A Novel Algorithm for Informed Investment in Cybersecurity Companies and Technologies

Abstract We introduce a novel recursive algorithm that analyzes and ranks the relative influence that companies and technologies have in a technology landscape. The algorithm also incorporates exogenous variables that reflect investor preferences. The results provide...

Identification of Future Cyberdefense Technology by Text Mining

Abstract We propose a reproducible, automated, scalable, and free method for automated bibliometric analysis that requires little computing power. We explain how firms can use this method with open source data from public repositories to generate unbiased insights...

Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox

Abstract This article describes three collective intelligence dynamics observed on ThreatFox, a free platform operated by abuse.ch that collects and shares indicators of compromise. These three dynamics are empirically analyzed with an exclusive dataset provided by...

From scattered sources to comprehensive technology landscape : A recommendation-based retrieval approach

Abstract Mapping the technology landscape is crucial for market actors to take informed investment decisions. However,given the large amount of data on the Web and its subsequent information overload, manually retrievinginformation is a seemingly ineffective and...