Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
12 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | 1181119 |
35 | 3 | TELECOMMUNICATIONS//IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS//ENGINEERING, ELECTRICAL & ELECTRONIC | 110941 |
80 | 2 | WIRELESS SENSOR NETWORKS//TELECOMMUNICATIONS//AD HOC NETWORKS | 27323 |
12415 | 1 | WORMHOLE ATTACK//MOBILE AD HOC NETWORKS//SECURE ROUTING | 938 |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | WORMHOLE ATTACK | authKW | 733804 | 3% | 70% | 31 |
2 | MOBILE AD HOC NETWORKS | authKW | 534926 | 13% | 13% | 125 |
3 | SECURE ROUTING | authKW | 454728 | 3% | 44% | 31 |
4 | MANET | authKW | 380580 | 9% | 13% | 89 |
5 | MANET SECURITY | authKW | 305439 | 1% | 91% | 10 |
6 | BLACK HOLE ATTACK | authKW | 302381 | 1% | 75% | 12 |
7 | COOPERATION STIMULATION | authKW | 238921 | 1% | 89% | 8 |
8 | AD HOC NETWORKS | authKW | 234164 | 12% | 6% | 114 |
9 | MALICIOUS NODE | authKW | 172779 | 1% | 43% | 12 |
10 | ROUTING SECURITY | authKW | 169381 | 1% | 46% | 11 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Telecommunications | 54541 | 64% | 0% | 603 |
2 | Computer Science, Information Systems | 39552 | 54% | 0% | 502 |
3 | Computer Science, Hardware & Architecture | 9427 | 18% | 0% | 169 |
4 | Computer Science, Theory & Methods | 4151 | 19% | 0% | 175 |
5 | Engineering, Electrical & Electronic | 3776 | 38% | 0% | 357 |
6 | Computer Science, Software Engineering | 1069 | 8% | 0% | 77 |
7 | Computer Science, Artificial Intelligence | 141 | 4% | 0% | 36 |
8 | Transportation Science & Technology | 105 | 1% | 0% | 14 |
9 | Computer Science, Interdisciplinary Applications | 97 | 3% | 0% | 32 |
10 | Automation & Control Systems | 30 | 2% | 0% | 15 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | DCSL | 75595 | 0% | 75% | 3 |
2 | CRYPTOG SYST SECUR | 75589 | 1% | 38% | 6 |
3 | BUSINESS INFORMAT TECHNOL MEDIA | 67197 | 0% | 100% | 2 |
4 | KIT LANGUAGE TECHNOL DOCTORATE | 67197 | 0% | 100% | 2 |
5 | MULTIMEDIA NETWORKS CEMNET | 67197 | 0% | 100% | 2 |
6 | YD | 67197 | 0% | 100% | 2 |
7 | ALGORITHMS SECUR GRP | 60475 | 0% | 60% | 3 |
8 | BASIC SOFTWARE | 60475 | 0% | 60% | 3 |
9 | NETWORK INFORMAT OPERAT SECT | 44797 | 0% | 67% | 2 |
10 | SECUR CRYPTOG LASEC | 44797 | 0% | 67% | 2 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | SECURITY AND COMMUNICATION NETWORKS | 59782 | 6% | 3% | 53 |
2 | AD HOC NETWORKS | 41480 | 4% | 3% | 41 |
3 | IEEE TRANSACTIONS ON MOBILE COMPUTING | 14178 | 3% | 1% | 29 |
4 | COMPUTER NETWORKS | 12530 | 4% | 1% | 38 |
5 | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 7966 | 3% | 1% | 26 |
6 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 7752 | 1% | 2% | 11 |
7 | COMPUTERS & SECURITY | 7558 | 2% | 1% | 17 |
8 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 7225 | 2% | 1% | 20 |
9 | WIRELESS NETWORKS | 7090 | 2% | 1% | 20 |
10 | WIRELESS PERSONAL COMMUNICATIONS | 7074 | 4% | 1% | 33 |
Author Key Words |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass | LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | WORMHOLE ATTACK | 733804 | 3% | 70% | 31 | Search WORMHOLE+ATTACK | Search WORMHOLE+ATTACK |
2 | MOBILE AD HOC NETWORKS | 534926 | 13% | 13% | 125 | Search MOBILE+AD+HOC+NETWORKS | Search MOBILE+AD+HOC+NETWORKS |
3 | SECURE ROUTING | 454728 | 3% | 44% | 31 | Search SECURE+ROUTING | Search SECURE+ROUTING |
4 | MANET | 380580 | 9% | 13% | 89 | Search MANET | Search MANET |
5 | MANET SECURITY | 305439 | 1% | 91% | 10 | Search MANET+SECURITY | Search MANET+SECURITY |
6 | BLACK HOLE ATTACK | 302381 | 1% | 75% | 12 | Search BLACK+HOLE+ATTACK | Search BLACK+HOLE+ATTACK |
7 | COOPERATION STIMULATION | 238921 | 1% | 89% | 8 | Search COOPERATION+STIMULATION | Search COOPERATION+STIMULATION |
8 | AD HOC NETWORKS | 234164 | 12% | 6% | 114 | Search AD+HOC+NETWORKS | Search AD+HOC+NETWORKS |
9 | MALICIOUS NODE | 172779 | 1% | 43% | 12 | Search MALICIOUS+NODE | Search MALICIOUS+NODE |
10 | ROUTING SECURITY | 169381 | 1% | 46% | 11 | Search ROUTING+SECURITY | Search ROUTING+SECURITY |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |