Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
15358 | 717 | 28.4 | 27% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
20 | 3 | COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING | 118625 |
1591 | 2 | COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION | 7195 |
15358 | 1 | IP TRACEBACK//DDOS//DDOS ATTACKS | 717 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | IP TRACEBACK | authKW | 1851291 | 7% | 91% | 48 |
2 | DDOS | authKW | 1685741 | 9% | 65% | 61 |
3 | DDOS ATTACKS | authKW | 1663506 | 7% | 78% | 50 |
4 | DENIAL OF SERVICE | authKW | 902300 | 8% | 38% | 56 |
5 | DISTRIBUTED DENIAL OF SERVICE DDOS | authKW | 644104 | 3% | 69% | 22 |
6 | DISTRIBUTED DENIAL OF SERVICE | authKW | 614937 | 3% | 76% | 19 |
7 | DISTRIBUTED DENIAL OF SERVICE ATTACKS | authKW | 586062 | 2% | 81% | 17 |
8 | IP SPOOFING | authKW | 567804 | 3% | 67% | 20 |
9 | SYN FLOODING | authKW | 471724 | 2% | 92% | 12 |
10 | NETWORK SECURITY | authKW | 367370 | 12% | 10% | 86 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 25540 | 49% | 0% | 350 |
2 | Telecommunications | 19917 | 44% | 0% | 316 |
3 | Computer Science, Hardware & Architecture | 10617 | 22% | 0% | 156 |
4 | Computer Science, Theory & Methods | 8245 | 30% | 0% | 213 |
5 | Computer Science, Software Engineering | 3031 | 15% | 0% | 110 |
6 | Engineering, Electrical & Electronic | 2202 | 33% | 0% | 240 |
7 | Computer Science, Artificial Intelligence | 434 | 7% | 0% | 50 |
8 | Computer Science, Interdisciplinary Applications | 156 | 5% | 0% | 33 |
9 | Operations Research & Management Science | 15 | 2% | 0% | 11 |
10 | Engineering, General | 12 | 2% | 0% | 11 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | COMP SCI IND | 113561 | 1% | 67% | 4 |
2 | CDBR SSE PROJECT | 85173 | 0% | 100% | 2 |
3 | COMMPUTER SCI TECHNOL | 85173 | 0% | 100% | 2 |
4 | ELECT SIGNAL IMAGES | 85173 | 0% | 100% | 2 |
5 | NETWORK SOFTWARE SECT | 85173 | 0% | 100% | 2 |
6 | OPT INTERNET MOBILE INFORMAT NETWORK | 56780 | 0% | 67% | 2 |
7 | AD T COMMUN NETWORKS GRP | 42586 | 0% | 100% | 1 |
8 | COMP COMMUN CB10 04 442 | 42586 | 0% | 100% | 1 |
9 | COMP SCI TUNIS | 42586 | 0% | 100% | 1 |
10 | CONVERGENCE SECUR SECT | 42586 | 0% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SECURITY AND COMMUNICATION NETWORKS | 39808 | 5% | 3% | 36 |
2 | COMPUTERS & SECURITY | 29964 | 4% | 2% | 29 |
3 | ACM SIGCOMM COMPUTER COMMUNICATION REVIEW | 18589 | 3% | 2% | 23 |
4 | COMPUTER NETWORKS | 17331 | 5% | 1% | 39 |
5 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 17326 | 2% | 3% | 14 |
6 | IEEE-ACM TRANSACTIONS ON NETWORKING | 11810 | 4% | 1% | 27 |
7 | COMPUTER COMMUNICATIONS | 9202 | 4% | 1% | 31 |
8 | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 4894 | 2% | 1% | 13 |
9 | IEEE SECURITY & PRIVACY | 4297 | 1% | 1% | 8 |
10 | IEEE COMMUNICATIONS LETTERS | 4093 | 3% | 0% | 25 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | IP TRACEBACK | 1851291 | 7% | 91% | 48 | Search IP+TRACEBACK | Search IP+TRACEBACK |
2 | DDOS | 1685741 | 9% | 65% | 61 | Search DDOS | Search DDOS |
