Class information for: |
Basic class information |
| ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
|---|---|---|---|
| 5109 | 1603 | 27.8 | 27% |
Classes in level above (level 2) |
| ID, lev. above |
Publications | Label for level above |
|---|---|---|
| 176 | 21213 | WIRELESS SENSOR NETWORKS//AD HOC NETWORKS//INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS |
Terms with highest relevance score |
| Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|---|
| 1 | TRUST MANAGEMENT | Author keyword | 16 | 19% | 5% | 77 |
| 2 | REPUTATION SYSTEMS | Author keyword | 15 | 24% | 3% | 56 |
| 3 | TRUST AND REPUTATION MANAGEMENT | Author keyword | 9 | 64% | 1% | 9 |
| 4 | EMEDIA | Address | 9 | 83% | 0% | 5 |
| 5 | WORMHOLE ATTACKS | Author keyword | 9 | 59% | 1% | 10 |
| 6 | COOPERATION STIMULATION | Author keyword | 9 | 67% | 0% | 8 |
| 7 | SECURE ROUTING | Author keyword | 8 | 24% | 2% | 29 |
| 8 | ALGORITHMS SECUR GRP | Address | 6 | 80% | 0% | 4 |
| 9 | TRUST GRAPH | Author keyword | 6 | 80% | 0% | 4 |
| 10 | TRUST AND REPUTATION | Author keyword | 6 | 36% | 1% | 13 |
Web of Science journal categories |
Author Key Words |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
|---|---|---|---|---|---|---|---|
| 1 | TRUST MANAGEMENT | 16 | 19% | 5% | 77 | Search TRUST+MANAGEMENT | Search TRUST+MANAGEMENT |
| 2 | REPUTATION SYSTEMS | 15 | 24% | 3% | 56 | Search REPUTATION+SYSTEMS | Search REPUTATION+SYSTEMS |
| 3 | TRUST AND REPUTATION MANAGEMENT | 9 | 64% | 1% | 9 | Search TRUST+AND+REPUTATION+MANAGEMENT | Search TRUST+AND+REPUTATION+MANAGEMENT |
| 4 | WORMHOLE ATTACKS | 9 | 59% | 1% | 10 | Search WORMHOLE+ATTACKS | Search WORMHOLE+ATTACKS |
| 5 | COOPERATION STIMULATION | 9 | 67% | 0% | 8 | Search COOPERATION+STIMULATION | Search COOPERATION+STIMULATION |
| 6 | SECURE ROUTING | 8 | 24% | 2% | 29 | Search SECURE+ROUTING | Search SECURE+ROUTING |
| 7 | TRUST GRAPH | 6 | 80% | 0% | 4 | Search TRUST+GRAPH | Search TRUST+GRAPH |
| 8 | TRUST AND REPUTATION | 6 | 36% | 1% | 13 | Search TRUST+AND+REPUTATION | Search TRUST+AND+REPUTATION |
| 9 | WORMHOLE ATTACK | 6 | 27% | 1% | 18 | Search WORMHOLE+ATTACK | Search WORMHOLE+ATTACK |
| 10 | MANET SECURITY | 5 | 41% | 1% | 9 | Search MANET+SECURITY | Search MANET+SECURITY |
Key Words Plus |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | REPUTATION SYSTEMS | 28 | 40% | 3% | 54 |
| 2 | TRUST MODEL | 9 | 64% | 1% | 9 |
| 3 | REPUTATION AGGREGATION | 8 | 100% | 0% | 5 |
| 4 | COMPUTATIONAL TRUST | 7 | 57% | 0% | 8 |
| 5 | REPUTATION BASED TRUST | 6 | 71% | 0% | 5 |
| 6 | FUZZY REPUTATION | 3 | 60% | 0% | 3 |
| 7 | WORMHOLE ATTACKS | 3 | 32% | 0% | 7 |
