399
Views
0
CrossRef citations to date
0
Altmetric
Research Letter

Virtual geo-cyber environments: metaphorical visualization of virtual cyberspace with geographical knowledge

ORCID Icon, , , , &
Article: 2324959 | Received 06 Dec 2023, Accepted 24 Feb 2024, Published online: 29 Feb 2024

ABSTRACT

Cyberspace is a dynamic and complex environment that poses unique challenges in understanding and managing its intricacies. In this study, we developed a framework for ‘Geo-Cyber’ spatial correlation mapping and expression, leveraging geographical information to enhance the understanding of cyberspace. The theory of geographic metaphor is incorporated into the framework to provide a comprehensive and intuitive approach for comprehending the interplay between geographic space and cyberspace. The framework enables the modeling and visual expression of geo-cyber correlations using a layered knowledge-graph representation. To graphically represent the complex knowledge graph within cyberspace, the framework uses an ‘Object-VirtualObject-Process-Decision’ layered modeling approach, which facilitates effective navigation and comprehension of the inherent cyberspace dynamics. Based on the experimental data, we employed a virtual geo-cyber environment system to demonstrate the effectiveness of the framework. The application cases include resource navigation and situational awareness in cyberspace to showcase the practicality and relevance of the proposed framework. The analysis indicated that the framework enhances situational awareness, facilitates effective decision-making, and promotes a holistic comprehension of the interplay between geography and cyberspace by leveraging geographic information and incorporating metaphorical cognition, layered modeling, and visualization techniques.

1. Introduction

Cyberspace, a manmade space built on an information and communication technology (ICT) infrastructure, (Fang Citation2018) encompasses the physical space, virtual information space, and knowledge space, thereby providing support for various activities associated with ICT. Most existing studies focus on constructing a system for visualizing and expressing cyberspace, emphasizing its connection and mapping with the geographic space. Cyberspace has gradually emerged as a critical concern for national economic production, military warfare, and national defense security. At present, various fields are dedicated to modeling, simulating, analyzing, and depicting the complex cyberspace (Gao et al. Citation2019; Mohebbi et al. Citation2020). However, a considerable gap exists between the intangible, intricate, and dynamic nature of cyberspace and its effective expression. This can be primarily attributed to the limited detection of cyberspace resources and the insufficient description and visualization of cyberspace information. Unlike the physical world, achieving a comprehensive understanding of cyberspace becomes challenging (Gonçalves Citation2019), and conveying the cyberspace environment in a comprehensible manner is essential to enable users to grasp its intricacies and security landscape.

Cyberspace possesses distinct geographical characteristics that are primarily reflected in the spatial distribution of material resources within the virtual realm and the close relationship between online activities and physical geographic space. Geographic cognition and analysis tools, such as maps (Han, Tsou, and Clarke Citation2018) and virtual geographic environments (VGEs) are crucial for understanding cyberspace. In the era of ICT, the concept of spatial objects on maps has expanded beyond traditional geography and human interactions to encompass information, thereby creating a ternary spatial domain (Guo et al. Citation2018; Citation2021; Citation2022). Cyberspace mapping involves a combination of cartographic theories, technologies, and cybergeography (Kwan Citation2015). Cartographers have investigated cyberspace maps since the 1970s using concepts such as cybercartography (Taylor Citation2014), followed by the emergence of concept maps of cyberspace and three-dimensional (3D) hyperbolic space representations. Dodge and Kitchin (Citation2000) categorized cyberspace maps into maps in cyberspace, maps of cyberspace, and maps for cyberspace navigation. Gao and Cao (Citation2021) reported that ‘it is the responsibility of the discipline of cartography to describe cyberspace based on its development in depth and breadth’ and that ‘maps of cyberspace can serve as a reasonable extension of the concept of maps in cyberspace.’

VGEs are the latest geographic analysis tools that have evolved from maps and geographic information systems (Lin and Chen Citation2015; Lü et al. Citation2018; Citation2019). They present a communication and expression method that closely resembles natural human interactions, solving complex geographic problems and facilitating the sharing of geographic data and knowledge (Lin, Zhu, and Chen Citation2018). Since the 1990s, VGEs have significantly progressed in studying the interactions between humans and geographic space, including geographic modeling, virtual visualization, and geographic experiments (Chen et al. Citation2013; Chen and Lin Citation2018; He et al. Citation2023; Lin et al. Citation2013; Lin, Chen, and Lu Citation2013; Lü et al. Citation2018; MacEachren et al. Citation1999; Mekni Citation2018; Yu et al. Citation2021). As human activities have extended into the virtual realm of cyberspace (Hu, Luo, and Liu Citation2018; Liu et al. Citation2022), new perspectives have been introduced in terms of the interaction between spatial and temporal dimensions. Furthermore, the development of cyber infrastructure empowers individuals to engage in collaborative process modeling, simulation, and virtual experimentation within the realm of cyberspace (Chen et al. Citation2023; Klippel et al. Citation2021), thereby endowing the Digital Earth (DE) with advanced analytical capabilities. The virtualization of cyberspace is a major research focus for VGEs, and the mapping and correlation analysis of the geographic network relationships based on VGEs are essential for understanding and utilizing cyberspace.

The existing studies focus on VGEs to provide a virtual experimental platform and environment for studying the ‘human-place’ relationship. Thus far, the research emphasizes the modeling, representation, and study of human activities in geographic space. The expansion of the scope of geographical research from natural and human environments to information environments warrants the construction of a unified geographic network virtual environment to facilitate research on the ‘human-place-network’ relationship. However, several drawbacks exist in the current research on VGEs.

  1. Lack of fundamental research on the constituent elements of the network space environment: As the cyberspace is a relatively unfamiliar space, it may be challenging to understand what it entails and specifically includes.

  2. Insufficient research on modeling and representation of the network space environment: Expressing and comprehending sentiment analysis, e-commerce, network security, and social networks using fixed patterns remain challenging.

  3. Reliance of the research on network-space representation on mapping network-space elements onto geographic space: The network space environment is portrayed by designing map symbols and mapping techniques. However, several virtual assets in a network space do not contain precise geographical locations, rendering it difficult to directly represent them on a map. Therefore, new approaches are required to create unified virtual environments.

  4. Lack of unified expression for the geographic network relationship: As networks and geographic spaces are intricately related, a unified modeling and representation approach is required to accurately describe and analyze the relationship and patterns of the ‘human-place-network’ phenomenon.

Virtual geo-cyber environments (VGCEs) are based on collaborative cyberspace, the Internet of Things (IoT), and ICT, enabling users to engage in ‘human-in-the-loop’ experiences. VGCEs connect virtual cyberspace with physical geographic space and harmonize reality and virtual spaces, focusing on human cognition to correlate, process, and share geographic and cyberspace data.

In this study, VGEs, metaphor theory, knowledge graphs, and 3D DE are integrated to construct a VGCE, which serves as a platform for perceiving, navigating, analyzing, and predicting cyberspace environments. The contributions of this study can be summarized as follows.

  1. A framework is proposed for modeling and expressing the correlation between physical geographic space and cyberspace based on the cognitive demands of cyberspace considering the theories of VGEs and systems science.

  2. A complex knowledge-graph construction method is introduced based on the ‘Object-VirtualObject-Process-Decision’ (OVPD) layer model for cyberspace. Cyberspace is divided into four layers and represented as a unified complex knowledge graph using the entity-relationship logic.

