimensione 1.26 MB
Formato Adobe PDF
1.26 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/396900
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact