From foundations to frontiers: a bibliometric examination of cyber threat intelligence studies
Palabras clave:
Cyber threat intelligence (CTI); bibliometric analysis; cybersecurityResumen
Objective. Cyber threat intelligence (CTI), which focuses on gathering, analyzing, and sharing data on new threats and adversaries, has become a crucial area of cybersecurity. Understanding the academic and practical environment of CTI is essential given the growing relevance of proactive defense measures and the developing cyber threats. A thorough bibliometric examination of the CTI literature from its inception, encompassing articles from 2012 through 2023, is presented in this paper. Design/Methodology/Approach. Using a collection of over 611 scholarly publications from the Scopus database, we aim to monitor this developing subject's growth, trends, and research tendencies. Authors, groups, and countries are identified as significant contributors to CTI research in our analysis, along with recurring themes and topics that have influenced the discourse over time. Results/Discusion. Key findings indicate a significant rise in CTI publications following 2012, with a clear shift from theoretical discussions to practical applications and real-world case studies. Collaboration networks among researchers and institutions highlight the interdisciplinary nature of CTI, drawing expertise from fields such as computer science, information security, and international relations. The study also identifies emerging areas of interest, including the integration of artificial intelligence in CTI and the challenges of threat intelligence sharing in a globalized digital landscape. Conclusions. In conclusion, the bibliometric study underscores the dynamic and evolving nature of cyber threat intelligence, highlighting its growing significance in the fight against cyber threats. Continuous research, interdisciplinary collaboration, and innovation are vital for staying ahead of these threats and safeguarding digital assets in an increasingly interconnected world. Originality/Value. By providing a holistic overview of the CTI research landscape, this bibliometric analysis offers valuable insights for scholars, practitioners, and policymakers engaged in ongoing efforts to enhance cyber resilience and security.
Descargas
Citas
Abbas, A.F., Jusoh, A., Masod, A. and Ali, J. (2021), “A Bibliometric Analysis of Publications on Social Media Influencers Using Vosviewer”, Journal of Theoretical and Applied Information Technology, Vol. 99 No. 23, pp. 5662–5676. https://www.jneonatalsurg.com/index.php/jns/article/view/2478
Abu, M.S., Selamat, S.R., Ariffin, A. and Yusof, R. (2018), “Cyber threat intelligence–issue and challenges”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 10 No. 1, pp. 371–379. https://ijeecs.iaescore.com/index.php/IJEECS/article/view/11065
Agbo, F.J., Oyelere, S.S., Suhonen, J. and Tukiainen, M. (2021), “Scientific production and thematic breakthroughs in smart learning environments: a bibliometric analysis”, Smart Learning Environments, 8, (1), 1, https://orcid.org/10.1186/s40561-020-00145-4
Al Mamun, M.A., Azad, M.A.K., Al Mamun, M.A. and Boyle, M. (2022), Review of flipped learning in engineering education: Scientific mapping and research horizon, Education and Information Technologies, 27 (1), 1261–1286, https://orcid.org/10.1007/s10639-021-10630-z
Aria, M. and Cuccurullo, C. (2017), “bibliometrix: An R-tool for comprehensive science mapping analysis”, Journal of Informetrics, 11, (4), 959–975, https://orcid.org/10.1016/j.joi.2017.08.007
Bales, M.E., Wright, D.N., Oxley, P.R. and Wheeler, T.R. (2020), Bibliometric visualization and analysis software: State of the art, workflows, and best practices. https://ecommons.cornell.edu/items/e3561c0c-1651-4632-abbd-3a22c62a874f
Barnum, S. (2012), Standardizing cyber threat intelligence information with the structured threat information expression (stix), Mitre Corporation, 11, 1–22. https://www.mitre.org/sites/default/files/publications/stix.pdf
Barrot, J.S. (2023), Trends in automated writing evaluation systems research for teaching, learning, and assessment: A bibliometric analysis, Education and Information Technologies, https://orcid.org/10.1007/s10639-023-12083-y
Chen, C., Dubin, R. and Kim, M.C. (2014), Emerging trends and new developments in regenerative medicine: a scientometric update (2000 – 2014), Expert Opinion on Biological Therapy, 14 (9), 1295–1317, https://orcid.org/10.1517/14712598.2014.920813