  3. A mapping and expression method is presented for the geo-cyber relationship based on metaphor theory, enabling the visualization of geographic knowledge constraints within the virtual cyberspace. Owing to their highly dynamic and boundless nature, the virtual and process resource layers of cyberspace are intricately connected with, but not limited to, the geographic space.

2. Methods

2.1. Overall framework

As illustrated in , geographic space achieves the modeling, simulation, and visual representation of VGEs via the process of ‘geographic space detection → geographic scene digitalization → geographic scene simulation.’ Related theories and technological systems in this field are relatively mature and are widely applied in digital cities, geographic environment cognition, virtual geographic experiments, and autonomous driving.

Figure 1. Basic framework for modeling and expressing the spatial correlation mapping of geo-cyber spaces.

Figure 1. Basic framework for modeling and expressing the spatial correlation mapping of geo-cyber spaces.

The extensive research on cyberspace surveying and mapping has led to the establishment of a technological system encompassing ‘cyberspace detection → cyberspace resources → cyberspace modeling and expression.’ This system is applied to enhance cyberspace cognition, analyze patterns of cyberspace behavior, and optimize resource utilization.

The knowledge, approaches, and mature techniques derived from geographic space provide valuable insights for modeling, understanding, and representing cyberspace. Bridging the gap between the physical and virtual realms we can offer a more comprehensive understanding of the interconnectedness and interdependencies between these two spaces.

The important aspects of the framework can be summarized as follows:

  1. Cyberspace surveying encompasses various technologies, such as topology detection, component recognition, and analysis of text, audio, video, and websites. It can be broadly categorized into detection channels, platform technology, detection technology, and analysis of detection results. Similar to the geodetic triangulation in geographic space, the location detection of virtual resources, such as servers and Internet protocol (IP) addresses, involves the calculation of positional distances in the cyberspace detection stage. The coordinates of the other network nodes can be inferred and determined by leveraging the geographic attributes of the key node IP servers.

  2. Cyberspace resource mapping involves mapping physical resources to geographic space and virtual resources, such as virtual network characters and virtual communities, to social space. Cyberspace and geographic space are intertwined because virtual resources in cyberspace identify relevant mappings in a geographic space. For instance, servers can be mapped to geographic locations and virtual characters and role accounts can be mapped to specific areas. Manually built virtual communities and other cyberspaces, such as servers and IP networks, also exhibit intricate connections with geographic space.

  3. Cyberspace modeling encompasses complex network modeling and hierarchical modeling, and cyberspace expression involves mapping and visualization. The modeling and expression of cyberspace are inspired by geospatial hierarchical modeling, facilitating the hierarchical classification of cyberspace elements and phenomena. Additionally, virtual reality (VR) and augmented reality (AR) can be employed to express the correlation and mapping between cyberspace and VGEs. This approach is essential for analyzing the behavioral patterns and evolution of cyberspace from a geographical perspective.

  4. Based on metaphor theory, the construction of VGCE enables unified modeling and expression of geographic space and cyberspace, referred to as the unified expression of geo-cyber. This facilitates a unified correlation between nature, humanity, and the network, providing an environment for further research on the ternary relationship between humans, space, and networks.

  5. In terms of the ‘person-geo-cyber’ collaborative computing, the exchange of energy and information flow between ‘person-space,’ ‘person-network,’ and ‘space-network’ has expanded the scope of geographical research into the realm of network space. Collaborative computing between humans, space, and the network includes three categories: ‘person-space’ information computing, which focuses on human-centered geographical simulation and computation, such as geographical process simulation and spatiotemporal pattern discovery; ‘person-network’ social computing, which focuses on the social attributes and phenomena of human activities in network space, such as social network and network behavior computations; and ‘space-network’ information representation, which primarily performs situational analysis and predictions in network space.

  6. In terms of application services, the VGCE provides a collaborative computing platform for ‘person-space-network’ and other applications, including smart cities, simulation, geographic experiments, machine cognition, intelligent platform experiments, intelligent agent spatial cognition, intelligent-assisted decision-making, and social perception.

This study focuses on the metaphorical representation of geographic cyberspace, the modeling of the VGCE environment, and foundational applications.

2.2. Complex knowledge network of cyberspace based on OVPD

2.2.1. Basic concepts

Network Coordinate System: The network coordinate system is a scalable scheme for predicting Internet distances. Each participating node in a network of N nodes obtains a d-dimensional vector using a few measurements that represent the network coordinates of that node.

Network Distance: The network distance between any two nodes can be predicted using a predefined calculation rule based on their network coordinates. In a system with N network nodes, measurement complexity is O(N). Network distance is a fundamental measure used to express various cyberspace elements. The three methods for estimating the network distance are as follows:

  1. Non-coordinate estimation methods: These methods involve the direct measurement of distances; examples include the IDMaps (Francis et al. Citation2001), dynamic distance maps (Theilmann and Rothermel Citation1999), and Vivaldi (Dabek et al. Citation2004).

  2. Coordinate estimation methods: These methods map cyberspace to the Euclidean space, representing network distances as distances between nodes in the Euclidean space; examples include the GNP algorithm (Ng and Zhang Citation2002) and the IDES method (Mao, Saul, and Smith Citation2006).

  3. Network-distance estimation based on high-precision spatiotemporal information: This method records the distance between network nodes by measuring the time delays between them. This involves adding a BeiDou receiver to each router and using unified BeiDou time synchronization to calculate the network node distances (Liu et al. Citation2016).

Graph. A graph can be defined as a triple G=(V,E,φ), where V={v1,v2,,vN} represents the set of nodes, E={e1,e2,,eM} indicates the set of edges, and φ denotes the mapping from the edge set to the node set, referred to as the association function. The elements vi of V are the nodes or vertices, and the elements em of E are the edges. The degree of a node refers to the number of edges connected to that node; in a directed network, the edges associated with a node are directed and can be classified as out-degree and in-degree.

Attribute Graph. A graph that assigns certain attributes to each node and edge is referred to as an attribute graph, in which different nodes or edges exhibit different attribute values. For a node set V={v1,v2,v|V|}, V is represented as VA={va1,va2,va|V|}, where the node identifier is an attribute of V. The value domain set of VA is LV=UvaVALva; the attribute set of a node is VAi={vai1,vai2,vaip}; and the corresponding attribute set of VAi is LVi={Lvai1,Lvai2,Lvaip}. The node vi is represented as vi(VAi,LVi), that is, vi=vi((vai1,Lvai1),(vai1,Lvai2),(vaip,Lvaip)). For an edge setE={e1,e2,e|E|} with an attribute set EA={ea1,ea2,ea|EA|} and node attribute (vi,vj), the value domain set of EA is E=UeaEALea. If the edge ek(vi,vj) has both the node attribute (vi,vj)and the attribute(EAk,LEk), the edge ek is represented as ek((vi,vj),Upl), where pl=(EAkl,LEkl). The set of edges is represented as E=Uek((vi,vj),Upl), and vi and vj are nodes with the attributes vi(VAi,LVi) and vj(VAj,LVj), respectively. Therefore, the attribute graph is denoted as GA=(V(VA,LV),E(EA,LE)).

In a complex cyberspace knowledge graph, each node and edge possesses unique attributes, and their importance and relationships within the graph may differ. For instance, backbone nodes represent highly important and influential nodes in a network. They serve as key connectors and are critical for information transmission and communication. By contrast, general nodes refer to regular nodes that, although not as prominent, contribute to connecting and transmitting information in the network.

By examining the attributes and levels of importance associated with the nodes and edges, we can gain a deeper understanding of the intricate knowledge of networks in cyberspace. This analysis helps in understanding the relationships between nodes, the pathways through which information flows, and the overall structure and functionality of the network.

2.2.2. Basic structure of the cyberspace environment

As depicted in , cyberspace is highly interconnected with the land, sea, air, and space domains. The cyberspace environment or the information environment revolves around the use of information as its primary component. The environment is intricately linked to both natural and human environments, creating a complex tripartite world. The structure of cyberspace is often illustrated using the concept of layer, which categorizes the elements and relationships within this virtual realm (Guo et al. Citation2021).

Figure 2. Model of a cyberspace environment structure.

Figure 2. Model of a cyberspace environment structure.

From the perspective of cyberspace cognition and utilization, elements of cyberspace can be divided into several layers.

  1. Physical Resources Layer: This layer encompasses interconnected devices and physical logical networks that form a network infrastructure. It comprises communication channels, communication facilities, network equipment, electromagnetic devices, and other physical resources.

  2. Virtual Resources Layer: This layer comprises operating systems, application software, software configurations on devices, and logical connections between networked devices. It includes elements such as IP addresses, operating systems, application software, firewalls, malicious processes, various information services, virtual entities, social accounts, network roles, virtual roles, and virtual information resources, including data and spectrum resources.

  3. Process Resources Layer: This layer involves the activities and patterns of virtual roles within cyberspace. It encompasses process-related resources, such as cyberspace attacks, defense, operational and maintenance events, and security-related phenomena.

  4. Decision Control Layer: This layer primarily focuses on decision-making processes within cyberspace. It encompasses planning, perception, and other control commands, providing authorization for supervision and initiating, terminating, modifying, or redirecting network operations.

All these layers provide a framework for understanding and categorizing the different elements within cyberspace, enabling the effective utilization and management of the resources and processes involved.

As different perspectives lead to different understandings of cyberspace, no consensus exists on their categorization. Owing to the close connection between cyberspace and physical space, cyberspace must be viewed from a unified perspective. As indicated in , the natural space includes land, ocean, sky, and outer space, each with different network communication devices. These devices, such as land-, air-, space-, and sea-based sensors, form the IoT network along with servers, routers, and IP connections, which constitute the foundational network infrastructure in natural space. Manmade spaces include political, military, economic, social, infrastructural, and informational elements. Unlike geographic space, cyberspace cannot be categorized based on spatial domains; however, it maintains a close relationship with geographic space.

Figure 3. Diagram of the interweaving relationship among natural space, cyberspace, and human space.

Figure 3. Diagram of the interweaving relationship among natural space, cyberspace, and human space.

In this study, we focused on modeling and expressing virtual and procedural resource layers. Although virtual resources, such as IP addresses, autonomous system (AS) connections, and virtual roles, often lack precise geographical locations, they are dependent on servers or programs and can reflect real-world social roles. Based on geographic space, we explored the correlation and mapping of ‘humans-land-network’ by analyzing social networks and online public opinion to reflect human and societal phenomena and patterns.

2.2.3. Complex knowledge graph in cyberspace environment based on OVPD

A knowledge graph is a representation of the human objective world knowledge (Ji et al. Citation2022), where different types of knowledge are represented as a triple < Entity, Relationship, Entity > . This is achieved using techniques such as knowledge extraction, association, and storage. It is a complex semantic network represented as a directed graph of nodes and edges. In the context of the cyberspace environment, a knowledge graph can be represented using a 4-tuple model: Concept,Entity,Realtion,Property, where Concept denotes conceptual categorization, Entity indicates specific instances, Relation represents the set of relations (including ‘concept-entity,’ ‘entity-entity,’ and ‘entity-property’ relations), and Property denotes the various attributes of the entity.

An OVPD knowledge cognitive model can be constructed to describe the complex and multiple relationships within the cyberspace environment. This facilitates the construction of a knowledge graph for the cyberspace environment based on schema and data layers. The schema layer represents the concepts and the relationships between them and is divided into four categories, namely, entities, virtual entities, processes, and decisions. depicts the ontology system, partially constructed based on this model. Basic classes such as CObject, CVirtualObject, CProcess, and CDecision are constructed during the implementation, and the relationships between these classes are established, as shown in . Furthermore, entities in a cyberspace environment possess various properties, (TIME,POS,RGN,STA,ACT), indicating time, position, region, status, and action. For instance, ‘On xx/xx/20xx, the tower server located at address A is running normally’ can be represented as an attribute graph, as follows: (Towerserver, TIME, xx/xx/20xx) (Towerserver, POS, Address A) (Towerserver, STA, Normal). depicts the OVPD knowledge graph.

Figure 4. Cyberspace environment ontology composition.

Figure 4. Cyberspace environment ontology composition.

Figure 5. Example of knowledge representation of cyberspace environment.

Figure 5. Example of knowledge representation of cyberspace environment.

Figure 6. Layered knowledge graph of Object-VirtualObject-Process-Decision (OVPD) in cyberspace.

Figure 6. Layered knowledge graph of Object-VirtualObject-Process-Decision (OVPD) in cyberspace.

The cyberspace environment can be represented as a general graph using a knowledge representation model (). The graph exhibits several key characteristics.

  1. Directed Graph: The graph is directed with edges representing the relationships between entities. These relationships can be types of attachment (e.g. ‘is-a,’ ‘own,’ ‘act-to,’ and ‘use’), circulation (e.g. ‘link,’ ‘flow-in,’ ‘flow-out,’ and ‘passthrough’), or attribute (e.g. ‘has-time,’ ‘has-pos,’ ‘has-rgn,’ and ‘has-state’).

  2. Complex Network Characteristics: The graph exhibits complex network characteristics, where the importance of nodes can be determined by their in-degree and out-degree within a network.

  3. Complex Attribute Graph: Herein, each node represents a cyberspace entity and is associated with attribute descriptions. For instance, the entity ‘vulnerability’ may include attributes such as name, type, CNNVD number, risk level, and release time.

  4. Weighted Edges and Attribute Nodes: Different weights are assigned to edges and attribute nodes to emphasize the importance of temporal and spatial location information in the attribute properties of various elements within a cyberspace environment. These weights reflect the significance of node–attribute relationships in entities, virtual entities, processes, and decisions.

2.3. Geo-cyber mapping based on metaphor theory

Applying metaphor theory and familiar concepts from geography can help understand the cyberspace environment. Metaphor (Hartford Citation1987) is a process of understanding a new phenomenon by using familiar concepts from previous experiences. Geographic metaphor visualization involves using familiar geographic expressions to metaphorically represent things, events, phenomena, and their relationships and similarities in non-geographic domains. The metaphorical map is defined as a spatial text with a synthetic structure generated with a specific intention based on the composition of map symbols using map language as the carrier. The metaphorical map is used to describe the network distance (Fabrikant et al. Citation2004), emotion map (Ma et al. Citation2020), multi-scale virtual terrain for hierarchically structured non-location data, and information visualization (Wijayawardena, Abeysekera, and Maduranga Citation2023; Xin et al. Citation2021; Xin, Ai, and Ai Citation2018), such as distance model, map projection, feature labeling, and map design (Skupin Citation2000). Metaphoric maps contribute to knowledge organization and sharing by matching the ability of humans to perceive space and environment with the relations linking entities and concepts in the represented domain (Celentano and Pittarello Citation2012). Based on the metaphor theory, the cyberspace environment can be represented as a virtual cyberspace sphere, and the cognitive habits developed in understanding geography can be applied to understanding cyberspace.

Figure 7. Examples of conceptual layers of a complex semantic network for cyberspace environments.

Figure 7. Examples of conceptual layers of a complex semantic network for cyberspace environments.

The metaphor mapping of cyberspace includes the following elements, as depicted in :

  1. Coordinate Reference: The virtual cyberspace sphere uses a non-Euclidean coordinate system, such as the graph coordinate systems of Orion and Rigel. This is different from traditional geographic coordinate systems, such as the centroid and geodetic coordinate systems.

  2. Layers: Similar to maps, the cyberspace environment can be represented using physical, virtual, process, and decision control layers. This enables a detailed representation of elements within each layer, similar to the representation of geographic elements, such as residential areas, water systems, transportation, and vegetation, on a map.

  3. Domain Boundaries: Cyberspace domain boundaries can be compared to boundaries and national borders in the geographic space. They describe the jurisdiction and influence of different entities in the cyberspace environment, similar to the boundaries of countries.

  4. Layer Zones: The physical, virtual, process, and decision-making resource circles are represented similar to the atmospheric layers in geographic space. They symbolize different areas or levels within the cyberspace environment.

  5. Landmarks: In geographic space, a geodetic triangle network is used to represent the positions of various points (). Similarly, in cyberspace, a backbone network is constructed as the base to identify the positions of various nodes, as indicated in . This backbone network follows the triangle inequality concept, which is similar to the geodetic triangle network used in physical geography.

Figure 8. Metaphorical mapping of geospatial and cyberspace maps.

Figure 8. Metaphorical mapping of geospatial and cyberspace maps.

Figure 9. Geodetic control network.

Figure 9. Geodetic control network.

Figure 10. Network backbone.

Figure 10. Network backbone.

The application of metaphor theory to represent a cyberspace environment using familiar geographic concepts has several implications.

  1. Conformity to human cognitive habits: Utilizing metaphorical representations based on geographic concepts aligns with the human cognitive habits of understanding geographical environments. This enables individuals to easily comprehend and conceptualize cyberspace. However, it may introduce cognitive ambiguity owing to the inherent differences between cyberspace and physical geography.

  2. Unified mapping of cyberspace and geospatial space: The use of metaphorical representations enables the realization of a unified mapping of cyberspace and geospatial space. This is beneficial for joint operation commanders as they can understand and analyze cyberspace alongside traditional geospatial information on joint situational awareness maps. This integration provides a comprehensive view of the operational environment.

  3. Accurate understanding of the cyberspace situation: Incorporating geographical locations into the representation of cyberspace helps in accurately grasping the cyberspace situation. Considering the impact of geographical location enables a rapid and precise assessment of the significance of situational information associated with actual physical locations. This aids in decision-making and prioritizing actions in the cyberspace environment.

Overall, the use of metaphor theory to represent cyberspace using geographic concepts has several advantages, including alignment with cognitive habits, facilitating unified mapping, and improving situational awareness. However, the generation of potential cognitive ambiguity from the metaphorical representation of the distinct and complex cyberspace must be acknowledged.

2.4. Visualization of VCE constrained by geographic knowledge

illustrates the basic process of visualizing a VCE constrained by geographic knowledge, which includes the following steps.

  1. Representing cyberspace elements. The basic elements of a cyberspace environment are represented by an attribute graph model. This model is based on an analysis of the composition of cyberspace elements, ensuring a structured representation of the relationships and attributes of these elements, as described in Section 2.2.2.

  2. Acquiring cyberspace knowledge graph. A cyberspace knowledge graph is obtained, which includes nodes representing various elements in the cyberspace environment and relationships between them, as described in Section 2.2.3. Nodes with geographical attributes and those with high degrees, yet lacking geographical attributes, are selected as control nodes. The degree of a node is determined by its weight and the weights of the edges connected to it.

  3. Embedding control nodes. The selected control nodes are embedded into the Euclidean space to form a cyberspace coordinate system. The initial positioning of the cyberspace coordinate system is established by calculating the network coordinates of the control nodes.

  4. Calculating network coordinates. The network distances between the normal nodes (nodes without geographical attributes) and control nodes are calculated using the network coordinates of control nodes and the in- and out-vectors of normal nodes, thereby determining the network coordinates of normal nodes in the cyberspace coordinate system.

  5. Calculating geographic coordinates. Using a network distance weighting algorithm, the geographic coordinates of nodes without geographical attributes are calculated in the geographical coordinate system. This is based on nodes with geographical attributes that serve as reference points. This step enables the mapping of the cyberspace coordinates to the geographic coordinates of nodes that lack geographical information.

  6. Drawing VCE. A VCE is created based on the geographic coordinates of each node in the geographical coordinate system. This facilitates the metaphorical visualization of the coordinate system, layers, and domain elements in the cyberspace environment using familiar geographic representations.

Figure 11. Visualization of virtual cyber sphere constrained by geographic knowledge.

Figure 11. Visualization of virtual cyber sphere constrained by geographic knowledge.

(1) Selection of control nodes from the cyberspace knowledge graph

The attributes of each node in the cyberspace knowledge graph are evaluated to determine the control nodes. Control nodes are selected based on two criteria, as indicated in : nodes with geographic location attributes and nodes with high degrees but without geographic location attributes. The degree of a node is calculated by considering its own weight and the weights of the edges connected to it. These control nodes serve as reference points for embedding the cyberspace coordinate system into Euclidean space, enabling accurate visualization and understanding of the VCE. (1) D(vi)=ω(vi)vjVω(eij)ω(vj)(1) where ω denotes the weight; eij indicates the node; and vi and vj represent the edges connected to the node.

Figure 12. Selection of control nodes in the cyberspace knowledge graph.

Note: Different fill colors represent different types of network nodes.

Figure 12. Selection of control nodes in the cyberspace knowledge graph.Note: Different fill colors represent different types of network nodes.

The weight of the edges is assigned when constructing the knowledge graph, as follows: (2) ω(eij)={0.5,edgewithgeographiclocationattributes0.5n,edgewithoutgeographiclocationattributesnisthenumberofedge(2) The weight of a node, indicated as ω(vj), is determined by the number of connected nodes. The more nodes connected, the higher the weight of the node; for instance, if a node is connected to five nodes, its weight is five.

(2) Calculation of the coordinates of the control nodes

As indicated in , the initial coordinates (UMa,VMa) of the control nodes are randomly initialized. Subsequently, the function is used to calculate the NPD and MD values. For each control node, the CAL_W function is used to calculate the weight matrix ωa. The coordinates of the control nodes in the coordinate system are determined using the MDCC coordinate calculation method, which is based on robust discrete matrix decomposition. Coordinate allocation follows the shortest distance approximation (SODA) algorithm (Cheng et al. Citation2016), as follows: (3) Jn=[UnX][VnTYT]=[GnUnYTXVnTFn](3) where Gn represents the distance matrix of the control nodes; Dn indicates the distance from a control node to itself; and X and Y denote the out-vector and in-vector of the nodes, respectively. The network coordinates of the control nodes can be calculated by iteratively solving this equation and setting an error function. The out-vector of a node represents the vector pointing from that node to other nodes, whereas the in-vector represents the vector composed of other nodes pointing to the node. The matrix representing the out- and in-vectors of all control nodes are denoted as Un and Vn, respectively ().

Figure 13. Calculation of the distance in cyberspace coordinates.

Figure 13. Calculation of the distance in cyberspace coordinates.

(3) Coordinates of normal nodes

The network distance between the normal and control nodes is used to determine the network coordinates of the normal nodes in the cyberspace coordinate system. Similar to Step 2, this step follows the SODA algorithm. The specific implementation process of this algorithm can be summarized as follows.

For each normal node Vk, N neighboring control nodes are selected as reference nodes to construct a distance matrix based on their network coordinates (). (4) Qa=[UaVaTD(in,a)D(out,a)ca](4) where U and V denote the out and in coordinates of the reference node iM, respectively; D(in,a) and D(out,a) represent the in and out matrices, respectively; Q represents the distances between all pairs of points in the set formed by node iM and its reference nodes; and ca indicates the distance between iM and itself, which is typically ca=0. The matrices U and V are randomly initialized, and the weight matrix is constructed based on the selected reference node N. The weight matrix of the normal nodes is obtained, which can be utilized in iterative calculations to determine the network coordinates of the normal nodes.

Figure 14. Calculation of the distance between the normal and control nodes.

Figure 14. Calculation of the distance between the normal and control nodes.

(4) Calculation of the geographical coordinates of a node

After obtaining the network coordinates of the control and normal nodes, the shortest distance between any pair of nodes can be calculated using the formula for inner product space distance. For instance, for nodes vi and vj, Equations (Equation5) and (Equation6) represent the distances from node vi to node vj and from node vj to node vi, respectively: (5) L(vi,vj)=UviVvj(5) (6) L(vj,vi)=UvjVvi(6) L(vi,vj) represents the distance from node vi to node vj; Uvi denotes the out-coordinate of node vi; and Uvj indicates the in-coordinate of node vj. These are the network coordinates of the nodes.

The distance between the control nodes with accurate geographical coordinates and other nodes can be calculated using Equations (7), (8) and (9). Based on the weighted average of the network distances between control nodes with accurate geographical coordinates and nodes with unknown geographical coordinates, the relative geographical coordinates of the latter can be determined as follows: (7) Lj=Li+UjDLi(7) (8) Bj=Bi+VjDBi(8) (9) Zj=Zi+σZi(9) where (Li,Bi,Zi) represents the geographical coordinates (known) of nodes with accurate geographical locations; and (Lj,Bj,Zj) denotes the geographical coordinates (unknown) of nodes without accurate geographical locations. The Z value of the geographical coordinates is calculated based on the range of the spatial domain to which the network node belongs using a random number σ. To avoid excessive disturbance, we considered 0 < σ < 1.0.

3. Application prototype

3.1. Experimental data and platforms

The experimental data were collected via cyberspace mapping, encompassing the domain name system (DNS), AS, topo-scamper, topo-routeviews, topo-asnlinks, and topo-asns data; summarizes the specific details. A visualization framework was constructed using Cesium and Three.js. This interactive visualization framework combines the VGE and virtual cyberspace sphere to facilitate cyberspace analysis.

Table 1. Details of the experimental data.

3.2. VGCE

3.2.1. Visualization of multi-layer knowledge networks in cyberspace

Based on the OVPD model, a network spatial knowledge graph was formed using the experimental data ((a)). A force-directed graph model algorithm was employed to calculate the gravitational and repulsive forces, enabling the movement of nodes to new positions based on these net forces. (b) illustrates the resulting graph layout in the complex network environment. This visualization of a multilayer knowledge graph in cyberspace offers an intuitive understanding of the overall scenario, including the presence of attacks and defense nodes. However, accurately determining the distribution and specificity of cyberspace resources poses a challenge, and it may be difficult for users to rapidly comprehend cyberspace. Although this approach enables cyberspace visualization, the existing methods for network coordinate systems and distance measurements in cyberspace hinder its direct mapping to geographic space. Consequently, the obtained visualization results do not offer an intuitive understanding of the distribution of cyberspace based on geographical locations.

Figure 15. Visualization of a cyberspace knowledge graph. (a) Different colors represent the example nodes from different cyberspace resource layers. The association between different cyberspace resource layers is realized based on the relationships between entities. (b) Two-dimensional (2D) node-link visualization of a cyberspace knowledge graph, including 1000 nodes and 722 edges. All nodes are displayed on a single map.

Figure 15. Visualization of a cyberspace knowledge graph. (a) Different colors represent the example nodes from different cyberspace resource layers. The association between different cyberspace resource layers is realized based on the relationships between entities. (b) Two-dimensional (2D) node-link visualization of a cyberspace knowledge graph, including 1000 nodes and 722 edges. All nodes are displayed on a single map.

3.2.2. Visualization of VCE

Visualization of the virtual cyberspace sphere closely resembles the visualization of a 3D virtual Earth. According to the expression method for a VGE, the process involves ‘determining the coordinate system reference → constructing the control network → calculating the coordinates of cyberspace nodes → drawing the 3D sphere.’ This enables the mapping and representation of the cyberspace environment, which combines virtual and real aspects without a fixed boundary, on a 3D virtual sphere. The nodes with geographic locations and those with higher degrees ((a)) are filtered, and the resulting visualization is depicted in (b). The network coordinates of both the control and normal nodes were calculated using the cyberspace coordinate system. By leveraging the geographical coordinates of the control nodes with known locations, the geographical coordinates of the other network nodes were determined based on the cyberspace distance between these nodes and control nodes. The 3D visualization of the geographical coordinates for each network node was accomplished using node-link representations.

Figure 16. Selection of key nodes and visualization of a three-dimensional (3D) virtual cyberspace environment. (a) The deep blue nodes include geographical information, whereas the light blue nodes exhibit high degrees without geographical information. (b) Nodes without geographical information are assigned values based on distance calculations and visualized in a 3D scene.

Figure 16. Selection of key nodes and visualization of a three-dimensional (3D) virtual cyberspace environment. (a) The deep blue nodes include geographical information, whereas the light blue nodes exhibit high degrees without geographical information. (b) Nodes without geographical information are assigned values based on distance calculations and visualized in a 3D scene.

3.2.3. Geographic network metaphorical relevance

Geographical metaphors are crucial for establishing a metaphorical relationship between the VGE and VCE. This approach enables the representation of the cyberspace environment using familiar geographic concepts, such as coordinate systems, territorial boundaries, and layers.

(a) illustrates a VGE that displays a 3D DE, showcasing the relevant elements of the cyberspace environment using the DE platform. However, owing to the lack of specific geographic location information for most cyberspace elements, obtaining a complete overview of the cyberspace environment is challenging.

Figure 17. Geo-cyber space metaphorical relevance. (a) Visualization of the virtual geographic environment (VGE), including geographic coordinate system, geographic layers, and geographic boundaries. (b) Visualization of virtual cyberspace environment (VCE), including network coordinate system, cyberspace layers, and cyber domains.

