Class information for: |
Basic class information |
| Class id | #P | Avg. number of references |
Database coverage of references |
|---|---|---|---|
| 29225 | 190 | 18.7 | 21% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
| rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
|---|---|---|---|---|---|---|
| 1 | 72 BIT KEY | authKW | 160713 | 1% | 100% | 1 |
| 2 | ABNORMAL MALICIOUS CODE | authKW | 160713 | 1% | 100% | 1 |
| 3 | ABNORMAL NETWORK CONNECTION | authKW | 160713 | 1% | 100% | 1 |
| 4 | ABUSE OF PROTOCOLS | authKW | 160713 | 1% | 100% | 1 |
| 5 | ACCESS CONTROL TECHNIQUES | authKW | 160713 | 1% | 100% | 1 |
| 6 | ACCESS CONTROL TO NETWORK RESOURCES | authKW | 160713 | 1% | 100% | 1 |
| 7 | ADAPTIVE RULE AND RULE GENERATION | authKW | 160713 | 1% | 100% | 1 |
| 8 | AEGEAN UNIT | address | 160713 | 1% | 100% | 1 |
| 9 | ASYMMETRIC PUBLIC KEY SYSTEM | authKW | 160713 | 1% | 100% | 1 |
| 10 | AUTOMATED FIREWALL MANAGEMENT | authKW | 160713 | 1% | 100% | 1 |
Web of Science journal categories |
| Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
|---|---|---|---|---|---|
| 1 | Computer Science, Hardware & Architecture | 5980 | 32% | 0% | 60 |
| 2 | COMPUTER APPLICATIONS & CYBERNETICS | 3922 | 4% | 0% | 8 |
| 3 | Computer Science, Software Engineering | 2239 | 25% | 0% | 48 |
| 4 | Computer Science, Information Systems | 1278 | 22% | 0% | 41 |
| 5 | Computer Science, Theory & Methods | 1248 | 23% | 0% | 43 |
| 6 | Telecommunications | 1104 | 21% | 0% | 39 |
| 7 | Multidisciplinary Sciences | 249 | 6% | 0% | 12 |
| 8 | Information Science & Library Science | 156 | 5% | 0% | 9 |
| 9 | Criminology & Penology | 114 | 3% | 0% | 5 |
| 10 | Law | 44 | 3% | 0% | 6 |
Address terms |
| Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
|---|---|---|---|---|---|
| 1 | AEGEAN UNIT | 160713 | 1% | 100% | 1 |
| 2 | DEC INCLUDED DEV PROJECTS | 160713 | 1% | 100% | 1 |
| 3 | GRP DEVELOPING TOPS 20 | 160713 | 1% | 100% | 1 |
| 4 | SALFORD LAW | 160713 | 1% | 100% | 1 |
| 5 | SECUR PRACTICE | 160713 | 1% | 100% | 1 |
| 6 | COMP NETWORK SECUR | 80355 | 1% | 50% | 1 |
| 7 | INFORMAT TECHNOL OPERAT | 40177 | 1% | 25% | 1 |
| 8 | SERV DIDATT SCI | 40177 | 1% | 25% | 1 |
| 9 | SUN MICROSYST S | 32141 | 1% | 20% | 1 |
| 10 | DIPARTIMENTO INFORMAT RM C OCELLI | 26784 | 1% | 17% | 1 |
Journals |
| Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
|---|---|---|---|---|---|
| 1 | AT&T TECHNICAL JOURNAL | 125401 | 11% | 4% | 21 |
| 2 | INFORMATION AGE | 27060 | 2% | 4% | 4 |
| 3 | ABACUS-NEW YORK | 14282 | 1% | 4% | 2 |
| 4 | AMERICAN SCIENTIST | 13389 | 6% | 1% | 11 |
| 5 | COMMUNICATIONS OF THE ACM | 9785 | 8% | 0% | 16 |
| 6 | IEEE SECURITY & PRIVACY | 9143 | 3% | 1% | 6 |
| 7 | COMPUTERS & SECURITY | 8606 | 4% | 1% | 8 |
| 8 | COMPUTER DECISIONS | 7559 | 1% | 2% | 2 |
| 9 | AT&T BELL LABORATORIES TECHNICAL JOURNAL | 7139 | 1% | 2% | 2 |
| 10 | INTERFACES IN COMPUTING | 4725 | 1% | 3% | 1 |
Author Key Words |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
| Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
|---|---|---|---|---|
| 1 | REYNOLDS, JK , (1991) THE HELMINTHIASIS OF THE INTERNET.COMPUTER NETWORKS AND ISDN SYSTEMS. VOL. 22. ISSUE 5. P. 347-361 | 17 | 74% | 1 |
| 2 | ANDREASSEN, AL , LEIGHTON, WJ , SCHREIBER, DF , (1988) INFORMATION SECURITY - AN OVERVIEW.AT&T TECHNICAL JOURNAL. VOL. 67. ISSUE 3. P. 2-8 | 7 | 100% | 1 |
| 3 | PALMIERI, F , FIORE, U , (2008) CONTAINING LARGE-SCALE WORM SPREADING IN THE INTERNET BY COOPERATIVE DISTRIBUTION OF TRAFFIC FILTERING POLICIES.COMPUTERS & SECURITY. VOL. 27. ISSUE 1-2. P. 48-62 | 3 | 100% | 1 |
| 4 | BEST, PJ , MOHAY, G , ANDERSON, A , (1997) MIATA: A MACHINE-INDEPENDENT AUDIT TRAIL ANALYSER.AUSTRALIAN COMPUTER JOURNAL. VOL. 29. ISSUE 2. P. 57-63 | 5 | 83% | 1 |
| 5 | BROOKS, TA , KAPLAN, MM , (1994) SECURITY TECHNOLOGIES.AT&T TECHNICAL JOURNAL. VOL. 73. ISSUE 5. P. 4-8 | 6 | 75% | 1 |
| 6 | CROAK, MR , (1994) EMERGING TECHNOLOGIES AND THE MESSAGING MARKET.AT&T TECHNICAL JOURNAL. VOL. 73. ISSUE 3. P. 4-6 | 5 | 83% | 0 |
| 7 | VAUGHN, RB , (2003) ADVANCES IN THE PROVISION OF SYSTEM AND SOFTWARE SECURITY - THIRTY YEARS OF PROGRESS.ADVANCES IN COMPUTERS, VOL 58. VOL. 58. ISSUE . P. 287-340 | 3 | 100% | 0 |
| 8 | OPPLIGER, R , (1997) INTERNET SECURITY: FIREWALLS AND BEYOND.COMMUNICATIONS OF THE ACM. VOL. 40. ISSUE 5. P. 92-102 | 3 | 100% | 30 |
| 9 | LABUSCHAGNE, L , ELOFF, JHP , (1998) THE USE OF REAL-TIME RISK ANALYSIS TO ENABLE DYNAMIC ACTIVATION OF COUNTERMEASURES.COMPUTERS & SECURITY. VOL. 17. ISSUE 4. P. 347-357 | 3 | 100% | 1 |
| 10 | LANDSBERG, GL , (1991) COMPUTER VIRUSES AND SOME METHOD OF THEIR DISARMING.USPEKHI FIZICHESKIKH NAUK. VOL. 161. ISSUE 2. P. 161-191 | 4 | 100% | 0 |
Classes with closest relation at Level 1 |