Conti, M., Dargahi, T. and Dehghantanha, A. (2018), Cyber Threat Intelligence: Challenges and Opportunities”, in Dehghantanha, A., Conti, M. and Dargahi, T. (Eds.), Cyber Threat Intelligence, Springer International Publishing, Cham, 1–6, https://orcid.org/10.1007/978-3-319-73951-9_1
D. Schlette, M. Caselli, and G. Pernul. (2021), A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective, IEEE Communications Surveys & Tutorials, 23 (4), 2525–2556, https://orcid.org/10.1109/COMST.2021.3117338
Dao, L.T., Tran, T., Van Le, H., Nguyen, G.N. and Trinh, T.P.T. (2023), A bibliometric analysis of Research on Education 4.0 during the 2017–2021 period. Education and Information Technologies, 28 (3), 2437–2453, https://orcid.org/10.1007/s10639-022-11211-4
Dennehy, D., Griva, A., Pouloudi, N., Mäntymäki, M. and Pappas, I. (2022), Artificial intelligence for decision-making and the future of work, International Journal of Information Management, Elsevier Ltd, https://orcid.org/10.1016/j.ijinfomgt.2022.102574
Dibbern, T.A., Rampasso, I.S., Pavan Serafim, M., Bertazzoli, R., Leal Filho, W. and Anholon, R. (2023), Bibliometric study on SDG 6: analysing main content aspects by using Web of Science data from 2015 to 2021, Kybernetes, 52 No.( 9) 3119–3135, https://orcid.org/10.1108/K-05-2021-0393
Donthu, N., Kumar, S., Mukherjee, D., Pandey, N. and Lim, W.M. (2021), How to conduct a bibliometric analysis: An overview and guidelines, Journal of Business Research, 133, 285–296, https://orcid.org/10.1016/j.jbusres.2021.04.070
van Eck, N.J. and Waltman, L. (2014), Visualizing Bibliometric Networks, in Ding, Y., Rousseau, R. and Wolfram, D. (Eds.), Measuring Scholarly Impact: Methods and Practice, Springer International Publishing, Cham, pp. 285–320, https://orcid.org/10.1007/978-3-319-10377-8_13
Fauzi, M.A. (2023), Cyberbullying in higher education: a review of the literature based on bibliometric analysis. Kybernetes, https://orcid.org/10.1108/K-12-2022-1667
Godin, B. (2006), On the origins of bibliometrics Scientometrics, 68 (1), 109–133, https://orcid.org/10.1007/s11192-006-0086-0
Guleria, D. and Kaur, G. (2021), Bibliometric analysis of ecopreneurship using VOSviewer and RStudio Bibliometrix, 1989–2019, Library Hi Tech, Emerald Publishing Limited, 39 (4), 1001–1024, https://orcid.org/10.1108/LHT-09-2020-0218
Husaeni, D.F.A. and Nandiyanto, A.B.D. (2022), Bibliometric computational mapping analysis of publications on mechanical engineering education using Vosviewer, 17. https://jestec.taylors.edu.my/Vol%2017%20Issue%202%20April%20%202022/17_2_23.pdf
Kattamuri, S.J., Penmatsa, R.K.V., Chakravarty, S. and Madabathula, V.S.P. (2023), Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence, Electronics, MDPI, 12, (2), 342. https://www.mdpi.com/2079-9292/12/2/342
Kayode-Ajala, O. (2023), Applications of Cyber Threat Intelligence (CTI) in Financial Institutions and Challenges in Its Adoption, Applied Research in Artificial Intelligence and Cloud Computing, 6, (8), 1–21. https://core.ac.uk/download/pdf/588488097.pdf
Kotsias, J., Ahmad, A. and Scheepers, R. (2023), Adopting and integrating cyber-threat intelligence in a commercial organisation, European Journal of Information Systems, Taylor & Francis, 32 (1), 35–51, https://orcid.org/10.1080/0960085X.2022.2088414
Lee, M. (2023), Cyber Threat Intelligence, John Wiley & Sons. https://www.wiley.com/en-us/Cyber+Threat+Intelligence-p-00370670
Mukherjee, B. (2020), Analysis of Global Research Trends in Coronaviruses: A Bibliometric Investigation, Journal of Scientometric Research, 9 (2), 185–194, https://orcid.org/10.5530/jscires.9.2.22
Nandiyanto, A.B.D., Husaeni, D.N.A. and Husaeni, D.F.A. (2021), A bibliometric analysis of chemical engineering research using Vosviewer and its correlation with covid-19 pandemic condition, vol. 16. https://jestec.taylors.edu.my/Vol%2016%20Issue%206%20December%20%202021/16_6_4.pdf
Pinto, M., Fernández-Pascual, R., Caballero-Mariscal, D., Sales, D., Guerrero, D. and Uribe, A. (2019), Scientific production on mobile information literacy in higher education: a bibliometric analysis (2006–2017), Scientometrics, 120 (1 ), 57–85, https://orcid.org/10.1007/s11192-019-03115-x
Racine, J.S. (2012). “RStudio: a platform-independent IDE for R and Sweave”, JSTOR.