Figure 17. Geo-cyber space metaphorical relevance. (a) Visualization of the virtual geographic environment (VGE), including geographic coordinate system, geographic layers, and geographic boundaries. (b) Visualization of virtual cyberspace environment (VCE), including network coordinate system, cyberspace layers, and cyber domains.

(b) depicts the VCE section that uses the metaphor of a 3D DE to depict the elements of the cyberspace environment as a virtual sphere. The surface of the sphere features a territorial map of cyberspace, establishing a metaphorical connection between cyberspace nodes and geographic space. This approach aligns with the human cognition of geographic space and enables a comprehensive understanding of the cyberspace environment. Additionally, by incorporating the metaphor of geographic space, this representation provides a perception of the association between cyberspace environment and geographic space.

3.3. Application cases

3.3.1. Physical geography, human geography, and cyberspace in VGCE

Various elements in the virtual and process resource layers of the network space lack geographical attributes. For instance, obtaining accurate geographic locations is difficult for most virtual IPs, and expressing network security protection in geographic space is challenging. (a) depicts the network space elements with precise geographical locations; however, displaying numerous network space elements that lack geographic positions is difficult. As illustrated in (b), all network space elements can be displayed in the VGCE space using the proposed method. Furthermore, based on the VGCE, natural, humanistic, and network space elements can be associated and displayed in a unified environment. In , the red nodes represent the natural geographical elements, specifically road entities; the green nodes indicate the human geographical elements, such as social and cultural organizations; and the blue nodes denote the network space elements, representing network virtual IPs and other entities.

Figure 18. (a) Representation of network space elements based on a virtual geographic environment (VGE). Most network space elements that do not contain geographical locations are difficult to model and represent in a VGE. (b) Unified expression of natural, humanistic, and network space elements based on the virtual geo-cyber environment (VGCE), which displays all layers of network space elements and achieves the associated modeling of natural, humanistic, and network space elements based on entity nodes.

Figure 18. (a) Representation of network space elements based on a virtual geographic environment (VGE). Most network space elements that do not contain geographical locations are difficult to model and represent in a VGE. (b) Unified expression of natural, humanistic, and network space elements based on the virtual geo-cyber environment (VGCE), which displays all layers of network space elements and achieves the associated modeling of natural, humanistic, and network space elements based on entity nodes.

Figure 19. (a) Blue nodes represent entities of network space elements which are shown in 3D globe earth. (b) Red nodes represent entities of natural geographical elements, such as road entities; green nodes represent entities of human geographical elements, such as social organizations; blue nodes represent entities of network space elements, such as Internet protocol (IP) entities.

Figure 19. (a) Blue nodes represent entities of network space elements which are shown in 3D globe earth. (b) Red nodes represent entities of natural geographical elements, such as road entities; green nodes represent entities of human geographical elements, such as social organizations; blue nodes represent entities of network space elements, such as Internet protocol (IP) entities.

3.3.2. Cyberspace environment resource navigation

The objective of cyberspace environment resource navigation is to provide users with a convenient method to query and locate network resources within cyberspace. This includes searching for IP addresses, AS numbers, server devices, and virtual accounts. Primarily, two approaches are used to navigate resources in the virtual cyberspace sphere.

  1. Interactive navigation through the virtual cyberspace sphere: In this approach, users can interactively navigate through the virtual cyberspace sphere to obtain specific resources; illustrates this process. Users can click on a query in the cyberspace asset vulnerability node to access detailed information on the right-hand side. This information includes the vulnerability app name, device manufacturer, asset type, vulnerability count, and protocol. Additionally, the VGE on the left-hand side enables rapid navigation to the corresponding geographic location connected to the resource.

  2. Interactive navigation through the network logic layer: This approach involves using the node-link graphical representation method to construct a layered knowledge graph of cyberspace; illustrates this technique. Users can access linkages with geographic space by clicking on the network nodes located in different layers. This navigation facilitates a comprehensive understanding of network connectivity and asset associations between various layers within cyberspace.

Figure 20. Interactive navigation through virtual cyberspace sphere.

Figure 20. Interactive navigation through virtual cyberspace sphere.

Figure 21. Interactive navigation through the cyberspace logic layer.

Figure 21. Interactive navigation through the cyberspace logic layer.

Users can efficiently query and locate network resources in cyberspace using the aforementioned interactive navigation methods. The combination of the virtual network globe and network logic layer enhances the overall understanding of the interconnections and associations between different elements of the cyberspace environment.

3.3.3. Cyberspace environment situational awareness

The purpose of situational awareness in the cyberspace environment is to provide an analysis of the current state of cyberspace attacks, defense, and operations, as well as to predict and assess unknown network security threats. illustrates this concept, where the left-hand side represents cyberspace based on the layers of Earth’s sphere, whereas the right-hand side represents the logical interaction expression of various resource layers within cyberspace. Users can utilize the virtual resource layers to select network link-type nodes and access attributes, such as the AS number, IP quantity, and virtual machine registration number. Additionally, the VGE facilitates rapid navigation to the corresponding location. Examining the distribution and connections of the network virtual resource layer nodes displayed on the right-hand side of can provide insight into the overall situation of network attacks and defenses. The geographic distribution of the cyberspace nodes on the left-hand side provides a clear understanding of the distribution of cyberspace resources associated with the different geographic layers. Based on this approach, the cyberspace situational awareness enables a comprehensive analysis and understanding of the overall state of cyberspace, including the interplay between the different resource layers and their geographic associations.

Figure 22. Geographical space layers versus the network space logic layers.

Figure 22. Geographical space layers versus the network space logic layers.

4. Conclusions and outlook

In this study, we propose a fundamental framework for geo-cyber spatial correlation mapping, modeling, and expression based on the theory of geographic metaphor to completely utilize the benefits of geographic information in understanding the cyberspace environment. The developed VGCE system is validated by demonstrating its ability to model and visually express geo-cyber correlations. This visualization method aligns with human cognitive habits in the geographic environment and enhances the comprehension of the cyberspace environment. Furthermore, it facilitates unified mapping of cyberspace and geographic space, facilitating the accurate grasping of the cyberspace situation by considering the impact of geographic location and assessing the importance of situational information.

The proposed method of geographic metaphor correlation mapping and expression presents three advantages. First, the metaphorical cognition of fundamental concepts, such as coordinates, layers, domain boundaries, circles, and landmarks is realized by mapping geographic concepts to cyberspace, providing a geographical perspective in understanding the cyberspace environment. Second, the OVPD layered modeling approach is utilized to graphically model the complex knowledge network in cyberspace, effectively leveraging the advantages of cyberspace. Third, by calculating the impact of geographic location on the network nodes, the association visualization of VGE + VCE is achieved, connecting geospatial and cyberspace through physical nodes. This improves the ability to query and navigate, enhancing the situational awareness of virtual assets in cyberspace.

However, the following limitations were observed in our analysis.

  1. Cognitive illusion of metaphor: The metaphor-based approach uses the cognitive habits of geographic space to achieve cognitive understanding of the virtual and dynamic network space environments; however, this may lead to cognitive illusions. For instance, if users view only the VGCE without the comparison display of VGE, they may misinterpret the boundaries of cyberspace as geographical boundaries. Additionally, spherically constraining the boundless network space environment can cause an unclear understanding of the network space environment.

