Class information for:
Level 1: INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
36 3       COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//COMPUTER SCIENCE, INFORMATION SYSTEMS 110484
1587 2             DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION 7461
8871 1                   INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION 1239

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 INTRUSION DETECTION authKW 3346411 26% 41% 322
2 INTRUSION DETECTION SYSTEM authKW 1294892 9% 46% 111
3 ALERT CORRELATION authKW 717150 3% 83% 34
4 ANOMALY DETECTION authKW 472600 12% 13% 143
5 MASQUERADE DETECTION authKW 381535 1% 100% 15
6 MISUSE DETECTION authKW 373892 2% 70% 21
7 NETWORK INTRUSION DETECTION authKW 232525 2% 38% 24
8 NETWORK SECURITY authKW 230793 7% 10% 91
9 COMPUTER SECURITY authKW 210023 4% 15% 54
10 SYSTEM CALL authKW 206009 1% 45% 18

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Information Systems 25866 38% 0% 469
2 Computer Science, Artificial Intelligence 16441 30% 0% 377
3 Computer Science, Theory & Methods 14480 30% 0% 370
4 Computer Science, Software Engineering 6512 17% 0% 211
5 Computer Science, Hardware & Architecture 6471 13% 0% 162
6 Telecommunications 5948 19% 0% 235
7 Engineering, Electrical & Electronic 1217 20% 0% 252
8 Computer Science, Interdisciplinary Applications 1061 8% 0% 105
9 Logic 508 1% 0% 18
10 Operations Research & Management Science 451 5% 0% 59

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 GRP SIGNALS TELEMAT COMMUN 76307 0% 100% 3
2 RELIABLE SOFTWARE GRP 76301 0% 50% 6
3 INFORMAT SYST ASSURANCE 70650 0% 56% 5
4 AI PL ELECT 50871 0% 100% 2
5 CNSIS 50871 0% 100% 2
6 NAI S 50871 0% 100% 2
7 NETWORKED SYST INFORMAT SECUR 50871 0% 100% 2
8 SECURE INFORMAT SYST 37977 1% 14% 11
9 IIRTRC ELECT ENGN COMP SCI 33913 0% 67% 2
10 INFORMAT AUTOMAT 26657 2% 6% 19

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 COMPUTERS & SECURITY 105841 6% 6% 73
2 SECURITY AND COMMUNICATION NETWORKS 37092 4% 3% 48
3 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 20836 3% 2% 39
4 LECTURE NOTES IN COMPUTER SCIENCE 16374 19% 0% 240
5 LOGIC JOURNAL OF THE IGPL 12683 1% 3% 18
6 IEEE SECURITY & PRIVACY 7481 1% 2% 14
7 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 5863 1% 2% 11
8 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 5185 1% 3% 8
9 EXPERT SYSTEMS WITH APPLICATIONS 4029 3% 0% 42
10 COMPUTER COMMUNICATIONS 4023 2% 1% 27

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 INTRUSION DETECTION 3346411 26% 41% 322 Search INTRUSION+DETECTION Search INTRUSION+DETECTION
2 INTRUSION DETECTION SYSTEM 1294892 9% 46% 111 Search INTRUSION+DETECTION+SYSTEM Search INTRUSION+DETECTION+SYSTEM
3 ALERT CORRELATION 717150 3% 83% 34 Search ALERT+CORRELATION Search ALERT+CORRELATION
4 ANOMALY DETECTION 472600 12% 13% 143 Search ANOMALY+DETECTION Search ANOMALY+DETECTION
5 MASQUERADE DETECTION 381535 1% 100% 15 Search MASQUERADE+DETECTION Search MASQUERADE+DETECTION
6 MISUSE DETECTION 373892 2% 70% 21 Search MISUSE+DETECTION Search MISUSE+DETECTION
7 NETWORK INTRUSION DETECTION 232525 2% 38% 24 Search NETWORK+INTRUSION+DETECTION Search NETWORK+INTRUSION+DETECTION
8 NETWORK SECURITY 230793 7% 10% 91 Search NETWORK+SECURITY Search NETWORK+SECURITY
9 COMPUTER SECURITY 210023 4% 15% 54 Search COMPUTER+SECURITY Search COMPUTER+SECURITY
10 SYSTEM CALL 206009 1% 45% 18 Search SYSTEM+CALL Search SYSTEM+CALL

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 7734 TRAFFIC CLASSIFICATION//DDOS ATTACKS//IP TRACEBACK
2 26816 ATTACK GRAPH//SECURITY METRICS//ATTACK TREES
3 19289 MALWARE DETECTION//MALWARE//ANDROID SECURITY
4 13023 OUTLIER DETECTION//ONE CLASS CLASSIFICATION//NOVELTY DETECTION
5 29924 CROSS SITE SCRIPTING//SQL INJECTION ATTACK//SQL INJECTION
6 38255 SHARED RESOURCE MATRIX//BIOMEDICAL DECISION MAKING//COMMUNICATING CONCURRENT KLEENE ALGEBRA
7 37426 STRING KERNELS//LEARNING WITH SEQUENTIAL DATA//SEQUENCE KERNELS
8 11402 ARTIFICIAL IMMUNE SYSTEM//NEGATIVE SELECTION ALGORITHM//IMMUNE NETWORK
9 38048 RIGHTS PROTECTION//RIGHT PROTECTION//CLIMATE CHANGE 1 2 1
10 29152 FAULT PROPAGATION MODEL//EVENT CORRELATION//AUSTRALIA E HLTH

Go to start page