Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
20701 | 449 | 30.3 | 23% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | INFORMATION FLOW CONTROL | authKW | 1148743 | 6% | 68% | 25 |
2 | BYTECODE VERIFICATION | authKW | 957997 | 4% | 78% | 18 |
3 | LANGUAGE BASED SECURITY | authKW | 756932 | 4% | 70% | 16 |
4 | PREVENT INFORMATION LEAKAGE | authKW | 612059 | 2% | 100% | 9 |
5 | DECLASSIFICATION | authKW | 514292 | 2% | 69% | 11 |
6 | RUNTIME ENFORCEMENT | authKW | 500772 | 2% | 82% | 9 |
7 | QUANTITATIVE INFORMATION FLOW | authKW | 476046 | 2% | 100% | 7 |
8 | NON INTERFERENCE | authKW | 348172 | 4% | 32% | 16 |
9 | EDIT AUTOMATA | authKW | 340033 | 1% | 100% | 5 |
10 | STACK INSPECTION | authKW | 310880 | 2% | 57% | 8 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Software Engineering | 26504 | 56% | 0% | 251 |
2 | Computer Science, Theory & Methods | 12167 | 45% | 0% | 203 |
3 | Computer Science, Information Systems | 2775 | 21% | 0% | 93 |
4 | Logic | 1156 | 4% | 0% | 16 |
5 | Computer Science, Artificial Intelligence | 656 | 10% | 0% | 47 |
6 | Computer Science, Hardware & Architecture | 546 | 6% | 0% | 29 |
7 | Telecommunications | 64 | 4% | 0% | 17 |
8 | Engineering, Electrical & Electronic | 7 | 5% | 0% | 23 |
9 | Mathematics, Applied | 4 | 3% | 0% | 12 |
10 | Engineering, General | 1 | 1% | 0% | 4 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SMART CARDS | 136013 | 0% | 100% | 2 |
2 | CITI NOVA COMP SCI INFORMAT | 68007 | 0% | 100% | 1 |
3 | CNRS MATH INFORMAT | 68007 | 0% | 100% | 1 |
4 | COMPUTER SECUR | 68007 | 0% | 100% | 1 |
5 | CYRIX DESKTOP SOFTWARE GRP | 68007 | 0% | 100% | 1 |
6 | D SE S 395 | 68007 | 0% | 100% | 1 |
7 | DIBRIS AI | 68007 | 0% | 100% | 1 |
8 | DIPSAT | 68007 | 0% | 100% | 1 |
9 | GIE DYADE | 68007 | 0% | 100% | 1 |
10 | INDES PROJECT | 68007 | 0% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ACM SIGPLAN NOTICES | 48957 | 13% | 1% | 59 |
2 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 23013 | 2% | 4% | 8 |
3 | INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING | 20922 | 0% | 15% | 2 |
4 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 19176 | 2% | 3% | 9 |
5 | ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS | 18689 | 4% | 2% | 16 |
6 | JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING | 16625 | 2% | 3% | 9 |
7 | JOURNAL OF FUNCTIONAL PROGRAMMING | 13586 | 2% | 3% | 8 |
8 | MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE | 12934 | 2% | 2% | 10 |
9 | LECTURE NOTES IN COMPUTER SCIENCE | 9423 | 25% | 0% | 111 |
10 | COMPUTER LANGUAGES SYSTEMS & STRUCTURES | 7718 | 1% | 2% | 5 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | INFORMATION FLOW CONTROL | 1148743 | 6% | 68% | 25 | Search INFORMATION+FLOW+CONTROL | Search INFORMATION+FLOW+CONTROL |
2 | BYTECODE VERIFICATION | 957997 | 4% | 78% | 18 | Search BYTECODE+VERIFICATION | Search BYTECODE+VERIFICATION |
3 | LANGUAGE BASED SECURITY | 756932 | 4% | 70% | 16 | Search LANGUAGE+BASED+SECURITY | Search LANGUAGE+BASED+SECURITY |
