Class information for:
Level 2: DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION

Basic class information

ID Publications Average number
of references
Avg. shr. active
ref. in WoS
1591 6600 29.1 25%



Bar chart of Publication_year

Last years might be incomplete

Classes in level above (level 3)



ID, lev.
above
Publications Label for level above
39 101210 TELECOMMUNICATIONS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS

Classes in level below (level 1)



ID, lev. below Publications Label for level below
8409 1187 INTRUSION DETECTION//ALERT CORRELATION//INTRUSION DETECTION SYSTEM
9732 1061 COMPUTERS & SECURITY//INFORMATION SYSTEMS SECURITY//IS SECUR
15598 633 TRAFFIC CLASSIFICATION//HEAVY HITTERS//TRAFFIC PROFILING
16256 598 IP TRACEBACK//DISTRIBUTED DENIAL OF SERVICE DDOS//DENIAL OF SERVICE
16486 586 COMPUTER VIRUS//MALWARE PROPAGATION//VIRAL EQUILIBRIUM
18081 505 DIGITAL INVESTIGATION//DIGITAL FORENSICS//LIVE FORENSICS
20214 408 ANTI SPAM FILTERING//SPAM FILTERING//SPAM
23908 277 KEYSTROKE DYNAMICS//MOUSE DYNAMICS//KEYSTROKE ANALYSIS
24787 252 MTTSF//VULNERABILITY DISCOVERY MODEL//EMC APPROACH
24814 251 INTERNET INFORMAT COMMUN//SOFTWARE FAULT ISOLATION//RANGE CHECKING
24839 250 INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION//SUPERVISORY CONTROL AND DATA ACQUISITION SCADA SYSTEMS//TRUST CASE
26264 213 CYBER WAR//CYBER SECUR STUDIES//CYBER WEAPONS
26686 203 CRIT INFRASTRUCT PROTECT//AI SAFETY//BLP BELL LAPADULA SECURITY MODEL
28053 176 MECHATRON CONTROL//DEPARMENT MECHATRON CONTROL//COMP SYST TECHNOL

Terms with highest relevance score



Rank Term Type of term Relevance score
(tfidf)
Class's shr.
of term's tot.
occurrences
Shr. of publ.
in class containing
term
Num. of
publ. in
class
1 DIGITAL INVESTIGATION Journal 325 72% 4% 255
2 COMPUTERS & SECURITY Journal 263 44% 7% 453
3 INTRUSION DETECTION Author keyword 80 18% 6% 399
4 IEEE SECURITY & PRIVACY Journal 61 30% 3% 168
5 COMPUTER SECURITY Author keyword 42 24% 2% 153
6 DIGITAL FORENSICS Author keyword 36 25% 2% 123
7 NETWORK SECURITY Author keyword 31 12% 4% 255
8 ANOMALY DETECTION Author keyword 24 11% 3% 200
9 INFORMATION SECURITY Author keyword 22 11% 3% 194
10 TRAFFIC CLASSIFICATION Author keyword 22 32% 1% 57

Web of Science journal categories

Author Key Words



Rank Web of Science journal category Relevance score
(tfidf)
Class's shr.
of term's tot.
occurrences
Shr. of publ.
in class containing
term
Num. of
publ. in
class
LCSH search Wikipedia search
1 INTRUSION DETECTION 80 18% 6% 399 Search INTRUSION+DETECTION Search INTRUSION+DETECTION
2 COMPUTER SECURITY 42 24% 2% 153 Search COMPUTER+SECURITY Search COMPUTER+SECURITY
3 DIGITAL FORENSICS 36 25% 2% 123 Search DIGITAL+FORENSICS Search DIGITAL+FORENSICS
4 NETWORK SECURITY 31 12% 4% 255 Search NETWORK+SECURITY Search NETWORK+SECURITY
5 ANOMALY DETECTION 24 11% 3% 200 Search ANOMALY+DETECTION Search ANOMALY+DETECTION
6 INFORMATION SECURITY 22 11% 3% 194 Search INFORMATION+SECURITY Search INFORMATION+SECURITY
7 TRAFFIC CLASSIFICATION 22 32% 1% 57 Search TRAFFIC+CLASSIFICATION Search TRAFFIC+CLASSIFICATION
8 COMPUTER VIRUS 21 43% 1% 37 Search COMPUTER+VIRUS Search COMPUTER+VIRUS
9 LIVE FORENSICS 20 67% 0% 18 Search LIVE+FORENSICS Search LIVE+FORENSICS
10 MALWARE 16 19% 1% 77 Search MALWARE Search MALWARE