  2. Metaphorical problem of the geographical location of virtual assets in cyberspace: To represent geographical and network information in a unified environment, we performed mapping based on network and geographical distances to calculate the position attributes of virtual nodes. However, this deviates from the actual geographical location of virtual IPs (if any), and certain virtual assets do not comprise specific locations. For instance, geographical locations have no relevance to virtual IPs or virtual roles, which may lead users to incorrectly interpret that all virtual nodes have geographical location information.

  3. Integration of natural, humanistic, and cyberspace expressions: The unified association and expression of the three aspects are realized based on the semantic space, providing a new method for the unity of the ternary space. However, the actual relationship between the three aspects is complex and may be biased to achieve their association in the same space only from a semantic perspective.

Despite its effectiveness in studying cyberspace, VGE is a complex artificial space where reality is intertwined with virtual elements. Therefore, perceiving scene elements, forming boundaries, and understanding changing dynamics using only our senses are challenging. This implies that comprehensible expression is vital for users to comprehend cyberspace and its security landscape. Cross-domain information mapping is a major concern in the field of cyberspace, which includes the challenge of mapping between information, geographic, and human environments. In the future, we intend to introduce dynamic information expression methods in VGEs by employing techniques such as multi-view collaborative correlation analysis, human–computer collaborative interaction analysis, and mapping visualization. These techniques can facilitate the analysis and mining of complex high-dimensional network data, achieving a global cognition of cyberspace. Furthermore, user experiences can be enhanced by immersion in virtual environments using technologies such as VR, AR, and extended reality, enabling the cognitive integration of geographic space and cyberspace.

Acknowledgements

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author and do not necessarily reflect the views of the National Science Foundation.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This work was supported by National Natural Science Foundation of China [grant number 42171456].

References

  • Celentano, A., and F. Pittarello. 2012. “From Real to Metaphoric Maps: Cartography as a Visual Language for Organizing and Sharing Knowledge.” Journal of Visual Languages & Computing 23 (2): 63–77. https://doi.org/10.1016/j.jvlc.2011.11.004.
  • Chen, M., C. Claramunt, A. Çöltekin, X. Liu, P. Peng, A. C. Robinson, D. Wang, et al. 2023. “Artificial Intelligence and Visual Analytics in Geographical Space and Cyberspace: Research Opportunities and Challenges.” Earth-Science Reviews 241: Article 104438. https://doi.org/10.1016/j.earscirev.2023.104438.
  • Chen, M., and H. Lin. 2018. “Virtual Geographic Environments (VGEs): Originating from or Beyond Virtual Reality (VR)?” International Journal of Digital Earth 11 (4): 329–333. https://doi.org/10.1080/17538947.2017.1419452.
  • Chen, M., H. Lin, M. Hu, L. He, and C. Zhang. 2013. “Real-geographic-scenario-based Virtual Social Environments: Integrating Geography with Social Research.” Environment and Planning B: Planning and Design 40 (6): 1103–1121. https://doi.org/10.1068/b38160.
  • Cheng, J., Y. Zhang, Q. Ye, and H. W. Du. 2016. “High-precision Shortest Distance Estimation for Large-scale Social Networks.” In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications. San Francisco, CA, USA, 1–9. https://doi.org/10.1109/INFOCOM.2016.7524580.
  • Dabek, F., R. Cox, F. Kaashoek, and R. Morris. 2004. “Vivaldi: A Decentralized Network Coordinate System.” ACM SIGCOMM Computer Communication Review 34 (4): 15–26. https://doi.org/10.1145/1030194.1015471.
  • Dodge, Martin, and Rob Kitchin. 2000. Mapping Cyberspace. Routledge. https://doi.org/10.4324/9780203279731.
  • Fabrikant, S. I., D. R. Montello, M. Ruocco, and R. S. Middleton. 2004. “The Distance–Similarity Metaphor in Network-Display Spatializations.” Cartography and Geographic Information Science 31 (4): 237–252. https://doi.org/10.1559/1523040042742402.
  • Fang, B. X. 2018. “Define Cyberspace Security.” Chinese Journal of Network and Information Security 4 (1): 1–5.
  • Francis, P., S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt, and L. Zhang. 2001. “IDMaps: A Global Internet Host Distance Estimation Service.” IEEE/ACM Transactions on Networking 9 (5): 525–540. https://doi.org/10.1109/90.958323.
  • Gao, J., and X. Cao. 2021. “The new Development Direction of Cartography Promoted by Spatial Cognition.” Acta Geodaetica et Cartographica Sinica 50 (6): 711–725. https://doi.org/10.11947/j.AGCS.2021.20210043.
  • Gao, C., Q. Guo, D. Jiang, Z. Wang, C. Fang, and M. Hao. 2019. “Theoretical Basis and Technical Methods of Cyberspace Geography.” Journal of Geographical Science 29 (12): 1949–1964. https://doi.org/10.1007/s11442-019-1698-7.
  • Gonçalves, C. P. 2019. “Cyberspace and Artificial Intelligence: The new Face of Cyber-Enhanced Hybrid Threats.” Cyberspace, IntechOpen, https://doi.org/10.5772/intechopen.88648.
  • Guo, R., Y. Chen, S. Ying, G. Lü, and Z. Li. 2018. “Geographic Visualization of pan-map with the Context of Ternary Spaces.” Geomatics and Information Science of Wuhan University 43 (11): 1603–1610. https://doi.org/10.13203/j.whugis20180373.
  • Guo, R., Y. Chen, Z. Zhao, D. Han, D. Ma, S. Ying, P. Ti, W. Ke, and Y. Fan. 2022. “Scientific Concept and Representation Framework of Maps in the ICT era.” Geomatics and Information Science of Wuhan University 47 (12): 1978–1987. https://doi.org/10.13203/j.whugis20220534.
  • Guo, Q. Q., C. D. Gao, K. F. Sun, S. Chen, D. Jiang, and M. M. Hao. 2021. “The Construction of Cyberspace Elements Hierarchical System Based on man-Land-Network Relationship.” Geographic Research 40 (1): 109–118. https://doi.org/10.11821/dlyj020200867.
  • Han, S. Y., M. H. Tsou, and K. C. Clarke. 2018. “Revisiting the Death of Geography in the era of Big Data: The Friction of Distance in Cyberspace and Real Space.” International Journal of Digital Earth 11 (5): 451–469. https://doi.org/10.1080/17538947.2017.1330366.
  • Hartford, B. S. 1987. “Women, Fire, and Dangerous Things: What Categories Reveal About the Mind.” Studies in Second Language Acquisition 11 (4): 462–464. https://doi.org/10.1017/S0272263100008469.
  • He, Y., B. Hofer, Y. Sheng, Y. Yin, and H. Lin. 2023. “Processes and Events in the Center: A Taxi Trajectory-Based Approach to Detecting Traffic Congestion and Analyzing its Causes.” International Journal of Digital Earth 16 (1): 509–531. https://doi.org/10.1080/17538947.2023.2182374.
  • Hu, T., J. Luo, and W. Liu. 2018. “Life in the “Matrix”: Human Mobility Patterns in the Cyber Space.” Proceedings of the International AAAI Conference on Web and Social Media 12 (1), https://doi.org/10.1609/icwsm.v12i1.15000.
  • Ji, S., S. Pan, E. Cambria, P. Marttinen, and S. Y. Philip. 2022. “A Survey on Knowledge Graphs: Representation, Acquisition, and Applications.” IEEE Transactions on Neural Networks and Learning Systems 33 (2): 494–514. https://doi.org/10.1109/TNNLS.2021.3070843.
  • Klippel, A., P. Sajjadi, J. Zhao, J. O. Wallgrün, J. Huang, and M. M. Bagher. 2021. “Embodied Digital Twins for Environmental Applications.” ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences 4: 193–200. https://doi.org/10.5194/isprs-annals-V-4-2021-193-2021.
  • Kwan, M. P. 2015. “Cyberspatial Cognition and Individual Access to Information: The Behavioral Foundation of Cybergeography.” Environment & Planning B: Planning & Design 28 (1): 21–37. https://doi.org/10.1068/b2560.
  • Lin, H., and M. Chen. 2015. “Managing and Sharing Geographic Knowledge in Virtual Geographic Environments (VGEs).” Annals of GIS 21 (4): 261–263. https://doi.org/10.1080/19475683.2015.1099568.
  • Lin, H., M. Chen, and G. Lu. 2013. “Virtual Geographic Environment: A Workspace for Computer-Aided Geographic Experiments.” Annals of the Association of American Geographers 103 (3): 465–482. https://doi.org/10.1080/00045608.2012.689234.
  • Lin, H., M. Chen, G. Lu, Q. Zhu, J. Gong, X. You, Y. Wen, B. Xu, and M. Hu. 2013. “Virtual Geographic Environments (VGEs): A new Generation of Geographic Analysis Tool.” Earth-Science Reviews 126: 74–84. https://doi.org/10.1016/j.earscirev.2013.08.001.
  • Lin, H., Q. Zhu, and M. Chen. 2018. “The Being and non-Being Generate Each Other, and the Virtual and the Real are Mutually Interactive-the Progress of Virtual Geographic Environments (VGE) Studies in Last 20 Years.” Acta Geodaetica et Cartographica Sinica 47 (8): 1027–1030. https://doi.org/10.11947/j.AGCS.2018.20180202.
  • Liu, X., M. Chen, C. Claramunt, M. Batty, M. P. Kwan, A. M. Senousi, G. Lü, et al. 2022. “Geographic Information Science in the era of Geospatial big Data: A Cyberspace Perspective.” The Innovation 3 (5): 100279. https://doi.org/10.1016/j.xinn.2022.100279.
  • Liu, H., R. Zhang, J. Liu, and M. Zhang. 2016. “Time Synchronization in Communication Networks Based on the Beidou Foundation Enhancement System.” Science China Technological Sciences 59 (1): 9–15. https://doi.org/10.1007/s11431-015-5974-1.
  • Lü, G., M. Batty, J. Strobl, H. Lin, A. X. Zhu, and M. Chen. 2019. “Reflections and Speculations on the Progress in Geographic Information Systems (GIS): A Geographic Perspective.” International Journal of Geographic Information Science 33 (2): 346–367. https://doi.org/10.1080/13658816.2018.1533136.
  • Lü, G., M. Chen, L. Yuan, L. Zhou, Y. Wen, M. Wu, B. Hu, Z. Yu, S. Yue, and Y. Sheng. 2018. “Geographic Scenario: A Possible Foundation for Further Development of Virtual Geographic Environments.” International Journal of Digital Earth 11 (4): 356–368. https://doi.org/10.1080/17538947.2017.1374477.
  • Ma, C. X., J. C. Song, Q. Zhu, K. Maher, Z. Y. Huang, and H. A. Wang. 2020. “EmotionMap: Visual Analysis of Video Emotional Content on a map.” Journal of Computer Science and Technology 35 (3): 576–591. https://doi.org/10.1007/s11390-020-0271-2.
  • MacEachren, A. M., R. Edsall, D. Haug, R. Baxter, G. Otto, R. Masters, S. Fuhrmann, and L. Qian. 1999. “Virtual Environments for Geographic Visualization: Potential and Challenges.” In: Proceedings of the 1999 Workshop on New Paradigms in Information Visualization and Manipulation in Conjunction with the Eighth ACM International Conference on Information and Knowledge Management, November 1999, 35–40. https://doi.org/10.1145/331770.331781.
  • Mao, Y., L. K. Saul, and J. M. Smith. 2006. “IDES: An Internet Distance Estimation Service for Large Network.” IEEE Journal on Selected Areas in Communications 24 (12): 2273–2284. https://doi.org/10.1109/JSAC.2006.884026.
  • Mekni, M. 2018. “Spatial Simulation Using Abstraction of Virtual Geographic Environments.” International Journal of Digital Earth 11 (4): 334–355. https://doi.org/10.1080/17538947.2017.1381190.
  • Mohebbi, S., Q. Zhang, E. C. Wells, T. Zhao, H. Nguyen, M. Li, N. Abdel-Mottaleb, et al. 2020. “Cyber-physical-social Interdependencies and Organizational Resilience: A Review of Water, Transportation, and Cyber Infrastructure Systems and Processes.” Sustainable Cities and Society 62: 102327. https://doi.org/10.1016/j.scs.2020.102327.
  • Ng, T. E., and H. Zhang. 2002. “Predicting Internet Network Distances with Coordinate-Based Approaches.” In Proceedings of Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, USA, 1: 170–179. https://doi.org/10.1109/INFCOM.2002.1019258.
  • Skupin, A. 2000. “From Metaphor to Method: Cartographic Perspectives on Information Visualization.” In IEEE Symposium on Information Visualization, Salt Lake City, UT, USA, 91–97. https://doi.org/10.1109/INFVIS.2000.885095.
  • Taylor, D. R. F. 2014. Developments in the Theory and Practice of Cybercartography: Applications and Indigenous Mapping. Amsterdam: Elsevier.
  • Theilmann, W., and K. Rothermel. 1999. “Dynamic Distance Maps of the Internet.” In Proceedings of the IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, 275–284. https://doi.org/10.1109/INFCOM.2000.832197.
  • Wijayawardena, A. S., R. Abeysekera, and M. W. Maduranga. 2023. “A Systematic Review of 3D Metaphoric Information Visualization.” International Journal of Modern Education and Computer Science 15 (1): 73–93. https://doi.org/10.5815/ijmecs.2023.01.06.
  • Xin, R., T. Ai, and B. Ai. 2018. “Metaphor Representation and Analysis of non-Spatial Data in map-Like Visualizations.” ISPRS International Journal of Geo-Information 7 (6): 225. https://doi.org/10.3390/ijgi7060225.
  • Xin, R., T. Ai, R. Zhu, B. Ai, M. Yang, and L. Meng. 2021. “A Multi-Scale Virtual Terrain for Hierarchically Structured non-Location Data.” ISPRS International Journal of Geo-Information 10 (6): 379. https://doi.org/10.3390/ijgi10060379.
  • Yu, D., L. Tang, F. Ye, and C. Chen. 2021. “A Virtual Geographic Environment for Dynamic Simulation and Analysis of Tailings dam Failure.” International Journal of Digital Earth 14 (9): 1194–1212. https://doi.org/10.1080/17538947.2021.1945151.