4 | PREVENT INFORMATION LEAKAGE | 612059 | 2% | 100% | 9 | Search PREVENT+INFORMATION+LEAKAGE | Search PREVENT+INFORMATION+LEAKAGE |
5 | DECLASSIFICATION | 514292 | 2% | 69% | 11 | Search DECLASSIFICATION | Search DECLASSIFICATION |
6 | RUNTIME ENFORCEMENT | 500772 | 2% | 82% | 9 | Search RUNTIME+ENFORCEMENT | Search RUNTIME+ENFORCEMENT |
7 | QUANTITATIVE INFORMATION FLOW | 476046 | 2% | 100% | 7 | Search QUANTITATIVE+INFORMATION+FLOW | Search QUANTITATIVE+INFORMATION+FLOW |
8 | NON INTERFERENCE | 348172 | 4% | 32% | 16 | Search NON+INTERFERENCE | Search NON+INTERFERENCE |
9 | EDIT AUTOMATA | 340033 | 1% | 100% | 5 | Search EDIT+AUTOMATA | Search EDIT+AUTOMATA |
10 | STACK INSPECTION | 310880 | 2% | 57% | 8 | Search STACK+INSPECTION | Search STACK+INSPECTION |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | DE FRANCESCO, N , MARTINI, L , (2007) INSTRUCTION-LEVEL SECURITY ANALYSIS FOR INFORMATION FLOW IN STACK-BASED ASSEMBLY LANGUAGES.INFORMATION AND COMPUTATION. VOL. 205. ISSUE 9. P. 1334 -1370 | 17 | 94% | 0 |
2 | LEROY, X , (2003) JAVA BYTECODE VERIFICATION: ALGORITHMS AND FORMALIZATIONS.JOURNAL OF AUTOMATED REASONING. VOL. 30. ISSUE 3-4. P. 235-269 | 11 | 100% | 50 |
3 | BARTHE, G , PICHARDIE, D , REZK, T , (2013) A CERTIFIED LIGHTWEIGHT NON-INTERFERENCE JAVA BYTECODE VERIFIER.MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE. VOL. 23. ISSUE 5. P. 1032 -1081 | 11 | 79% | 4 |
4 | DE FRANCESCO, N , MARTINI, L , (2007) INSTRUCTION-LEVEL SECURITY TYPING BY ABSTRACT INTERPRETATION.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 6. ISSUE 2-3. P. 85-106 | 10 | 100% | 1 |
5 | BARBUTI, R , DE FRANCESCO, N , TESEI, L , (2010) AN ABSTRACT INTERPRETATION APPROACH FOR ENHANCING THE JAVA BYTECODE VERIFIER.COMPUTER JOURNAL. VOL. 53. ISSUE 6. P. 679 -700 | 10 | 91% | 0 |
6 | COGLIO, A , (2003) IMPROVING THE OFFICIAL SPECIFICATION OF JAVA BYTECODE VERIFICATION.CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE. VOL. 15. ISSUE 2. P. 155 -179 | 11 | 92% | 3 |
7 | CHOU, SC , (2007) MANAGING USER ASSOCIATIONS AND THE FACTORS OF LAWS AND CULTURES IN AN INFORMATION FLOW CONTROL MODEL FOR OBJECT-ORIENTED SYSTEMS.JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. VOL. 23. ISSUE 3. P. 945 -957 | 9 | 100% | 0 |
8 | DAM, M , JACOBS, B , LUNDBLAD, A , PIESSENS, F , (2015) SECURITY MONITOR INLINING AND CERTIFICATION FOR MULTITHREADED JAVA.MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE. VOL. 25. ISSUE 3. P. 528 -565 | 9 | 82% | 0 |
9 | CHOU, SC , LO, WK , LAI, CW , (2006) INFORMATION FLOW CONTROL IN MULTITHREAD APPLICATIONS BASED ON ACCESS CONTROL LISTS.INFORMATION AND SOFTWARE TECHNOLOGY. VOL. 48. ISSUE 8. P. 717 -725 | 9 | 100% | 1 |
10 | BERNARDESCHI, C , DE FRANCESCO, N , LETTIERI, G , MARTINI, L , MASCI, P , (2008) DECOMPOSING BYTECODE VERIFICATION BY ABSTRACT INTERPRETATION.ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS. VOL. 31. ISSUE 1. P. - | 13 | 65% | 1 |
Classes with closest relation at Level 1 |