Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
5109 | 1603 | 27.8 | 27% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
176 | 21213 | WIRELESS SENSOR NETWORKS//AD HOC NETWORKS//INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | TRUST MANAGEMENT | Author keyword | 16 | 19% | 5% | 77 |
2 | REPUTATION SYSTEMS | Author keyword | 15 | 24% | 3% | 56 |
3 | TRUST AND REPUTATION MANAGEMENT | Author keyword | 9 | 64% | 1% | 9 |
4 | EMEDIA | Address | 9 | 83% | 0% | 5 |
5 | WORMHOLE ATTACKS | Author keyword | 9 | 59% | 1% | 10 |
6 | COOPERATION STIMULATION | Author keyword | 9 | 67% | 0% | 8 |
7 | SECURE ROUTING | Author keyword | 8 | 24% | 2% | 29 |
8 | ALGORITHMS SECUR GRP | Address | 6 | 80% | 0% | 4 |
9 | TRUST GRAPH | Author keyword | 6 | 80% | 0% | 4 |
10 | TRUST AND REPUTATION | Author keyword | 6 | 36% | 1% | 13 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | TRUST MANAGEMENT | 16 | 19% | 5% | 77 | Search TRUST+MANAGEMENT | Search TRUST+MANAGEMENT |
2 | REPUTATION SYSTEMS | 15 | 24% | 3% | 56 | Search REPUTATION+SYSTEMS | Search REPUTATION+SYSTEMS |
3 | TRUST AND REPUTATION MANAGEMENT | 9 | 64% | 1% | 9 | Search TRUST+AND+REPUTATION+MANAGEMENT | Search TRUST+AND+REPUTATION+MANAGEMENT |
4 | WORMHOLE ATTACKS | 9 | 59% | 1% | 10 | Search WORMHOLE+ATTACKS | Search WORMHOLE+ATTACKS |
5 | COOPERATION STIMULATION | 9 | 67% | 0% | 8 | Search COOPERATION+STIMULATION | Search COOPERATION+STIMULATION |
6 | SECURE ROUTING | 8 | 24% | 2% | 29 | Search SECURE+ROUTING | Search SECURE+ROUTING |
7 | TRUST GRAPH | 6 | 80% | 0% | 4 | Search TRUST+GRAPH | Search TRUST+GRAPH |
8 | TRUST AND REPUTATION | 6 | 36% | 1% | 13 | Search TRUST+AND+REPUTATION | Search TRUST+AND+REPUTATION |
9 | WORMHOLE ATTACK | 6 | 27% | 1% | 18 | Search WORMHOLE+ATTACK | Search WORMHOLE+ATTACK |
10 | MANET SECURITY | 5 | 41% | 1% | 9 | Search MANET+SECURITY | Search MANET+SECURITY |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | REPUTATION SYSTEMS | 28 | 40% | 3% | 54 |
2 | TRUST MODEL | 9 | 64% | 1% | 9 |
3 | REPUTATION AGGREGATION | 8 | 100% | 0% | 5 |
4 | COMPUTATIONAL TRUST | 7 | 57% | 0% | 8 |
5 | REPUTATION BASED TRUST | 6 | 71% | 0% | 5 |
6 | FUZZY REPUTATION | 3 | 60% | 0% | 3 |
7 | WORMHOLE ATTACKS | 3 | 32% | 0% | 7 |
8 | TRUST MANAGEMENT | 2 | 15% | 1% | 14 |
9 | TRUST MODELS | 2 | 67% | 0% | 2 |
10 | PUBLIC KEY MANAGEMENT | 2 | 50% | 0% | 3 |
Journals |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
Review on computational trust and reputation models | 2005 | 251 | 4 | 75% |
Securing DSR against wormhole attacks in multirate ad hoc networks | 2013 | 5 | 5 | 100% |
Security threats and solutions in MANETs: A case study using AODV and SAODV | 2012 | 12 | 7 | 86% |
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy | 2012 | 11 | 16 | 69% |
Comparative study of trust and reputation systems for wireless sensor networks | 2013 | 6 | 34 | 47% |
A survey of intrusion detection in wireless network applications | 2014 | 4 | 32 | 22% |
Trust in multi-agent systems | 2004 | 148 | 17 | 35% |
A review of trust modeling in ad hoc networks | 2009 | 13 | 7 | 86% |
A survey of trust in computer science and the Semantic Web | 2007 | 120 | 16 | 38% |
A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks | 2015 | 0 | 21 | 86% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | EMEDIA | 9 | 83% | 0.3% | 5 |
2 | ALGORITHMS SECUR GRP | 6 | 80% | 0.2% | 4 |
3 | DCSL | 4 | 75% | 0.2% | 3 |
4 | INGN INFORMAC COMUNICAC | 3 | 21% | 0.7% | 12 |
5 | CRYPTOG SYST SECUR | 3 | 38% | 0.4% | 6 |
6 | BASIC SOFTWARE | 3 | 60% | 0.2% | 3 |
7 | GLOBAL PERVAS COMP GRP | 2 | 67% | 0.1% | 2 |
8 | PROG S RD | 2 | 67% | 0.1% | 2 |
9 | BUSINESS INFORMAT TECHNOL MEDIA | 1 | 100% | 0.1% | 2 |
10 | EXTENDED ENTERPRISE BUSINESS INTELLIGENCE | 1 | 100% | 0.1% | 2 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000157514 | KEY PREDISTRIBUTION//CONCEALED DATA AGGREGATION//KEY MANAGEMENT |
2 | 0.0000147254 | TRUST NEGOTIATION//DISTRIBUTED PROVING//JAVA BASED MOBILE PHONE APPLICATION |
3 | 0.0000097981 | JAMMING DETECTION//REACTIVE JAMMING//RF FINGERPRINTS |
4 | 0.0000084622 | EDGE PREDICTION//FLEXRFID//HIPPOCRATIC DATABASES |
5 | 0.0000081197 | AUTOCONFIGURATION//IPV6 ADDRESS//IP ADDRESS ASSIGNMENT |
6 | 0.0000079425 | CREDENTIAL VALIDATION SERVICE//ROLE BASED ACCESS CONTROLS//ACCESS CONTROL IN COLLABORATION ENVIRONMENTS |
7 | 0.0000072951 | CONNECTED DOMINATING SET//MOBILE AD HOC NETWORKS//VIRTUAL BACKBONE |
8 | 0.0000068710 | PEER-TO-PEER NETWORKING AND APPLICATIONS//PEER TO PEER//PEER TO PEER NETWORKS |
9 | 0.0000067952 | LERSAIS//WEB BASED SOCIAL NETWORKS//FERTIGATION SIMULATOR |
10 | 0.0000062143 | INTRUSION DETECTION//ALERT CORRELATION//INTRUSION DETECTION SYSTEM |