Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
8409 | 1187 | 27.8 | 26% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
1591 | 6600 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | INTRUSION DETECTION | Author keyword | 46 | 14% | 26% | 307 |
2 | ALERT CORRELATION | Author keyword | 13 | 33% | 3% | 31 |
3 | INTRUSION DETECTION SYSTEM | Author keyword | 10 | 14% | 5% | 63 |
4 | COMPUTER AUDIT DATA | Author keyword | 9 | 83% | 0% | 5 |
5 | MASQUERADE DETECTION | Author keyword | 7 | 39% | 1% | 13 |
6 | MISUSE DETECTION | Author keyword | 6 | 26% | 2% | 20 |
7 | INTRUSION DETECTION SYSTEMS | Author keyword | 5 | 16% | 2% | 29 |
8 | INTRUDER DETECTOR | Author keyword | 4 | 67% | 0% | 4 |
9 | ATTACK SCENARIO ANALYSIS | Author keyword | 4 | 75% | 0% | 3 |
10 | FALSE POSITIVE ANALYSIS | Author keyword | 4 | 75% | 0% | 3 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | INTRUSION DETECTION | 46 | 14% | 26% | 307 | Search INTRUSION+DETECTION | Search INTRUSION+DETECTION |
2 | ALERT CORRELATION | 13 | 33% | 3% | 31 | Search ALERT+CORRELATION | Search ALERT+CORRELATION |
3 | INTRUSION DETECTION SYSTEM | 10 | 14% | 5% | 63 | Search INTRUSION+DETECTION+SYSTEM | Search INTRUSION+DETECTION+SYSTEM |
4 | COMPUTER AUDIT DATA | 9 | 83% | 0% | 5 | Search COMPUTER+AUDIT+DATA | Search COMPUTER+AUDIT+DATA |
5 | MASQUERADE DETECTION | 7 | 39% | 1% | 13 | Search MASQUERADE+DETECTION | Search MASQUERADE+DETECTION |
6 | MISUSE DETECTION | 6 | 26% | 2% | 20 | Search MISUSE+DETECTION | Search MISUSE+DETECTION |
7 | INTRUSION DETECTION SYSTEMS | 5 | 16% | 2% | 29 | Search INTRUSION+DETECTION+SYSTEMS | Search INTRUSION+DETECTION+SYSTEMS |
8 | INTRUDER DETECTOR | 4 | 67% | 0% | 4 | Search INTRUDER+DETECTOR | Search INTRUDER+DETECTOR |
9 | ATTACK SCENARIO ANALYSIS | 4 | 75% | 0% | 3 | Search ATTACK+SCENARIO+ANALYSIS | Search ATTACK+SCENARIO+ANALYSIS |
10 | FALSE POSITIVE ANALYSIS | 4 | 75% | 0% | 3 | Search FALSE+POSITIVE+ANALYSIS | Search FALSE+POSITIVE+ANALYSIS |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | INTRUSION DETECTION | 28 | 20% | 11% | 125 |
2 | COMPUTER INTRUSION | 11 | 78% | 1% | 7 |
3 | ANOMALY DETECTION | 8 | 14% | 4% | 52 |
4 | MASQUERADES | 6 | 71% | 0% | 5 |
5 | ALERT CORRELATION | 6 | 47% | 1% | 9 |
6 | NETWORK TRAFFIC DATA | 6 | 100% | 0% | 4 |
7 | INTRUSION DETECTION SYSTEM | 5 | 37% | 1% | 11 |
8 | INTRUSION DETECTION SYSTEMS | 5 | 28% | 1% | 14 |
9 | AUDIT DATA | 3 | 100% | 0% | 3 |
10 | DETECTION FRAMEWORK | 2 | 67% | 0% | 2 |
Journals |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
A survey of intrusion detection techniques in Cloud | 2013 | 28 | 4 | 100% |
Intrusion detection by machine learning: A review | 2009 | 62 | 30 | 80% |
An intrusion detection and prevention system in cloud computing: A systematic review | 2013 | 20 | 33 | 58% |
The use of computational intelligence in intrusion detection systems: A review | 2010 | 88 | 84 | 40% |
Intrusion detection system: A comprehensive review | 2013 | 19 | 32 | 53% |
Data preprocessing for anomaly based network intrusion detection: A review | 2011 | 16 | 17 | 71% |
Network attacks: Taxonomy, tools and systems | 2014 | 3 | 21 | 57% |
The use of artificial intelligence based techniques for intrusion detection: a review | 2010 | 11 | 17 | 76% |
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System | 2013 | 1 | 11 | 82% |
Automatic Attack Signature Generation Systems: A Review | 2013 | 0 | 2 | 100% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | RELIABLE SOFTWARE GRP | 4 | 50% | 0.5% | 6 |
2 | INFORMAT SYST ASSURANCE | 4 | 56% | 0.4% | 5 |
3 | GRP SIGNALS TELEMAT COMMUN | 3 | 100% | 0.3% | 3 |
4 | INFORMAT SECUR EXCELLENCE | 3 | 60% | 0.3% | 3 |
5 | LINUX SECUR | 2 | 67% | 0.2% | 2 |
6 | SECUR CRYPTOG LASEC | 2 | 67% | 0.2% | 2 |
7 | SECURE INFORMAT SYST | 2 | 16% | 1.0% | 12 |
8 | INNOVAT IT SERV PLICAT INEXT | 2 | 43% | 0.3% | 3 |
9 | SECUR COMMUN NETWORK | 1 | 38% | 0.3% | 3 |
10 | AI PL ELECT | 1 | 100% | 0.2% | 2 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000217085 | IP TRACEBACK//DISTRIBUTED DENIAL OF SERVICE DDOS//DENIAL OF SERVICE |
2 | 0.0000205695 | MTTSF//VULNERABILITY DISCOVERY MODEL//EMC APPROACH |
3 | 0.0000170693 | TRAFFIC CLASSIFICATION//HEAVY HITTERS//TRAFFIC PROFILING |
4 | 0.0000164943 | COMPUTER VIRUS//MALWARE PROPAGATION//VIRAL EQUILIBRIUM |
5 | 0.0000132525 | OUTLIER DETECTION//NOVELTY DETECTION//ONE CLASS CLASSIFICATION |
6 | 0.0000089670 | ARTIFICIAL IMMUNE SYSTEMS//ARTIFICIAL IMMUNE SYSTEM//NEGATIVE SELECTION ALGORITHM |
7 | 0.0000088357 | KEYSTROKE DYNAMICS//MOUSE DYNAMICS//KEYSTROKE ANALYSIS |
8 | 0.0000084304 | MECHATRON CONTROL//DEPARMENT MECHATRON CONTROL//COMP SYST TECHNOL |
9 | 0.0000081839 | INTERNET INFORMAT COMMUN//SOFTWARE FAULT ISOLATION//RANGE CHECKING |
10 | 0.0000079460 | CAUSALITY GRAPH MODEL//EVENT CORRELATION//COGNIT ENGN PROGRAM |