3 | DDOS ATTACKS | 1663506 | 7% | 78% | 50 | Search DDOS+ATTACKS | Search DDOS+ATTACKS |
4 | DENIAL OF SERVICE | 902300 | 8% | 38% | 56 | Search DENIAL+OF+SERVICE | Search DENIAL+OF+SERVICE |
5 | DISTRIBUTED DENIAL OF SERVICE DDOS | 644104 | 3% | 69% | 22 | Search DISTRIBUTED+DENIAL+OF+SERVICE+DDOS | Search DISTRIBUTED+DENIAL+OF+SERVICE+DDOS |
6 | DISTRIBUTED DENIAL OF SERVICE | 614937 | 3% | 76% | 19 | Search DISTRIBUTED+DENIAL+OF+SERVICE | Search DISTRIBUTED+DENIAL+OF+SERVICE |
7 | DISTRIBUTED DENIAL OF SERVICE ATTACKS | 586062 | 2% | 81% | 17 | Search DISTRIBUTED+DENIAL+OF+SERVICE+ATTACKS | Search DISTRIBUTED+DENIAL+OF+SERVICE+ATTACKS |
8 | IP SPOOFING | 567804 | 3% | 67% | 20 | Search IP+SPOOFING | Search IP+SPOOFING |
9 | SYN FLOODING | 471724 | 2% | 92% | 12 | Search SYN+FLOODING | Search SYN+FLOODING |
10 | NETWORK SECURITY | 367370 | 12% | 10% | 86 | Search NETWORK+SECURITY | Search NETWORK+SECURITY |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | SINGH, K , SINGH, P , KUMAR, K , (2016) A SYSTEMATIC REVIEW OF IP TRACEBACK SCHEMES FOR DENIAL OF SERVICE ATTACKS.COMPUTERS & SECURITY. VOL. 56. ISSUE . P. 111 -139 | 34 | 81% | 0 |
2 | YU, S , ZHOU, WL , DOSS, R , JIA, WJ , (2011) TRACEBACK OF DDOS ATTACKS USING ENTROPY VARIATIONS.IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. VOL. 22. ISSUE 3. P. 412 -425 | 27 | 100% | 30 |
3 | LOUKAS, G , OKE, G , (2010) PROTECTION AGAINST DENIAL OF SERVICE ATTACKS: A SURVEY.COMPUTER JOURNAL. VOL. 53. ISSUE 7. P. 1020 -1037 | 38 | 69% | 22 |
4 | BHUYAN, MH , BHATTACHARYYA, DK , KALITA, JK , (2016) E-LDAT: A LIGHTWEIGHT SYSTEM FOR DDOS FLOODING ATTACK DETECTION AND IP TRACEBACK USING EXTENDED ENTROPY METRIC.SECURITY AND COMMUNICATION NETWORKS. VOL. 9. ISSUE 16. P. 3251 -3270 | 26 | 93% | 0 |
5 | ZARGAR, ST , JOSHI, J , TIPPER, D , (2013) A SURVEY OF DEFENSE MECHANISMS AGAINST DISTRIBUTED DENIAL OF SERVICE (DDOS) FLOODING ATTACKS.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 15. ISSUE 4. P. 2046 -2069 | 21 | 78% | 76 |
6 | BEITOLLAHI, H , DECONINCK, G , (2012) ANALYZING WELL-KNOWN COUNTERMEASURES AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS.COMPUTER COMMUNICATIONS. VOL. 35. ISSUE 11. P. 1312 -1332 | 25 | 81% | 21 |
7 | MURUGESAN, V , SHALINIE, M , NEETHIMANI, N , (2014) A BRIEF SURVEY OF IP TRACEBACK METHODOLOGIES.ACTA POLYTECHNICA HUNGARICA. VOL. 11. ISSUE 9. P. 197 -216 | 20 | 100% | 2 |
8 | KAHANI, N , FALLAH, MS , (2014) TDPF: A TRACEBACK-BASED DISTRIBUTED PACKET FILTER TO MITIGATE SPOOFED DDOS ATTACKS.SECURITY AND COMMUNICATION NETWORKS. VOL. 7. ISSUE 2. P. 245 -264 | 20 | 91% | 4 |
9 | HOQUE, N , BHATTACHARYYA, DK , KALITA, JK , (2015) BOTNET IN DDOS ATTACKS: TRENDS AND CHALLENGES.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 17. ISSUE 4. P. 2242 -2270 | 28 | 55% | 1 |
10 | BHUYAN, MH , KASHYAP, HJ , BHATTACHARYYA, DK , KALITA, JK , (2014) DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACKS: METHODS, TOOLS AND FUTURE DIRECTIONS.COMPUTER JOURNAL. VOL. 57. ISSUE 4. P. 537 -556 | 20 | 74% | 8 |
Classes with closest relation at Level 1 |