Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
12 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | 1181119 |
36 | 3 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 110484 |
1587 | 2 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION | 7461 |
27314 | 1 | PHISHING//ANTI PHISHING//PHISHING ATTACKS | 252 |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | PHISHING | authKW | 3552984 | 20% | 57% | 50 |
2 | ANTI PHISHING | authKW | 1125593 | 5% | 75% | 12 |
3 | PHISHING ATTACKS | authKW | 1013037 | 4% | 90% | 9 |
4 | WEB SPOOFING | authKW | 625333 | 2% | 100% | 5 |
5 | PHISHING DETECTION | authKW | 500262 | 2% | 67% | 6 |
6 | PHISHING EMAIL | authKW | 375200 | 1% | 100% | 3 |
7 | PHISHING WEBSITES | authKW | 375200 | 1% | 100% | 3 |
8 | SSL TLS PROTOCOL | authKW | 375200 | 1% | 100% | 3 |
9 | SOCIAL ENGINEERING | authKW | 320225 | 5% | 20% | 13 |
10 | CLOUD THREAT S | address | 250133 | 1% | 100% | 2 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 8245 | 47% | 0% | 119 |
2 | Computer Science, Software Engineering | 3202 | 26% | 0% | 66 |
3 | Computer Science, Hardware & Architecture | 942 | 11% | 0% | 28 |
4 | Telecommunications | 750 | 15% | 0% | 38 |
5 | Computer Science, Theory & Methods | 638 | 14% | 0% | 36 |
6 | Computer Science, Artificial Intelligence | 621 | 13% | 0% | 34 |
7 | Operations Research & Management Science | 279 | 8% | 0% | 20 |
8 | Information Science & Library Science | 252 | 5% | 0% | 13 |
9 | Ergonomics | 151 | 2% | 0% | 6 |
10 | Management | 119 | 5% | 0% | 13 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | CLOUD THREAT S | 250133 | 1% | 100% | 2 |
2 | ENTERPRISE SOFTWARE | 250133 | 1% | 100% | 2 |
3 | COMMUN MANAGEMENT SCI SYST | 166754 | 1% | 67% | 2 |
4 | COGNIT PSYCHOL HUMAN TORS | 125067 | 0% | 100% | 1 |
5 | CY USABLE PRIVACY SECUR | 125067 | 0% | 100% | 1 |
6 | E BUSSINESS | 125067 | 0% | 100% | 1 |
7 | ELASTICA | 125067 | 0% | 100% | 1 |
8 | FLORIDA CYBER SECUR | 125067 | 0% | 100% | 1 |
9 | HAIFA TEL AVIV | 125067 | 0% | 100% | 1 |
10 | HORST GORTZ IT SECURITY | 125067 | 0% | 100% | 1 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | IEEE SECURITY & PRIVACY | 42350 | 6% | 2% | 15 |
2 | COMPUTERS & SECURITY | 25001 | 6% | 1% | 16 |
3 | ACM TRANSACTIONS ON PRIVACY AND SECURITY | 21747 | 1% | 9% | 2 |
4 | SECURITY AND COMMUNICATION NETWORKS | 17826 | 6% | 1% | 15 |
5 | ACM TRANSACTIONS ON INTERNET TECHNOLOGY | 14950 | 2% | 2% | 5 |
6 | IEEE INTERNET COMPUTING | 8160 | 3% | 1% | 8 |
7 | INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION | 7600 | 1% | 2% | 3 |
8 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 5950 | 1% | 2% | 3 |
9 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 2146 | 1% | 1% | 3 |
10 | ACM TRANSACTIONS ON APPLIED PERCEPTION | 2030 | 1% | 1% | 2 |
Author Key Words |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass | LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | PHISHING | 3552984 | 20% | 57% | 50 | Search PHISHING | Search PHISHING |
2 | ANTI PHISHING | 1125593 | 5% | 75% | 12 | Search ANTI+PHISHING | Search ANTI+PHISHING |
3 | PHISHING ATTACKS | 1013037 | 4% | 90% | 9 | Search PHISHING+ATTACKS | Search PHISHING+ATTACKS |
4 | WEB SPOOFING | 625333 | 2% | 100% | 5 | Search WEB+SPOOFING | Search WEB+SPOOFING |
5 | PHISHING DETECTION | 500262 | 2% | 67% | 6 | Search PHISHING+DETECTION | Search PHISHING+DETECTION |
6 | PHISHING EMAIL | 375200 | 1% | 100% | 3 | Search PHISHING+EMAIL | Search PHISHING+EMAIL |
7 | PHISHING WEBSITES | 375200 | 1% | 100% | 3 | Search PHISHING+WEBSITES | Search PHISHING+WEBSITES |
8 | SSL TLS PROTOCOL | 375200 | 1% | 100% | 3 | Search SSL+TLS+PROTOCOL | Search SSL+TLS+PROTOCOL |
9 | SOCIAL ENGINEERING | 320225 | 5% | 20% | 13 | Search SOCIAL+ENGINEERING | Search SOCIAL+ENGINEERING |
10 | RESIDUAL CLOSENESS | 250133 | 1% | 100% | 2 | Search RESIDUAL+CLOSENESS | Search RESIDUAL+CLOSENESS |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |