{"id":"https://openalex.org/W4406639402","doi":"https://doi.org/10.3390/informatics12010008","title":"The Evolution of Digital Security by Design Using Temporal Network Analysis","display_name":"The Evolution of Digital Security by Design Using Temporal Network Analysis","publication_year":2025,"publication_date":"2025-01-17","ids":{"openalex":"https://openalex.org/W4406639402","doi":"https://doi.org/10.3390/informatics12010008"},"language":"en","primary_location":{"id":"doi:10.3390/informatics12010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics12010008","pdf_url":"https://www.mdpi.com/2227-9709/12/1/8/pdf?version=1737125119","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2227-9709/12/1/8/pdf?version=1737125119","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043580907","display_name":"Lowri Williams","orcid":"https://orcid.org/0000-0002-3794-6145"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Lowri Williams","raw_affiliation_strings":["School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115958102","display_name":"Hamza Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hamza Khan","raw_affiliation_strings":["School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090436792","display_name":"Pete Burnap","orcid":"https://orcid.org/0000-0003-0396-633X"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pete Burnap","raw_affiliation_strings":["School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Informatics, Cardiff University, Cardiff CF24 4AG, UK","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043580907"],"corresponding_institution_ids":["https://openalex.org/I79510175"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":6.5016,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95010203,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"12","issue":"1","first_page":"8","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9190999865531921,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5482601523399353}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5482601523399353}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/informatics12010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics12010008","pdf_url":"https://www.mdpi.com/2227-9709/12/1/8/pdf?version=1737125119","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:175319","is_oa":true,"landing_page_url":null,"pdf_url":"https://orca.cardiff.ac.uk/id/eprint/175319/1/informatics-12-00008.pdf","source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:f9184deadf814c95bc3574d3a7ab3652","is_oa":true,"landing_page_url":"https://doaj.org/article/f9184deadf814c95bc3574d3a7ab3652","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics, Vol 12, Iss 1, p 8 (2025)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2227-9709/12/1/8/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/informatics12010008","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Pages: 8","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/informatics12010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics12010008","pdf_url":"https://www.mdpi.com/2227-9709/12/1/8/pdf?version=1737125119","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G404227724","display_name":"DiScriBe: Digital Security by Design Social Science Hub+","funder_award_id":"ES/V003666/1","funder_id":"https://openalex.org/F4320334630","funder_display_name":"Economic and Social Research Council"}],"funders":[{"id":"https://openalex.org/F4320334630","display_name":"Economic and Social Research Council","ror":"https://ror.org/03n0ht308"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406639402.pdf","grobid_xml":"https://content.openalex.org/works/W4406639402.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W2095881341","https://openalex.org/W3138527318","https://openalex.org/W3149084432","https://openalex.org/W3161152607","https://openalex.org/W3167136668","https://openalex.org/W3185296261","https://openalex.org/W4210388738","https://openalex.org/W4235164060","https://openalex.org/W4281632558","https://openalex.org/W4366415372","https://openalex.org/W4391843476","https://openalex.org/W4395700348","https://openalex.org/W4396794317","https://openalex.org/W4399803470","https://openalex.org/W4399940109","https://openalex.org/W4400569454","https://openalex.org/W4401113512","https://openalex.org/W6789539883","https://openalex.org/W6838855602"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Digital":[0],"Security":[1],"by":[2,9,214],"Design":[3],"(DSbD)":[4],"is":[5,186],"an":[6],"initiative":[7],"supported":[8],"the":[10,26,32,62,76,118,129,149,184,187,204,215,231,239,271],"UK":[11],"government":[12],"aimed":[13],"at":[14],"transforming":[15],"digital":[16,21,35,210],"technology":[17],"to":[18,41,83,110,127,223,238,267,270],"deliver":[19],"necessary":[20],"resilience":[22],"and":[23,49,64,99,117,139,145,158,171,220,241,258,264],"prosperity":[24],"across":[25,245],"UK.":[27],"As":[28],"emerging":[29,169],"challenges":[30],"in":[31,46,156,167,173,190],"field":[33],"of":[34,66,75,79,95,105,207,234,274],"security":[36,67,211,262],"evolve,":[37],"it":[38],"becomes":[39],"essential":[40],"explore":[42],"how":[43,136],"entities":[44],"involved":[45],"DSbD":[47,80],"interact":[48],"change":[50],"over":[51,176],"time.":[52,177],"Understanding":[53],"these":[54,133,160],"dynamic":[55],"relationships":[56,119,192],"can":[57],"provide":[58],"crucial":[59],"insights":[60,86,164],"for":[61,217],"development":[63],"improvement":[65],"practices.":[68],"This":[69],"paper":[70],"presents":[71],"a":[72,93,102,153,180],"data-driven":[73],"analysis":[74,151,185],"evolving":[77,161,225,272],"landscape":[78,273],"from":[81,87,183],"2019":[82],"2024,":[84],"gathering":[85],"textual":[88,106],"documents":[89,107],"referencing":[90],"DSbD.":[91,275],"Using":[92],"combination":[94],"text":[96],"mining":[97],"techniques":[98],"network":[100,123,150],"analysis,":[101],"large":[103],"corpus":[104],"was":[108,124],"examined":[109],"identify":[111],"key":[112,137],"entities,":[113,134],"including":[114],"organisations,":[115],"individuals,":[116],"between":[120,132],"them.":[121],"A":[122],"then":[125],"visualised":[126],"analyse":[128],"structural":[130],"connections":[131],"revealing":[135],"concepts":[138],"actors":[140],"have":[141],"evolved.":[142],"The":[143],"results":[144,253],"discussion":[146],"demonstrate":[147],"that":[148,200],"offers":[152],"unique":[154],"advantage":[155],"tracking":[157],"visualising":[159],"relationships,":[162],"providing":[163],"into":[165,209],"shifts":[166],"focus,":[168],"trends,":[170],"changes":[172],"technological":[174],"adoption":[175,244],"For":[178],"example,":[179],"notable":[181],"finding":[182],"substantial":[188],"increase":[189],"node":[191],"associated":[193],"with":[194],"Artificial":[195],"Intelligence":[196],"(AI).":[197],"We":[198],"hypothesise":[199],"this":[201],"surge":[202],"reflects":[203],"growing":[205],"integration":[206],"AI":[208,236],"strategies,":[212],"driven":[213],"need":[216],"more":[218],"adaptive":[219],"autonomous":[221],"solutions":[222],"tackle":[224],"cyber":[226],"threats,":[227],"as":[228,230],"well":[229],"rapid":[232],"introduction":[233],"new":[235,261],"tools":[237],"market":[240],"their":[242],"swift":[243],"various":[246],"industries.":[247],"By":[248],"mapping":[249],"such":[250,252],"connections,":[251],"are":[254],"useful,":[255],"helping":[256],"practitioners":[257],"researchers":[259],"recognise":[260],"demands":[263],"adjust":[265],"strategies":[266],"better":[268],"respond":[269]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
