Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
16486 | 586 | 28.3 | 32% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
1591 | 6600 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | COMPUTER VIRUS | Author keyword | 21 | 43% | 6% | 37 |
2 | MALWARE PROPAGATION | Author keyword | 8 | 50% | 2% | 11 |
3 | VIRAL EQUILIBRIUM | Author keyword | 6 | 100% | 1% | 4 |
4 | WORM PROPAGATION | Author keyword | 4 | 33% | 2% | 9 |
5 | WORM MODELING | Author keyword | 3 | 100% | 1% | 3 |
6 | DARKNET | Author keyword | 3 | 33% | 1% | 7 |
7 | INTERNET WORMS | Author keyword | 3 | 33% | 1% | 7 |
8 | INVASIVE SOFTWARE | Author keyword | 3 | 33% | 1% | 7 |
9 | COMPUTER WORM | Author keyword | 3 | 50% | 1% | 4 |
10 | MALWARE DETECTION | Author keyword | 3 | 14% | 3% | 18 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | COMPUTER VIRUS | 21 | 43% | 6% | 37 | Search COMPUTER+VIRUS | Search COMPUTER+VIRUS |
2 | MALWARE PROPAGATION | 8 | 50% | 2% | 11 | Search MALWARE+PROPAGATION | Search MALWARE+PROPAGATION |
3 | VIRAL EQUILIBRIUM | 6 | 100% | 1% | 4 | Search VIRAL+EQUILIBRIUM | Search VIRAL+EQUILIBRIUM |
4 | WORM PROPAGATION | 4 | 33% | 2% | 9 | Search WORM+PROPAGATION | Search WORM+PROPAGATION |
5 | WORM MODELING | 3 | 100% | 1% | 3 | Search WORM+MODELING | Search WORM+MODELING |
6 | DARKNET | 3 | 33% | 1% | 7 | Search DARKNET | Search DARKNET |
7 | INTERNET WORMS | 3 | 33% | 1% | 7 | Search INTERNET+WORMS | Search INTERNET+WORMS |
8 | INVASIVE SOFTWARE | 3 | 33% | 1% | 7 | Search INVASIVE+SOFTWARE | Search INVASIVE+SOFTWARE |
9 | COMPUTER WORM | 3 | 50% | 1% | 4 | Search COMPUTER+WORM | Search COMPUTER+WORM |
10 | MALWARE DETECTION | 3 | 14% | 3% | 18 | Search MALWARE+DETECTION | Search MALWARE+DETECTION |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | MALICIOUS OBJECTS | 112 | 97% | 5% | 32 |
2 | COMPUTER VIRUS | 11 | 78% | 1% | 7 |
3 | MALWARE | 6 | 28% | 3% | 18 |
4 | MALICIOUS EXECUTABLES | 3 | 33% | 1% | 7 |
5 | COMPUTER VIRUSES | 3 | 42% | 1% | 5 |
6 | SIRS EPIDEMIC MODEL | 2 | 67% | 0% | 2 |
7 | WORM DETECTION | 2 | 67% | 0% | 2 |
8 | MALWARE DETECTION | 2 | 50% | 1% | 3 |
9 | ACTIVE WORMS | 1 | 100% | 0% | 2 |
10 | EXTERNAL COMPUTERS | 1 | 100% | 0% | 2 |
Journals |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
The stochastic SIRA model for computer viruses | 2014 | 2 | 15 | 47% |
Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures | 2009 | 5 | 5 | 100% |
Mathematical modeling of the propagation of malware: a review | 2015 | 0 | 48 | 69% |
A biological model to improve PE malware detection: Review | 2010 | 1 | 3 | 67% |
Botnet detection techniques: review, future trends, and issues | 2014 | 0 | 12 | 42% |
A review on feature selection in mobile malware detection | 2015 | 0 | 18 | 28% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | DEPENDABLE DISTRIBUTED SYST | 2 | 43% | 0.5% | 3 |
2 | DEUSTOTECH COMP | 1 | 50% | 0.3% | 2 |
3 | INFORMAT SCI CCS 3 | 1 | 40% | 0.3% | 2 |
4 | SMARTNESS SEMANT SECUR S3 | 1 | 40% | 0.3% | 2 |
5 | SECURE INFORMAT TECHNOL | 1 | 25% | 0.5% | 3 |
6 | ADV SECUR DARMSTADT CASED | 1 | 50% | 0.2% | 1 |
7 | GEORGIA TECH INFORMAT SECUR | 1 | 50% | 0.2% | 1 |
8 | JOURNALS PROD | 1 | 50% | 0.2% | 1 |
9 | POLIZIA STATO | 1 | 50% | 0.2% | 1 |
10 | REMOTE SENSING ENERGY | 1 | 50% | 0.2% | 1 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000164943 | INTRUSION DETECTION//ALERT CORRELATION//INTRUSION DETECTION SYSTEM |
2 | 0.0000138348 | KEYSTROKE DYNAMICS//MOUSE DYNAMICS//KEYSTROKE ANALYSIS |
3 | 0.0000134484 | INTERNET INFORMAT COMMUN//SOFTWARE FAULT ISOLATION//RANGE CHECKING |
4 | 0.0000134165 | EPIDEMIC SPREADING//EPIDEMIC THRESHOLD//EPIDEMIC DYNAMICS |
5 | 0.0000100998 | IP TRACEBACK//DISTRIBUTED DENIAL OF SERVICE DDOS//DENIAL OF SERVICE |
6 | 0.0000100204 | TRAFFIC CLASSIFICATION//HEAVY HITTERS//TRAFFIC PROFILING |
7 | 0.0000084138 | CRIT INFRASTRUCT PROTECT//AI SAFETY//BLP BELL LAPADULA SECURITY MODEL |
8 | 0.0000075843 | BACKWARD BIFURCATION//EPIDEMIC MODEL//BASIC REPRODUCTION NUMBER |
9 | 0.0000066118 | DIGITAL INVESTIGATION//DIGITAL FORENSICS//LIVE FORENSICS |
10 | 0.0000062441 | ANTI SPAM FILTERING//SPAM FILTERING//SPAM |