Rojas-Sánchez, M.A., Palos-Sánchez, P.R. and Folgado-Fernández, J.A. (2023), “Systematic literature review and bibliometric analysis on virtual reality and education”, Education and Information Technologies, 28 ,(1), 155–192, https://orcid.org/10.1007/s10639-022-11167-5
Salim, N., Gopal, K. and Ayub, A. (2019). Effects of using RStudio on statistics performance of Malaysian undergraduates” Malaysian Journal of Mathematical Sciences, 13 (3), 419–437. https://mjms.upm.edu.my/fullpaper/2019-September-13-3/Salim,%20N.%20R.-419-437.pdf
Sawangwong, A. and Chaopaisarn, P. (2023). The impact of applying knowledge in the technological pillars of Industry 4.0 on supply chain performance, Kybernetes, 52 (3), 1094–1126, https://orcid.org/10.1108/K-07-2021-0555
Schlette, D., Böhm, F., Caselli, M. and Pernul, G. (2021), Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20. 1, 21–38, https://orcid.org/10.1007/s10207-020-00490-y
Scientific Mapping of Gravity Model of International Trade Literature: A Bibliometric Analysis. Journal of Scientometric Research, 11 (3), 447–457, https://orcid.org/110.5530/jscires.11.3.48
Shekhar, S.K. and Shah, M.A. (2023), Sports Marketing and Conceptual Evolution: A Bibliometric Analysis, SAGE Open, Vol. 13 No. 3, p. 21582440231192915, https://orcid.org/10.1177/21582440231192915
Singh, S., Solkhe, A. and Gautam, P. (2022). What do we know about Employee Productivity?: Insights from Bibliometric Analysis, Journal of Scientometric Research, 11 (2), 183–198, https://orcid.org/10.5530/jscires.11.2.20
Souza de Cursi, E. (2023), Some Tips to Use R and RStudio, in Souza de Cursi, E. (Ed.), Uncertainty Quantification Using R, Springer International Publishing, Cham, 1–108 https://orcid.org/10.1007/978-3-031-17785-9_1
Sufi, F. (2023), A New Social Media-Driven Cyber Threat Intelligence. Electronics, 2 (5), https://orcid.org/10.3390/electronics12051242
Thomson, R., Mosier, R. and Worosz, M. (2023), COVID research across the social sciences in 2020: a bibliometric approach. Scientometrics 128 (6), 3377–3399, https://orcid.org/10.1007/s11192-023-04714-5
Tomaszewski, R. (2023), Visibility, impact, and applications of bibliometric software tools through citation analysis. Scientometrics, 128 (7), 4007–4028, https://orcid.org/10.1007/s11192-023-04725-2
V. Mavroeidis and S. Bromander. (2017), Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence, 2017 European Intelligence and Security Informatics Conference (EISIC), presented at the 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98, https://orcid.org/10.1109/EISIC.2017.20
Wagner, T.D., Mahbub, K., Palomar, E. and Abdallah, A.E. (2019), Cyber threat intelligence sharing: Survey and research directions, Computers & Security. 87, 101589, https://orcid.org/10.1016/j.cose.2019.101589
Waltman, L., van Eck, N.J. and Noyons, E.C.M. (2010), A unified approach to mapping and clustering of bibliometric networks, Journal of Informetrics, 4 (4), 629–635, https://orcid.org/10.1016/j.joi.2010.07.002
Descargas
Publicado
Versiones
- 2026-01-07 (2)
- 2026-01-07 (1)
Cómo citar
Número
Sección
Licencia
Derechos de autor 2026 Jeena Joseph, Binu Thomas, Jobin Jose

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.




