Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
12 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | 1181119 |
36 | 3 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 110484 |
1587 | 2 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION | 7461 |
26816 | 1 | ATTACK GRAPH//SECURITY METRICS//ATTACK TREES | 265 |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | ATTACK GRAPH | authKW | 1073333 | 7% | 48% | 19 |
2 | SECURITY METRICS | authKW | 761140 | 6% | 40% | 16 |
3 | ATTACK TREES | authKW | 448272 | 3% | 54% | 7 |
4 | MTTSF | authKW | 356793 | 1% | 100% | 3 |
5 | NETWORK HARDENING | authKW | 356793 | 1% | 100% | 3 |
6 | ATTACK DEFENSE TREES | authKW | 237862 | 1% | 100% | 2 |
7 | EMC APPROACH | authKW | 237862 | 1% | 100% | 2 |
8 | RETURN ON SECURITY INVESTMENT | authKW | 237862 | 1% | 100% | 2 |
9 | SECURITY ENGINEERING PROCESS | authKW | 237862 | 1% | 100% | 2 |
10 | SPACE BORNE COMPUTING | authKW | 237862 | 1% | 100% | 2 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 9222 | 49% | 0% | 129 |
2 | Computer Science, Software Engineering | 6652 | 37% | 0% | 97 |
3 | Computer Science, Hardware & Architecture | 3168 | 20% | 0% | 52 |
4 | Computer Science, Theory & Methods | 2624 | 28% | 0% | 73 |
5 | Telecommunications | 919 | 16% | 0% | 43 |
6 | Engineering, Electrical & Electronic | 178 | 17% | 0% | 46 |
7 | Computer Science, Artificial Intelligence | 115 | 6% | 0% | 16 |
8 | Logic | 65 | 1% | 0% | 3 |
9 | Computer Science, Interdisciplinary Applications | 35 | 4% | 0% | 10 |
10 | Engineering, General | 14 | 2% | 0% | 6 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | ANSSI | 118931 | 0% | 100% | 1 |
2 | AREA CYBERSECUR DISTRIBUTED SYST | 118931 | 0% | 100% | 1 |
3 | AUTOMATED SYST GRP | 118931 | 0% | 100% | 1 |
4 | CGS SPA | 118931 | 0% | 100% | 1 |
5 | CLOUD INNOVAT | 118931 | 0% | 100% | 1 |
6 | CYBER SECUR ROBUSTNESS GRP | 118931 | 0% | 100% | 1 |
7 | DEV DEPENDABLE COMP TECHNOL | 118931 | 0% | 100% | 1 |
8 | DPTO ENG COMP SIST DIGITAIS | 118931 | 0% | 100% | 1 |
9 | GT ARC | 118931 | 0% | 100% | 1 |
10 | INESCC SYST COMP ENGN COIMBRA PORTUGAL | 118931 | 0% | 100% | 1 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 65686 | 6% | 3% | 17 |
2 | COMPUTERS & SECURITY | 23773 | 6% | 1% | 16 |
3 | ACM TRANSACTIONS ON PRIVACY AND SECURITY | 20680 | 1% | 9% | 2 |
4 | IEEE SECURITY & PRIVACY | 17892 | 4% | 2% | 10 |
5 | JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT | 10138 | 2% | 2% | 5 |
6 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 9489 | 2% | 2% | 5 |
7 | INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION | 7226 | 1% | 2% | 3 |
8 | JOURNAL OF INTERNET TECHNOLOGY | 2922 | 2% | 0% | 5 |
9 | SECURITY AND COMMUNICATION NETWORKS | 2705 | 2% | 0% | 6 |
10 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 2513 | 1% | 1% | 2 |
Author Key Words |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass | LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | ATTACK GRAPH | 1073333 | 7% | 48% | 19 | Search ATTACK+GRAPH | Search ATTACK+GRAPH |
2 | SECURITY METRICS | 761140 | 6% | 40% | 16 | Search SECURITY+METRICS | Search SECURITY+METRICS |
3 | ATTACK TREES | 448272 | 3% | 54% | 7 | Search ATTACK+TREES | Search ATTACK+TREES |
4 | MTTSF | 356793 | 1% | 100% | 3 | Search MTTSF | Search MTTSF |
5 | NETWORK HARDENING | 356793 | 1% | 100% | 3 | Search NETWORK+HARDENING | Search NETWORK+HARDENING |
6 | ATTACK DEFENSE TREES | 237862 | 1% | 100% | 2 | Search ATTACK+DEFENSE+TREES | Search ATTACK+DEFENSE+TREES |
7 | EMC APPROACH | 237862 | 1% | 100% | 2 | Search EMC+APPROACH | Search EMC+APPROACH |
8 | RETURN ON SECURITY INVESTMENT | 237862 | 1% | 100% | 2 | Search RETURN+ON+SECURITY+INVESTMENT | Search RETURN+ON+SECURITY+INVESTMENT |
9 | SECURITY ENGINEERING PROCESS | 237862 | 1% | 100% | 2 | Search SECURITY+ENGINEERING+PROCESS | Search SECURITY+ENGINEERING+PROCESS |
10 | SPACE BORNE COMPUTING | 237862 | 1% | 100% | 2 | Search SPACE+BORNE+COMPUTING | Search SPACE+BORNE+COMPUTING |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |