Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
26 | 4 | ENGINEERING, ELECTRICAL & ELECTRONIC//ELECT ENGN//IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION | 322555 |
650 | 3 | RFID//RADIO FREQUENCY IDENTIFICATION RFID//WIRELESS POWER TRANSFER | 10968 |
1647 | 2 | RFID//RADIO FREQUENCY IDENTIFICATION RFID//WIRELESS POWER TRANSFER | 7197 |
16367 | 1 | RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK | 685 |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | RFID | authKW | 1945364 | 41% | 15% | 281 |
2 | DISTANCE BOUNDING PROTOCOL | authKW | 1065011 | 4% | 93% | 25 |
3 | RELAY ATTACK | authKW | 942469 | 4% | 79% | 26 |
4 | RFID SECURITY | authKW | 883356 | 4% | 80% | 24 |
5 | GROUPING PROOF | authKW | 782147 | 2% | 100% | 17 |
6 | MAFIA FRAUD ATTACK | authKW | 736138 | 2% | 100% | 16 |
7 | OWNERSHIP TRANSFER | authKW | 573327 | 3% | 69% | 18 |
8 | AUTHENTICATION | authKW | 383436 | 21% | 6% | 147 |
9 | MUTUAL AUTHENTICATION | authKW | 349833 | 6% | 20% | 39 |
10 | RFID AUTHENTICATION | authKW | 327171 | 1% | 89% | 8 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 16719 | 41% | 0% | 280 |
2 | Telecommunications | 15330 | 40% | 0% | 275 |
3 | Computer Science, Hardware & Architecture | 4575 | 15% | 0% | 101 |
4 | Computer Science, Theory & Methods | 2433 | 17% | 0% | 115 |
5 | Medical Informatics | 2104 | 7% | 0% | 48 |
6 | Computer Science, Software Engineering | 1688 | 12% | 0% | 81 |
7 | Engineering, Electrical & Electronic | 1154 | 26% | 0% | 176 |
8 | Health Care Sciences & Services | 674 | 7% | 0% | 49 |
9 | Computer Science, Artificial Intelligence | 513 | 8% | 0% | 53 |
10 | Computer Science, Interdisciplinary Applications | 176 | 5% | 0% | 34 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | DCCS | 161023 | 1% | 50% | 7 |
2 | THEORET PHYS MODELING | 138026 | 0% | 100% | 3 |
3 | ISG SMART CARD | 103518 | 0% | 75% | 3 |
4 | INFORMAT COMMUN THEORY GRP ICT | 92017 | 0% | 100% | 2 |
5 | INFORMAT SECUR PRIVACY | 87166 | 1% | 32% | 6 |
6 | COSEC | 69010 | 0% | 50% | 3 |
7 | MED SAFETY ENGN | 61343 | 0% | 67% | 2 |
8 | ISSL | 47313 | 1% | 17% | 6 |
9 | ADV TECHNOL DEV SECT | 46009 | 0% | 100% | 1 |
10 | BLDG TECHNOL DEV | 46009 | 0% | 100% | 1 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | JOURNAL OF MEDICAL SYSTEMS | 45436 | 6% | 2% | 42 |
2 | SECURITY AND COMMUNICATION NETWORKS | 37764 | 5% | 2% | 36 |
3 | WIRELESS PERSONAL COMMUNICATIONS | 16514 | 6% | 1% | 43 |
4 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 12644 | 2% | 2% | 12 |
5 | IET INFORMATION SECURITY | 6337 | 1% | 2% | 7 |
6 | IEEE PERVASIVE COMPUTING | 6236 | 1% | 2% | 8 |
7 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 5566 | 2% | 1% | 15 |
8 | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 5226 | 3% | 1% | 18 |
9 | COMPUTER STANDARDS & INTERFACES | 4307 | 2% | 1% | 11 |
10 | PERSONAL AND UBIQUITOUS COMPUTING | 4292 | 1% | 1% | 10 |
Author Key Words |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass | LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | RFID | 1945364 | 41% | 15% | 281 | Search RFID | Search RFID |
2 | DISTANCE BOUNDING PROTOCOL | 1065011 | 4% | 93% | 25 | Search DISTANCE+BOUNDING+PROTOCOL | Search DISTANCE+BOUNDING+PROTOCOL |
3 | RELAY ATTACK | 942469 | 4% | 79% | 26 | Search RELAY+ATTACK | Search RELAY+ATTACK |
4 | RFID SECURITY | 883356 | 4% | 80% | 24 | Search RFID+SECURITY | Search RFID+SECURITY |
5 | GROUPING PROOF | 782147 | 2% | 100% | 17 | Search GROUPING+PROOF | Search GROUPING+PROOF |
6 | MAFIA FRAUD ATTACK | 736138 | 2% | 100% | 16 | Search MAFIA+FRAUD+ATTACK | Search MAFIA+FRAUD+ATTACK |
7 | OWNERSHIP TRANSFER | 573327 | 3% | 69% | 18 | Search OWNERSHIP+TRANSFER | Search OWNERSHIP+TRANSFER |
8 | AUTHENTICATION | 383436 | 21% | 6% | 147 | Search AUTHENTICATION | Search AUTHENTICATION |
9 | MUTUAL AUTHENTICATION | 349833 | 6% | 20% | 39 | Search MUTUAL+AUTHENTICATION | Search MUTUAL+AUTHENTICATION |
10 | RFID AUTHENTICATION | 327171 | 1% | 89% | 8 | Search RFID+AUTHENTICATION | Search RFID+AUTHENTICATION |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |