Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
26264 | 213 | 52.8 | 12% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
1591 | 6600 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | CYBER WAR | Author keyword | 4 | 38% | 4% | 8 |
2 | CYBER SECUR STUDIES | Address | 1 | 100% | 1% | 2 |
3 | CYBER WEAPONS | Author keyword | 1 | 50% | 1% | 2 |
4 | DEMAND FOR CLIMATE PROTECTION | Author keyword | 1 | 100% | 1% | 2 |
5 | IRREGULAR WAR | Author keyword | 1 | 40% | 1% | 2 |
6 | STRATEGIC THEORY | Author keyword | 1 | 40% | 1% | 2 |
7 | AFGHAN WAR | Author keyword | 1 | 50% | 0% | 1 |
8 | APPARATUSES OF SECURITY | Author keyword | 1 | 50% | 0% | 1 |
9 | ATTACKER DEFENDER GAME | Author keyword | 1 | 50% | 0% | 1 |
10 | BUSINESS CRIME | Author keyword | 1 | 50% | 0% | 1 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | CYBER WAR | 4 | 38% | 4% | 8 | Search CYBER+WAR | Search CYBER+WAR |
2 | CYBER WEAPONS | 1 | 50% | 1% | 2 | Search CYBER+WEAPONS | Search CYBER+WEAPONS |
3 | DEMAND FOR CLIMATE PROTECTION | 1 | 100% | 1% | 2 | Search DEMAND+FOR+CLIMATE+PROTECTION | Search DEMAND+FOR+CLIMATE+PROTECTION |
4 | IRREGULAR WAR | 1 | 40% | 1% | 2 | Search IRREGULAR+WAR | Search IRREGULAR+WAR |
5 | STRATEGIC THEORY | 1 | 40% | 1% | 2 | Search STRATEGIC+THEORY | Search STRATEGIC+THEORY |
6 | AFGHAN WAR | 1 | 50% | 0% | 1 | Search AFGHAN+WAR | Search AFGHAN+WAR |
7 | APPARATUSES OF SECURITY | 1 | 50% | 0% | 1 | Search APPARATUSES+OF+SECURITY | Search APPARATUSES+OF+SECURITY |
8 | ATTACKER DEFENDER GAME | 1 | 50% | 0% | 1 | Search ATTACKER+DEFENDER+GAME | Search ATTACKER+DEFENDER+GAME |
9 | BUSINESS CRIME | 1 | 50% | 0% | 1 | Search BUSINESS+CRIME | Search BUSINESS+CRIME |
10 | COUNTERDECEPTION | 1 | 50% | 0% | 1 | Search COUNTERDECEPTION | Search COUNTERDECEPTION |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | OFFENSE DEFENSE THEORY | 1 | 50% | 0% | 1 |
2 | ESPIONAGE | 0 | 20% | 0% | 1 |
3 | MILITARY AFFAIRS | 0 | 20% | 0% | 1 |
4 | CYBERCRIME | 0 | 17% | 0% | 1 |
5 | ETHNIC HETEROGENEITY | 0 | 17% | 0% | 1 |
6 | HUMAN RIGHTS ACT | 0 | 17% | 0% | 1 |
7 | STUXNET | 0 | 17% | 0% | 1 |
8 | INFORMATION WARFARE | 0 | 14% | 0% | 1 |
9 | TRADE SECRET LAW | 0 | 13% | 0% | 1 |
10 | UK CIVIL CONTINGENCIES | 0 | 13% | 0% | 1 |
Journals |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
SOLVING THE DILEMMA OF STATE RESPONSES TO CYBERATTACKS: A JUSTIFICATION FOR THE USE OF ACTIVE DEFENSES AGAINST STATES WHO NEGLECT THEIR DUTY PREVENT | 2009 | 7 | 4 | 75% |
Computer network attack and the use of force in international law: Thoughts on a normative framework | 1999 | 25 | 8 | 25% |
Cyber situational awareness - A systematic review of the literature | 2014 | 1 | 12 | 25% |
Information Technologies, Meta-power, and Transformations in Global Politics | 2013 | 5 | 22 | 14% |
Criminal proceedings after the Human Rights Act: The first year | 2001 | 2 | 2 | 50% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | CYBER SECUR STUDIES | 1 | 100% | 0.9% | 2 |
2 | CEBROWSKI INNOVAT INFORMAT SUPER | 1 | 50% | 0.5% | 1 |
3 | CHAIR INTERDISCIPLINARY STUDIES | 1 | 50% | 0.5% | 1 |
4 | COMP CRIME INTELLECTUAL PROPERTY SECT | 1 | 50% | 0.5% | 1 |
5 | JOINT TRANS CRIME | 1 | 50% | 0.5% | 1 |
6 | KNOWLEDGE DATA ENGN | 1 | 50% | 0.5% | 1 |
7 | PROGRAM ARMS CONTROL DISARMAMENT INT SECUR ACDI | 1 | 50% | 0.5% | 1 |
8 | PROGRAM LAW BEHAV | 1 | 50% | 0.5% | 1 |
9 | SECUR POLICY | 1 | 50% | 0.5% | 1 |
10 | CITIZEN | 0 | 20% | 0.9% | 2 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000119374 | MILITARY INNOVATION//MILITARY TRANSFORMATION//STRATEGIC STUDIES |
2 | 0.0000079919 | AMERICAN JOURNAL OF INTERNATIONAL LAW//COLUMBIA JOURNAL OF TRANSNATIONAL LAW//HARVARD INTERNATIONAL LAW JOURNAL |
3 | 0.0000079478 | KAMILA SHAMSIE//SLCR//SOCLAS |
4 | 0.0000066187 | COMPROMISE SET//IMPROVEMENT OF PRODUCTIVITY//INTERFACE ARCHITECTURES |
5 | 0.0000065721 | ENI//ANGLO PORTUGUESE RELATIONS//CRITICAL MAKING |
6 | 0.0000065349 | CYNODON DACTYLON CV 67//PANICUM MAXIMUM CV LIKONI//GILBERT TOBIN PUBL LAW |
7 | 0.0000065206 | BOUNDARY COMMISSIONS//BOUNDARY DEMARCATION//GEOSPATIAL INFORMATION SCIENCE |
8 | 0.0000059474 | COGNITIVE BOUNDARIES//FESTA//MCCALLUM |
9 | 0.0000057427 | COMPUTERS & SECURITY//INFORMATION SYSTEMS SECURITY//IS SECUR |
10 | 0.0000056801 | INFORMATIONAL CAPITALISM//PRODUSAGE//BLINDSPOT DEBATE |