Abstract

The purpose behind the technical analysis and science mapping in front of researchers to make them aware of the Internet of Things and mobile networking for providing collaborated security along with a visualized presentation to the financial and engineering researchers about the virtual vulnerability assessment issues. The objectives of this study are to analyze the available review of the literature and measure the most cited Journals through citation analysis and co-authorship analysis. The approach of BA (Bibliometric Analysis) has been executed in order to visualize literature reviews systematically. The researcher performed an in-depth study with reference to Collaborative Security and wireless networks (582), Collaborative Security and vulnerability assessment (253) and WiFi Security and Vulnerability Assessment (34) studies are available. The figures have been made through executing data over VOSviewer and tables are formed after compiling various affiliations. This technical study will help provide a literature base for more research to be executed in the arena of Information Systems (IS), Engineering, Computer Sciences, and Financial Technology. Also, it will provide a conceptual record for those practitioners and policymakers who are interested in performing exploratory research on wifi security assessment. It has been observed that more work can be done quantitatively for having certain measures regarding the virtual aspects of collaborative security amid its issues related to payment systems. Just mentioned the data are from Google Scholar and Dimensions.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.