Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
12 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | 1181119 |
449 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//DIGITAL SIGNATURE | 26889 |
483 | 2 | AUTHENTICATION//DIGITAL SIGNATURE//SMART CARD | 15986 |
13692 | 1 | SECURITY PROTOCOLS//CRYPTOGRAPHIC PROTOCOLS//APPLIED PI CALCULUS | 850 |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | SECURITY PROTOCOLS | authKW | 1271878 | 10% | 42% | 82 |
2 | CRYPTOGRAPHIC PROTOCOLS | authKW | 569889 | 7% | 27% | 56 |
3 | APPLIED PI CALCULUS | authKW | 273019 | 1% | 82% | 9 |
4 | DOLEV YAO MODEL | authKW | 227096 | 1% | 88% | 7 |
5 | STRAND SPACES | authKW | 190681 | 1% | 86% | 6 |
6 | COMPUTATIONAL SOUNDNESS | authKW | 185386 | 1% | 100% | 5 |
7 | AUTHENTICATION PROTOCOLS | authKW | 177228 | 2% | 34% | 14 |
8 | SECURITY PROTOCOL ANALYSIS | authKW | 165157 | 1% | 64% | 7 |
9 | DOLEV YAO INTRUDER | authKW | 148309 | 0% | 100% | 4 |
10 | SPI CALCULUS | authKW | 148305 | 1% | 67% | 6 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 40137 | 59% | 0% | 504 |
2 | Computer Science, Software Engineering | 15758 | 32% | 0% | 268 |
3 | Computer Science, Information Systems | 8623 | 27% | 0% | 226 |
4 | Logic | 2594 | 4% | 0% | 33 |
5 | Computer Science, Hardware & Architecture | 1974 | 9% | 0% | 75 |
6 | Computer Science, Artificial Intelligence | 1253 | 11% | 0% | 90 |
7 | Telecommunications | 1005 | 10% | 0% | 83 |
8 | Engineering, Electrical & Electronic | 185 | 11% | 0% | 95 |
9 | Mathematics, Applied | 172 | 7% | 0% | 59 |
10 | Computer Science, Interdisciplinary Applications | 6 | 1% | 0% | 12 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | LSV | 133395 | 4% | 12% | 31 |
2 | LOG SECUR | 74154 | 0% | 100% | 2 |
3 | PROSECCO | 74154 | 0% | 100% | 2 |
4 | TEAM LILAC | 74154 | 0% | 100% | 2 |
5 | UMR 8643 | 68087 | 2% | 14% | 13 |
6 | SECSI | 66736 | 0% | 60% | 3 |
7 | UGBS | 66736 | 0% | 60% | 3 |
8 | FUTURS PROJET | 49435 | 0% | 67% | 2 |
9 | LORIA INRIA | 49435 | 0% | 67% | 2 |
10 | UCL CS | 49435 | 0% | 67% | 2 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | LECTURE NOTES IN COMPUTER SCIENCE | 42488 | 37% | 0% | 318 |
2 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 34202 | 2% | 5% | 17 |
3 | FORMAL ASPECTS OF COMPUTING | 15221 | 2% | 3% | 13 |
4 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 9599 | 1% | 4% | 7 |
5 | JOURNAL OF AUTOMATED REASONING | 8775 | 2% | 2% | 13 |
6 | INFORMATION AND COMPUTATION | 8222 | 3% | 1% | 22 |
7 | COMPUTERS & SECURITY | 5654 | 2% | 1% | 14 |
8 | JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING | 5475 | 1% | 2% | 7 |
9 | ACM TRANSACTIONS ON COMPUTATIONAL LOGIC | 5177 | 1% | 2% | 7 |
10 | THEORETICAL COMPUTER SCIENCE | 4613 | 4% | 0% | 37 |
Author Key Words |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |