Class information for: |
Basic class information |
| ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
|---|---|---|---|
| 24787 | 252 | 24.6 | 21% |
Classes in level above (level 2) |
| ID, lev. above |
Publications | Label for level above |
|---|---|---|
| 1591 | 6600 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION |
Terms with highest relevance score |
| Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|---|
| 1 | MTTSF | Author keyword | 4 | 75% | 1% | 3 |
| 2 | VULNERABILITY DISCOVERY MODEL | Author keyword | 2 | 67% | 1% | 2 |
| 3 | EMC APPROACH | Author keyword | 1 | 50% | 1% | 2 |
| 4 | CVSS | Author keyword | 1 | 30% | 1% | 3 |
| 5 | CODE SECURITY | Author keyword | 1 | 40% | 1% | 2 |
| 6 | MEAN TIME TO SECURITY FAILURE | Author keyword | 1 | 40% | 1% | 2 |
| 7 | ATTACK GRAPH | Author keyword | 1 | 10% | 3% | 8 |
| 8 | AIR SCI | Address | 1 | 33% | 1% | 2 |
| 9 | ADVERSARIAL MODELING | Author keyword | 1 | 50% | 0% | 1 |
| 10 | ATTACK PROCESS | Author keyword | 1 | 50% | 0% | 1 |
Web of Science journal categories |
Author Key Words |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
|---|---|---|---|---|---|---|---|
| 1 | MTTSF | 4 | 75% | 1% | 3 | Search MTTSF | Search MTTSF |
| 2 | VULNERABILITY DISCOVERY MODEL | 2 | 67% | 1% | 2 | Search VULNERABILITY+DISCOVERY+MODEL | Search VULNERABILITY+DISCOVERY+MODEL |
| 3 | EMC APPROACH | 1 | 50% | 1% | 2 | Search EMC+APPROACH | Search EMC+APPROACH |
| 4 | CVSS | 1 | 30% | 1% | 3 | Search CVSS | Search CVSS |
| 5 | CODE SECURITY | 1 | 40% | 1% | 2 | Search CODE+SECURITY | Search CODE+SECURITY |
| 6 | MEAN TIME TO SECURITY FAILURE | 1 | 40% | 1% | 2 | Search MEAN+TIME+TO+SECURITY+FAILURE | Search MEAN+TIME+TO+SECURITY+FAILURE |
| 7 | ATTACK GRAPH | 1 | 10% | 3% | 8 | Search ATTACK+GRAPH | Search ATTACK+GRAPH |
| 8 | ADVERSARIAL MODELING | 1 | 50% | 0% | 1 | Search ADVERSARIAL+MODELING | Search ADVERSARIAL+MODELING |
| 9 | ATTACK PROCESS | 1 | 50% | 0% | 1 | Search ATTACK+PROCESS | Search ATTACK+PROCESS |
| 10 | CLOUD COMPUTING CIRCUMSTANCE | 1 | 50% | 0% | 1 | Search CLOUD+COMPUTING+CIRCUMSTANCE | Search CLOUD+COMPUTING+CIRCUMSTANCE |
Key Words Plus |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | COMMON VULNERABILITY | 4 | 75% | 1% | 3 |
| 2 | ALERT PRIORITIZATION | 1 | 40% | 1% | 2 |
| 3 | ATTACK GRAPHS | 1 | 15% | 2% | 6 |
| 4 | DAA SCHEME | 1 | 50% | 0% | 1 |
| 5 | AGENT SYSTEM | 0 | 33% | 0% | 1 |
| 6 | INTRUSION TOLERANT SYSTEMS | 0 | 33% | 0% | 1 |
| 7 | ANONYMOUS ATTESTATION SCHEME | 0 | 25% | 0% | 1 |
| 8 | E BANKING | 0 | 20% | 0% | 1 |
| 9 | COMPOSITE PERFORMANCE | 0 | 17% | 0% | 1 |
| 10 | BDD BASED ALGORITHM | 0 | 10% | 0% | 1 |
Journals |
Reviews |
| Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
|---|---|---|---|---|
| The theory and practice in the evolution of trusted computing | 2014 | 0 | 3 | 67% |
| Model-based evaluation: From dependability to security | 2004 | 118 | 53 | 6% |
Address terms |
| Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | AIR SCI | 1 | 33% | 0.8% | 2 |
| 2 | COMP INFORMAT CONTENT SECUR | 1 | 50% | 0.4% | 1 |
| 3 | CONNECTED OBJECTS | 1 | 50% | 0.4% | 1 |
| 4 | IIG TELEMAT | 1 | 50% | 0.4% | 1 |
| 5 | INTEGRATED SECUR TECHNOL | 1 | 50% | 0.4% | 1 |
| 6 | LRI CNRS 8623 | 1 | 50% | 0.4% | 1 |
| 7 | MECH ENGN MAT PROGRAM | 1 | 50% | 0.4% | 1 |
| 8 | IND INFORMAT CONTROL SYST | 0 | 14% | 1.2% | 3 |
| 9 | BIOMED ENGN ELECT TELECOMMUN | 0 | 33% | 0.4% | 1 |
| 10 | BUSINESS ADM SOC | 0 | 33% | 0.4% | 1 |
Related classes at same level (level 1) |
| Rank | Relatedness score | Related classes |
|---|---|---|
| 1 | 0.0000218673 | INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION//SUPERVISORY CONTROL AND DATA ACQUISITION SCADA SYSTEMS//TRUST CASE |
| 2 | 0.0000205695 | INTRUSION DETECTION//ALERT CORRELATION//INTRUSION DETECTION SYSTEM |
| 3 | 0.0000175110 | COMPUTERS & SECURITY//INFORMATION SYSTEMS SECURITY//IS SECUR |
| 4 | 0.0000133834 | INTERNET INFORMAT COMMUN//SOFTWARE FAULT ISOLATION//RANGE CHECKING |
| 5 | 0.0000126796 | REQUIREMENTS ENGINEERING//PROBLEM FRAMES//VIEWPOINTS |
| 6 | 0.0000114128 | SOFTWARE REJUVENATION//SOFTWARE AGING//OPTIMAL SOFTWARE REJUVENATION |
| 7 | 0.0000094268 | CAUSALITY GRAPH MODEL//EVENT CORRELATION//COGNIT ENGN PROGRAM |
| 8 | 0.0000093822 | DIRECTED HYPERGRAPHS//SUBSET GRAPH//SET THEORETIC ALGORITHMS |
| 9 | 0.0000083101 | IP TRACEBACK//DISTRIBUTED DENIAL OF SERVICE DDOS//DENIAL OF SERVICE |
| 10 | 0.0000082801 | TROMBONING//CELLULAR DIGITAL PACKET DATA CDPD//ARCHITECTURE TEAM |