| 8 | TRUST MANAGEMENT | 2 | 15% | 1% | 14 |
| 9 | TRUST MODELS | 2 | 67% | 0% | 2 |
| 10 | PUBLIC KEY MANAGEMENT | 2 | 50% | 0% | 3 |
Journals |
Reviews |
| Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
|---|---|---|---|---|
| Review on computational trust and reputation models | 2005 | 251 | 4 | 75% |
| Securing DSR against wormhole attacks in multirate ad hoc networks | 2013 | 5 | 5 | 100% |
| Security threats and solutions in MANETs: A case study using AODV and SAODV | 2012 | 12 | 7 | 86% |
| Certification-based trust models in mobile ad hoc networks: A survey and taxonomy | 2012 | 11 | 16 | 69% |
| Comparative study of trust and reputation systems for wireless sensor networks | 2013 | 6 | 34 | 47% |
| A survey of intrusion detection in wireless network applications | 2014 | 4 | 32 | 22% |
| Trust in multi-agent systems | 2004 | 148 | 17 | 35% |
| A review of trust modeling in ad hoc networks | 2009 | 13 | 7 | 86% |
| A survey of trust in computer science and the Semantic Web | 2007 | 120 | 16 | 38% |
| A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks | 2015 | 0 | 21 | 86% |
Address terms |
| Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | EMEDIA | 9 | 83% | 0.3% | 5 |
| 2 | ALGORITHMS SECUR GRP | 6 | 80% | 0.2% | 4 |
| 3 | DCSL | 4 | 75% | 0.2% | 3 |
| 4 | INGN INFORMAC COMUNICAC | 3 | 21% | 0.7% | 12 |
| 5 | CRYPTOG SYST SECUR | 3 | 38% | 0.4% | 6 |
| 6 | BASIC SOFTWARE | 3 | 60% | 0.2% | 3 |
| 7 | GLOBAL PERVAS COMP GRP | 2 | 67% | 0.1% | 2 |
| 8 | PROG S RD | 2 | 67% | 0.1% | 2 |
| 9 | BUSINESS INFORMAT TECHNOL MEDIA | 1 | 100% | 0.1% | 2 |
| 10 | EXTENDED ENTERPRISE BUSINESS INTELLIGENCE | 1 | 100% | 0.1% | 2 |
Related classes at same level (level 1) |
| Rank | Relatedness score | Related classes |
|---|---|---|
| 1 | 0.0000157514 | KEY PREDISTRIBUTION//CONCEALED DATA AGGREGATION//KEY MANAGEMENT |
| 2 | 0.0000147254 | TRUST NEGOTIATION//DISTRIBUTED PROVING//JAVA BASED MOBILE PHONE APPLICATION |
| 3 | 0.0000097981 | JAMMING DETECTION//REACTIVE JAMMING//RF FINGERPRINTS |
| 4 | 0.0000084622 | EDGE PREDICTION//FLEXRFID//HIPPOCRATIC DATABASES |
| 5 | 0.0000081197 | AUTOCONFIGURATION//IPV6 ADDRESS//IP ADDRESS ASSIGNMENT |
| 6 | 0.0000079425 | CREDENTIAL VALIDATION SERVICE//ROLE BASED ACCESS CONTROLS//ACCESS CONTROL IN COLLABORATION ENVIRONMENTS |
| 7 | 0.0000072951 | CONNECTED DOMINATING SET//MOBILE AD HOC NETWORKS//VIRTUAL BACKBONE |
| 8 | 0.0000068710 | PEER-TO-PEER NETWORKING AND APPLICATIONS//PEER TO PEER//PEER TO PEER NETWORKS |
| 9 | 0.0000067952 | LERSAIS//WEB BASED SOCIAL NETWORKS//FERTIGATION SIMULATOR |
| 10 | 0.0000062143 | INTRUSION DETECTION//ALERT CORRELATION//INTRUSION DETECTION SYSTEM |