Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | CROSS SITE SCRIPTING | authKW | 723672 | 4% | 64% | 7 |
2 | SQL INJECTION ATTACK | authKW | 676907 | 3% | 83% | 5 |
3 | SQL INJECTION | authKW | 406140 | 3% | 50% | 5 |
4 | WEB ATTACKS | authKW | 365529 | 2% | 75% | 3 |
5 | APPLICATION LOGIC VULNERABILITY | authKW | 324916 | 1% | 100% | 2 |
6 | BROWSER EXTENSIONS | authKW | 324916 | 1% | 100% | 2 |
7 | GOODS ATOMICITY | authKW | 324916 | 1% | 100% | 2 |
8 | SQLIA | authKW | 324916 | 1% | 100% | 2 |
9 | VALID RECEIPT | authKW | 324916 | 1% | 100% | 2 |
10 | WEB APPLICATION SECURITY | authKW | 288810 | 2% | 44% | 4 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Computer Science, Software Engineering | 6845 | 43% | 0% | 84 |
2 | Computer Science, Information Systems | 5583 | 44% | 0% | 86 |
3 | Computer Science, Hardware & Architecture | 1428 | 15% | 0% | 30 |
4 | Computer Science, Theory & Methods | 1411 | 24% | 0% | 46 |
5 | Telecommunications | 347 | 12% | 0% | 23 |
6 | Computer Science, Artificial Intelligence | 145 | 8% | 0% | 15 |
7 | Engineering, Electrical & Electronic | 83 | 14% | 0% | 28 |
8 | Logic | 39 | 1% | 0% | 2 |
9 | Computer Science, Interdisciplinary Applications | 23 | 4% | 0% | 7 |
10 | Engineering, General | 22 | 3% | 0% | 6 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | CLUSTER GRID COMP COMP SCI TECHNOL | 162458 | 1% | 100% | 1 |
2 | ENGD SYST ENGN | 162458 | 1% | 100% | 1 |
3 | ESTEC LDA | 162458 | 1% | 100% | 1 |
4 | IBM AFRICA | 162458 | 1% | 100% | 1 |
5 | IT SECUR INFRASTRUCT GRP | 162458 | 1% | 100% | 1 |
6 | KEVIN ROLLINS EBUSINESS | 162458 | 1% | 100% | 1 |
7 | RENSSELAER DATA EXPLORAT PLICAT IDEA | 162458 | 1% | 100% | 1 |
8 | SECUR RD | 162458 | 1% | 100% | 1 |
9 | SOFTWARE TESTING EVALUAT PLA | 162458 | 1% | 100% | 1 |
10 | IIG TELEMAT | 81228 | 1% | 50% | 1 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | IEEE SECURITY & PRIVACY | 70675 | 9% | 3% | 17 |
2 | COMPUTERS & SECURITY | 32485 | 8% | 1% | 16 |
3 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 3434 | 1% | 1% | 2 |
4 | INFORMATION AND SOFTWARE TECHNOLOGY | 3177 | 4% | 0% | 7 |
5 | SECURITY AND COMMUNICATION NETWORKS | 2567 | 3% | 0% | 5 |
6 | INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL | 2212 | 2% | 0% | 4 |
7 | COMPUTER | 1858 | 3% | 0% | 6 |
8 | ACM COMPUTING SURVEYS | 1747 | 2% | 0% | 3 |
9 | ACM SIGPLAN NOTICES | 1630 | 4% | 0% | 7 |
10 | COMPUTING SYSTEMS | 1220 | 1% | 1% | 1 |
Author Key Words |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass | LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | CROSS SITE SCRIPTING | 723672 | 4% | 64% | 7 | Search CROSS+SITE+SCRIPTING | Search CROSS+SITE+SCRIPTING |
2 | SQL INJECTION ATTACK | 676907 | 3% | 83% | 5 | Search SQL+INJECTION+ATTACK | Search SQL+INJECTION+ATTACK |
3 | SQL INJECTION | 406140 | 3% | 50% | 5 | Search SQL+INJECTION | Search SQL+INJECTION |
4 | WEB ATTACKS | 365529 | 2% | 75% | 3 | Search WEB+ATTACKS | Search WEB+ATTACKS |
5 | APPLICATION LOGIC VULNERABILITY | 324916 | 1% | 100% | 2 | Search APPLICATION+LOGIC+VULNERABILITY | Search APPLICATION+LOGIC+VULNERABILITY |
6 | BROWSER EXTENSIONS | 324916 | 1% | 100% | 2 | Search BROWSER+EXTENSIONS | Search BROWSER+EXTENSIONS |
7 | GOODS ATOMICITY | 324916 | 1% | 100% | 2 | Search GOODS+ATOMICITY | Search GOODS+ATOMICITY |
8 | SQLIA | 324916 | 1% | 100% | 2 | Search SQLIA | Search SQLIA |
9 | VALID RECEIPT | 324916 | 1% | 100% | 2 | Search VALID+RECEIPT | Search VALID+RECEIPT |
10 | WEB APPLICATION SECURITY | 288810 | 2% | 44% | 4 | Search WEB+APPLICATION+SECURITY | Search WEB+APPLICATION+SECURITY |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |