Class information for:
Level 1: CROSS SITE SCRIPTING//SQL INJECTION ATTACK//SQL INJECTION

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
36 3       COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS 110484
1587 2             DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION 7461
29924 1                   CROSS SITE SCRIPTING//SQL INJECTION ATTACK//SQL INJECTION 194

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 CROSS SITE SCRIPTING authKW 723672 4% 64% 7
2 SQL INJECTION ATTACK authKW 676907 3% 83% 5
3 SQL INJECTION authKW 406140 3% 50% 5
4 WEB ATTACKS authKW 365529 2% 75% 3
5 APPLICATION LOGIC VULNERABILITY authKW 324916 1% 100% 2
6 BROWSER EXTENSIONS authKW 324916 1% 100% 2
7 GOODS ATOMICITY authKW 324916 1% 100% 2
8 SQLIA authKW 324916 1% 100% 2
9 VALID RECEIPT authKW 324916 1% 100% 2
10 WEB APPLICATION SECURITY authKW 288810 2% 44% 4

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Software Engineering 6845 43% 0% 84
2 Computer Science, Information Systems 5583 44% 0% 86
3 Computer Science, Hardware & Architecture 1428 15% 0% 30
4 Computer Science, Theory & Methods 1411 24% 0% 46
5 Telecommunications 347 12% 0% 23
6 Computer Science, Artificial Intelligence 145 8% 0% 15
7 Engineering, Electrical & Electronic 83 14% 0% 28
8 Logic 39 1% 0% 2
9 Computer Science, Interdisciplinary Applications 23 4% 0% 7
10 Engineering, General 22 3% 0% 6

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 CLUSTER GRID COMP COMP SCI TECHNOL 162458 1% 100% 1
2 ENGD SYST ENGN 162458 1% 100% 1
3 ESTEC LDA 162458 1% 100% 1
4 IBM AFRICA 162458 1% 100% 1
5 IT SECUR INFRASTRUCT GRP 162458 1% 100% 1
6 KEVIN ROLLINS EBUSINESS 162458 1% 100% 1
7 RENSSELAER DATA EXPLORAT PLICAT IDEA 162458 1% 100% 1
8 SECUR RD 162458 1% 100% 1
9 SOFTWARE TESTING EVALUAT PLA 162458 1% 100% 1
10 IIG TELEMAT 81228 1% 50% 1

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 IEEE SECURITY & PRIVACY 70675 9% 3% 17
2 COMPUTERS & SECURITY 32485 8% 1% 16
3 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 3434 1% 1% 2
4 INFORMATION AND SOFTWARE TECHNOLOGY 3177 4% 0% 7
5 SECURITY AND COMMUNICATION NETWORKS 2567 3% 0% 5
6 INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL 2212 2% 0% 4
7 COMPUTER 1858 3% 0% 6
8 ACM COMPUTING SURVEYS 1747 2% 0% 3
9 ACM SIGPLAN NOTICES 1630 4% 0% 7
10 COMPUTING SYSTEMS 1220 1% 1% 1

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 CROSS SITE SCRIPTING 723672 4% 64% 7 Search CROSS+SITE+SCRIPTING Search CROSS+SITE+SCRIPTING
2 SQL INJECTION ATTACK 676907 3% 83% 5 Search SQL+INJECTION+ATTACK Search SQL+INJECTION+ATTACK
3 SQL INJECTION 406140 3% 50% 5 Search SQL+INJECTION Search SQL+INJECTION
4 WEB ATTACKS 365529 2% 75% 3 Search WEB+ATTACKS Search WEB+ATTACKS
5 APPLICATION LOGIC VULNERABILITY 324916 1% 100% 2 Search APPLICATION+LOGIC+VULNERABILITY Search APPLICATION+LOGIC+VULNERABILITY
6 BROWSER EXTENSIONS 324916 1% 100% 2 Search BROWSER+EXTENSIONS Search BROWSER+EXTENSIONS
7 GOODS ATOMICITY 324916 1% 100% 2 Search GOODS+ATOMICITY Search GOODS+ATOMICITY
8 SQLIA 324916 1% 100% 2 Search SQLIA Search SQLIA
9 VALID RECEIPT 324916 1% 100% 2 Search VALID+RECEIPT Search VALID+RECEIPT
10 WEB APPLICATION SECURITY 288810 2% 44% 4 Search WEB+APPLICATION+SECURITY Search WEB+APPLICATION+SECURITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 27314 PHISHING//ANTI PHISHING//PHISHING ATTACKS
2 26816 ATTACK GRAPH//SECURITY METRICS//ATTACK TREES
3 8871 INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION
4 38833 CATEGORIZATION OF AGENTS//CECYT WILFRIDO MASSIEU 11//SOUND AND ACOUSTIC
5 8097 COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT
6 20141 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
7 19289 MALWARE DETECTION//MALWARE//ANDROID SECURITY
8 25205 RETURN ORIENTED PROGRAMMING//GATE LEVEL INFORMATION FLOW TRACKING//PROBABILISTIC MEMORY SAFETY
9 3497 SOFTWARE TESTING//REGRESSION TESTING//SOFTWARE TESTING VERIFICATION & RELIABILITY
10 25786 VIRTUALIZATION//SR IOV//XEN

Go to start page