Class information for: |
Basic class information |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
12 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | 1181119 |
449 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//DIGITAL SIGNATURE | 26889 |
2530 | 2 | BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS | 4028 |
34136 | 1 | RC4//PLAINTEXT RECOVERY ATTACK//KEYSTREAM BIASES | 129 |
Terms with highest relevance score |
rank | Category | termType | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|---|
1 | RC4 | authKW | 7506265 | 29% | 81% | 38 |
2 | PLAINTEXT RECOVERY ATTACK | authKW | 977272 | 3% | 100% | 4 |
3 | KEYSTREAM BIASES | authKW | 732954 | 2% | 100% | 3 |
4 | QUALITY OF PROTECTION | authKW | 555263 | 4% | 45% | 5 |
5 | DISTINGUISHING ATTACKS | authKW | 549714 | 2% | 75% | 3 |
6 | WEP | authKW | 517371 | 5% | 35% | 6 |
7 | BROADCAST SETTING | authKW | 488636 | 2% | 100% | 2 |
8 | CRYPTOGRAPHIC ALGORITHM IDENTIFICATION | authKW | 488636 | 2% | 100% | 2 |
9 | FMS ATTACK | authKW | 488636 | 2% | 100% | 2 |
10 | QUALITY OF SECURITY METRICS | authKW | 488636 | 2% | 100% | 2 |
Web of Science journal categories |
chi_square_rank | Category | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 3430 | 43% | 0% | 55 |
2 | Computer Science, Hardware & Architecture | 1758 | 21% | 0% | 27 |
3 | Computer Science, Theory & Methods | 1238 | 27% | 0% | 35 |
4 | Telecommunications | 450 | 16% | 0% | 21 |
5 | Engineering, Electrical & Electronic | 350 | 32% | 0% | 41 |
6 | Computer Science, Software Engineering | 266 | 11% | 0% | 14 |
7 | Mathematics, Applied | 54 | 9% | 0% | 12 |
8 | Engineering, Mechanical | 35 | 6% | 0% | 8 |
9 | Nuclear Science & Technology | 34 | 5% | 0% | 7 |
10 | Computer Science, Artificial Intelligence | 31 | 5% | 0% | 6 |
Address terms |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | COMMON SOFTWARE PLATFORM S | 244318 | 1% | 100% | 1 |
2 | J AN AIR SELF DEFENCE FORCE | 244318 | 1% | 100% | 1 |
3 | TRACING TRACKING SYST | 244318 | 1% | 100% | 1 |
4 | UNITE RECH REDCAD | 244318 | 1% | 100% | 1 |
5 | CRYPTOL SECUR UNIT | 139607 | 2% | 29% | 2 |
6 | ACMU | 122158 | 1% | 50% | 1 |
7 | IDRBT | 122158 | 1% | 50% | 1 |
8 | MACHINE DYNAM FAILURE ANAL | 122158 | 1% | 50% | 1 |
9 | ENGN ELETRON COMP | 81438 | 1% | 33% | 1 |
10 | MPSOC ARCHITECTU | 81438 | 1% | 33% | 1 |
Journals |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass |
---|---|---|---|---|---|
1 | CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 21709 | 3% | 2% | 4 |
2 | COMPUTERS & SECURITY | 6865 | 5% | 0% | 6 |
3 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 6753 | 12% | 0% | 15 |
4 | DESIGNS CODES AND CRYPTOGRAPHY | 3357 | 4% | 0% | 5 |
5 | IET INFORMATION SECURITY | 2749 | 2% | 1% | 2 |
6 | COMPUTER COMMUNICATIONS | 2618 | 5% | 0% | 7 |
7 | MEDICAL INFORMATICS AND THE INTERNET IN MEDICINE | 1156 | 1% | 0% | 1 |
8 | INTEGRATION-THE VLSI JOURNAL | 918 | 2% | 0% | 2 |
9 | LECTURE NOTES IN COMPUTER SCIENCE | 875 | 14% | 0% | 18 |
10 | JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT | 832 | 1% | 0% | 1 |
Author Key Words |
chi_square_rank | term | chi_square | shrOfCwithTerm | shrOfTermInClass | termInClass | LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | RC4 | 7506265 | 29% | 81% | 38 | Search RC4 | Search RC4 |
2 | PLAINTEXT RECOVERY ATTACK | 977272 | 3% | 100% | 4 | Search PLAINTEXT+RECOVERY+ATTACK | Search PLAINTEXT+RECOVERY+ATTACK |
3 | KEYSTREAM BIASES | 732954 | 2% | 100% | 3 | Search KEYSTREAM+BIASES | Search KEYSTREAM+BIASES |
4 | QUALITY OF PROTECTION | 555263 | 4% | 45% | 5 | Search QUALITY+OF+PROTECTION | Search QUALITY+OF+PROTECTION |
5 | DISTINGUISHING ATTACKS | 549714 | 2% | 75% | 3 | Search DISTINGUISHING+ATTACKS | Search DISTINGUISHING+ATTACKS |
6 | WEP | 517371 | 5% | 35% | 6 | Search WEP | Search WEP |
7 | BROADCAST SETTING | 488636 | 2% | 100% | 2 | Search BROADCAST+SETTING | Search BROADCAST+SETTING |
8 | CRYPTOGRAPHIC ALGORITHM IDENTIFICATION | 488636 | 2% | 100% | 2 | Search CRYPTOGRAPHIC+ALGORITHM+IDENTIFICATION | Search CRYPTOGRAPHIC+ALGORITHM+IDENTIFICATION |
9 | FMS ATTACK | 488636 | 2% | 100% | 2 | Search FMS+ATTACK | Search FMS+ATTACK |
10 | QUALITY OF SECURITY METRICS | 488636 | 2% | 100% | 2 | Search QUALITY+OF+SECURITY+METRICS | Search QUALITY+OF+SECURITY+METRICS |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Classes with closest relation at Level 1 |