Class information for:
Level 1: ATTACK GRAPH//SECURITY METRICS//ATTACK TREES

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
36 3       COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS 110484
1587 2             DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION 7461
26816 1                   ATTACK GRAPH//SECURITY METRICS//ATTACK TREES 265

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 ATTACK GRAPH authKW 1073333 7% 48% 19
2 SECURITY METRICS authKW 761140 6% 40% 16
3 ATTACK TREES authKW 448272 3% 54% 7
4 MTTSF authKW 356793 1% 100% 3
5 NETWORK HARDENING authKW 356793 1% 100% 3
6 ATTACK DEFENSE TREES authKW 237862 1% 100% 2
7 EMC APPROACH authKW 237862 1% 100% 2
8 RETURN ON SECURITY INVESTMENT authKW 237862 1% 100% 2
9 SECURITY ENGINEERING PROCESS authKW 237862 1% 100% 2
10 SPACE BORNE COMPUTING authKW 237862 1% 100% 2

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Information Systems 9222 49% 0% 129
2 Computer Science, Software Engineering 6652 37% 0% 97
3 Computer Science, Hardware & Architecture 3168 20% 0% 52
4 Computer Science, Theory & Methods 2624 28% 0% 73
5 Telecommunications 919 16% 0% 43
6 Engineering, Electrical & Electronic 178 17% 0% 46
7 Computer Science, Artificial Intelligence 115 6% 0% 16
8 Logic 65 1% 0% 3
9 Computer Science, Interdisciplinary Applications 35 4% 0% 10
10 Engineering, General 14 2% 0% 6

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 ANSSI 118931 0% 100% 1
2 AREA CYBERSECUR DISTRIBUTED SYST 118931 0% 100% 1
3 AUTOMATED SYST GRP 118931 0% 100% 1
4 CGS SPA 118931 0% 100% 1
5 CLOUD INNOVAT 118931 0% 100% 1
6 CYBER SECUR ROBUSTNESS GRP 118931 0% 100% 1
7 DEV DEPENDABLE COMP TECHNOL 118931 0% 100% 1
8 DPTO ENG COMP SIST DIGITAIS 118931 0% 100% 1
9 GT ARC 118931 0% 100% 1
10 INESCC SYST COMP ENGN COIMBRA PORTUGAL 118931 0% 100% 1

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 65686 6% 3% 17
2 COMPUTERS & SECURITY 23773 6% 1% 16
3 ACM TRANSACTIONS ON PRIVACY AND SECURITY 20680 1% 9% 2
4 IEEE SECURITY & PRIVACY 17892 4% 2% 10
5 JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT 10138 2% 2% 5
6 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 9489 2% 2% 5
7 INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 7226 1% 2% 3
8 JOURNAL OF INTERNET TECHNOLOGY 2922 2% 0% 5
9 SECURITY AND COMMUNICATION NETWORKS 2705 2% 0% 6
10 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2513 1% 1% 2

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 ATTACK GRAPH 1073333 7% 48% 19 Search ATTACK+GRAPH Search ATTACK+GRAPH
2 SECURITY METRICS 761140 6% 40% 16 Search SECURITY+METRICS Search SECURITY+METRICS
3 ATTACK TREES 448272 3% 54% 7 Search ATTACK+TREES Search ATTACK+TREES
4 MTTSF 356793 1% 100% 3 Search MTTSF Search MTTSF
5 NETWORK HARDENING 356793 1% 100% 3 Search NETWORK+HARDENING Search NETWORK+HARDENING
6 ATTACK DEFENSE TREES 237862 1% 100% 2 Search ATTACK+DEFENSE+TREES Search ATTACK+DEFENSE+TREES
7 EMC APPROACH 237862 1% 100% 2 Search EMC+APPROACH Search EMC+APPROACH
8 RETURN ON SECURITY INVESTMENT 237862 1% 100% 2 Search RETURN+ON+SECURITY+INVESTMENT Search RETURN+ON+SECURITY+INVESTMENT
9 SECURITY ENGINEERING PROCESS 237862 1% 100% 2 Search SECURITY+ENGINEERING+PROCESS Search SECURITY+ENGINEERING+PROCESS
10 SPACE BORNE COMPUTING 237862 1% 100% 2 Search SPACE+BORNE+COMPUTING Search SPACE+BORNE+COMPUTING

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 8097 COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT
2 8871 INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION
3 30408 SOFTWARE AGING//SOFTWARE REJUVENATION//AGING RELATED BUGS
4 29924 CROSS SITE SCRIPTING//SQL INJECTION ATTACK//SQL INJECTION
5 11706 REQUIREMENTS ENGINEERING//USE CASES//GOAL ORIENTED REQUIREMENTS ENGINEERING
6 7321 SMART GRID//IEC 61850//FALSE DATA INJECTION ATTACK
7 26527 RUNTIME VERIFICATION//RUNTIME ENFORCEMENT//RUNTIME MONITORING
8 14376 SOFTWARE FAULT TOLERANCE//N VERSION PROGRAMMING//EXCEPTION HANDLING
9 19289 MALWARE DETECTION//MALWARE//ANDROID SECURITY
10 38380 IT SECURITY DEVELOPMENT//ADS B//E ENABLED AIRCRAFT

Go to start page