Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
24814 | 251 | 29.5 | 19% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
1591 | 6600 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | INTERNET INFORMAT COMMUN | Address | 4 | 75% | 1% | 3 |
2 | SOFTWARE FAULT ISOLATION | Author keyword | 3 | 57% | 2% | 4 |
3 | RANGE CHECKING | Author keyword | 2 | 67% | 1% | 2 |
4 | SOFTWARE SELF HEALING | Author keyword | 2 | 67% | 1% | 2 |
5 | SPATIAL MEMORY SAFETY | Author keyword | 2 | 67% | 1% | 2 |
6 | MEMORY SAFETY | Author keyword | 1 | 21% | 2% | 6 |
7 | APPLICATION ORIENTED ACCESS CONTROLS | Author keyword | 1 | 100% | 1% | 2 |
8 | AUTOMATIC POOL ALLOCATION | Author keyword | 1 | 100% | 1% | 2 |
9 | CODE REUSE ATTACKS | Author keyword | 1 | 100% | 1% | 2 |
10 | REGION MANAGEMENT | Author keyword | 1 | 50% | 1% | 2 |
Web of Science journal categories |
Author Key Words |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | INJECTION ATTACKS | 4 | 75% | 1% | 3 |
2 | INFORMATION FLOW TRACKING | 1 | 33% | 1% | 3 |
3 | DATA DIVERSITY | 1 | 50% | 0% | 1 |
4 | PROGRAM DEPENDENCES | 1 | 50% | 0% | 1 |
5 | SITE SCRIPTING ATTACKS | 0 | 33% | 0% | 1 |
6 | SQL INJECTION ATTACKS | 0 | 33% | 0% | 1 |
7 | ARCHITECTURAL SUPPORT | 0 | 18% | 1% | 2 |
8 | PRECISE ANALYSIS | 0 | 18% | 1% | 2 |
9 | POINTER | 0 | 13% | 1% | 3 |
10 | NETWORKED SENSORS | 0 | 25% | 0% | 1 |
Journals |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
Security Challenges for Medical Devices | 2015 | 1 | 3 | 100% |
Deworming the Internet | 2004 | 5 | 23 | 4% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | INTERNET INFORMAT COMMUN | 4 | 75% | 1.2% | 3 |
2 | SYST ASSURANCE | 1 | 33% | 0.8% | 2 |
3 | BEIJING SOFTWARE SECUR ENGN TECH | 1 | 50% | 0.4% | 1 |
4 | COMP CREAT TECHNOL ENGN | 1 | 50% | 0.4% | 1 |
5 | CYBER SYST TECHNOL GRP | 1 | 50% | 0.4% | 1 |
6 | SECURE COMMUN PROJECT | 1 | 50% | 0.4% | 1 |
7 | SHENZHEN ENGN MOBILE INTERNET PLICAT MIDDLE | 1 | 50% | 0.4% | 1 |
8 | FUTURE MEDIA COMP | 0 | 33% | 0.4% | 1 |
9 | INFORMAT SYST TECHNOL GRP | 0 | 33% | 0.4% | 1 |
10 | PROGRAMMING LANGUAGES GRP | 0 | 33% | 0.4% | 1 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000179247 | PROGRAM SLICING//PARTIAL REDUNDANCY ELIMINATION//POINTS TO ANALYSIS |
2 | 0.0000153531 | BYTECODE VERIFICATION//PREVENT INFORMATION LEAKAGE//SEPARATION LOGIC |
3 | 0.0000144003 | INTELLECTUAL PROPERTY PROTECTION IPP//HARDWARE METERING//HARDWARE SECURITY |
4 | 0.0000134484 | COMPUTER VIRUS//MALWARE PROPAGATION//VIRAL EQUILIBRIUM |
5 | 0.0000133834 | MTTSF//VULNERABILITY DISCOVERY MODEL//EMC APPROACH |
6 | 0.0000105546 | CANADA US BORDER//CLUB FORMATION//HEAP SPRAY |
7 | 0.0000102419 | REACHABILITY TESTING//RACE DETECTION//DATA RACE |
8 | 0.0000083994 | GARBAGE COLLECTION//CONCURRENT GARBAGE COLLECTION//REFERENCE COUNTING |
9 | 0.0000081839 | INTRUSION DETECTION//ALERT CORRELATION//INTRUSION DETECTION SYSTEM |
10 | 0.0000081136 | SOFTWARE CLONE//SOFTWARE BIRTHMARK//SOFTWARE THEFT DETECTION |