Key Words Plus



Rank Web of Science journal category Relevance score
(tfidf)
Class's shr.
of term's tot.
occurrences
Shr. of publ.
in class containing
term
Num. of
publ. in
class
1 MALICIOUS OBJECTS 112 97% 0% 32
2 INTRUSION DETECTION 56 28% 3% 171
3 DDOS ATTACKS 38 69% 1% 33
4 POLICY COMPLIANCE 36 83% 0% 20
5 SYSTEMS SECURITY 30 79% 0% 19
6 INFORMATION SECURITY 30 45% 1% 50
7 SERVICE ATTACKS 20 51% 0% 28
8 ANOMALY DETECTION 20 22% 1% 80
9 COMPUTER ABUSE 20 67% 0% 18
10 MALWARE 18 45% 0% 29

Journals



Rank Web of Science journal category Relevance score
(tfidf)
Class's shr.
of term's tot.
occurrences
Shr. of publ.
in class containing
term
Num. of
publ. in
class
1 DIGITAL INVESTIGATION 325 72% 4% 255
2 COMPUTERS & SECURITY 263 44% 7% 453
3 IEEE SECURITY & PRIVACY 61 30% 3% 168
4 SECURITY AND COMMUNICATION NETWORKS 19 14% 2% 124
5 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 13 17% 1% 70
6 INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 9 25% 0% 29
7 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 6 16% 1% 37
8 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT 4 14% 0% 29
9 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 3 13% 0% 23

Reviews



Title Publ. year Cit. Active
references
% act. ref.
to same field
Security Challenges for Medical Devices 2015 1 3 100%
A survey of intrusion detection techniques in Cloud 2013 28 4 100%
An intrusion detection and prevention system in cloud computing: A systematic review 2013 20 33 82%
Intrusion detection system: A comprehensive review 2013 19 32 59%
Intrusion detection by machine learning: A review 2009 62 30 80%
Network attacks: Taxonomy, tools and systems 2014 3 21 90%
The use of computational intelligence in intrusion detection systems: A review 2010 88 84 40%
A review of machine learning approaches to Spam filtering 2009 59 51 75%
Biometric personal authentication using keystroke dynamics: A review 2011 26 18 83%
A survey of network flow applications 2013 9 21 90%

Address terms



Rank Address term Relevance score
(tfidf)
Class's shr.
of term's tot.
occurrences
Shr. of publ.
in class containing
term
Num. of
publ. in
class
1 SECUR COMMUN NETWORK 17 100% 0.1% 8
2 INFORMAT ASSURANCE GRP 15 67% 0.2% 14
3 MECHATRON CONTROL 14 45% 0.3% 23
4 IS SECUR 13 80% 0.1% 8
5 FORENS COMP 9 83% 0.1% 5
6 RELIABLE SOFTWARE GRP 9 67% 0.1% 8
7 COMP SYST TECHNOL 7 21% 0.5% 32
8 INFORMAT MANAGEMENT INT BUSINESS 6 80% 0.1% 4
9 INFORMAT SECUR EXCELLENCE 6 80% 0.1% 4
10 SMARTNESS SEMANT SECUR S3 6 80% 0.1% 4

Related classes at same level (level 2)



Rank Relatedness score Related classes
1 0.0000015655 PRIVACY CALCULUS//ACCESS CONTROL//INFORMATION PRIVACY
2 0.0000014944 CONCEPTUAL IMMUNOL GRP//SEQUENCE UNIQUENESS//ARTIFICIAL IMMUNE SYSTEMS
3 0.0000014645 ACM SIGCOMM COMPUTER COMMUNICATION REVIEW//PEER-TO-PEER NETWORKING AND APPLICATIONS//PEER TO PEER
4 0.0000009702 RISK MANAGEMENT ENGN SYST//NETWORK INTERDICTION//J VALUE
5 0.0000008746 CREDIT SCORING//MACHINE LEARNING//FEATURE SELECTION
6 0.0000007398 ASSOCIATION RULES//SEQUENTIAL PATTERNS//UTILITY MINING
7 0.0000005743 WIRELESS SENSOR NETWORKS//AD HOC NETWORKS//INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
8 0.0000005546 HUMAN INTERACTIVE PROOFS//CAPTCHA//CAPTCHAS
9 0.0000005359 STRING MATCHING//DATA STRUCTURES//SUCCINCT DATA STRUCTURES
10 0.0000005052 ACM SIGPLAN NOTICES//REGISTER ALLOCATION//GARBAGE COLLECTION