Class information for:
Level 1: SQL INJECTION ATTACK//SQL INJECTION//SOFTWARE FAULT ISOLATION

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
25529 279 30.8 22%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
25529 1                   SQL INJECTION ATTACK//SQL INJECTION//SOFTWARE FAULT ISOLATION 279

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SQL INJECTION ATTACK authKW 456021 2% 83% 5
2 SQL INJECTION authKW 437778 2% 67% 6
3 SOFTWARE FAULT ISOLATION authKW 350224 1% 80% 4
4 MEMORY SAFETY authKW 335169 3% 44% 7
5 FINITE HOMOGENEOUS MARKOV CHAIN authKW 328336 1% 100% 3
6 PROBABILISTIC MEMORY SAFETY authKW 328336 1% 100% 3
7 WEB APPLICATION SECURITY authKW 304011 2% 56% 5
8 BUFFER OVERFLOWS authKW 250157 1% 57% 4
9 APPLICATION LOGIC VULNERABILITY authKW 218891 1% 100% 2
10 AUTOMATIC POOL ALLOCATION authKW 218891 1% 100% 2

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Software Engineering 16690 56% 0% 157
2 Computer Science, Hardware & Architecture 4895 24% 0% 66
3 Computer Science, Information Systems 3111 28% 0% 77
4 Computer Science, Theory & Methods 2008 24% 0% 66
5 Engineering, Electrical & Electronic 205 18% 0% 50
6 Telecommunications 137 6% 0% 18
7 Computer Science, Artificial Intelligence 80 5% 0% 14
8 Computer Science, Interdisciplinary Applications 74 5% 0% 14
9 Medical Informatics 6 1% 0% 2
10 Statistics & Probability 4 1% 0% 4

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 BIT BLAZE GRP 109445 0% 100% 1
2 CIENCIA COMP DCC 109445 0% 100% 1
3 DISRINET GRP 109445 0% 100% 1
4 EDUC INFORMAT ASSURANCE SECUR CERIAS 109445 0% 100% 1
5 ENGD SYST ENGN 109445 0% 100% 1
6 FRAUD MANAGEMENT 109445 0% 100% 1
7 IBM AFRICA 109445 0% 100% 1
8 JACQUARD GRP 109445 0% 100% 1
9 NETWORK SECUR INFORMAT 109445 0% 100% 1
10 NETWORK SYST SECUR GRP 109445 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACM SIGPLAN NOTICES 29332 13% 1% 36
2 IEEE SECURITY & PRIVACY 17298 4% 2% 10
3 SOFTWARE-PRACTICE & EXPERIENCE 15009 6% 1% 18
4 COMPUTERS & SECURITY 13187 4% 1% 12
5 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 8179 2% 1% 6
6 ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2526 1% 1% 4
7 ACM TRANSACTIONS ON INTERNET TECHNOLOGY 2442 1% 1% 2
8 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2312 1% 1% 2
9 ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS 2311 1% 1% 4
10 ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1875 1% 0% 4

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 SQL INJECTION ATTACK 456021 2% 83% 5 Search SQL+INJECTION+ATTACK Search SQL+INJECTION+ATTACK
2 SQL INJECTION 437778 2% 67% 6 Search SQL+INJECTION Search SQL+INJECTION
3 SOFTWARE FAULT ISOLATION 350224 1% 80% 4 Search SOFTWARE+FAULT+ISOLATION Search SOFTWARE+FAULT+ISOLATION
4 MEMORY SAFETY 335169 3% 44% 7 Search MEMORY+SAFETY Search MEMORY+SAFETY
5 FINITE HOMOGENEOUS MARKOV CHAIN 328336 1% 100% 3 Search FINITE+HOMOGENEOUS+MARKOV+CHAIN Search FINITE+HOMOGENEOUS+MARKOV+CHAIN
6 PROBABILISTIC MEMORY SAFETY 328336 1% 100% 3 Search PROBABILISTIC+MEMORY+SAFETY Search PROBABILISTIC+MEMORY+SAFETY
7 WEB APPLICATION SECURITY 304011 2% 56% 5 Search WEB+APPLICATION+SECURITY Search WEB+APPLICATION+SECURITY
8 BUFFER OVERFLOWS 250157 1% 57% 4 Search BUFFER+OVERFLOWS Search BUFFER+OVERFLOWS
9 APPLICATION LOGIC VULNERABILITY 218891 1% 100% 2 Search APPLICATION+LOGIC+VULNERABILITY Search APPLICATION+LOGIC+VULNERABILITY
10 AUTOMATIC POOL ALLOCATION 218891 1% 100% 2 Search AUTOMATIC+POOL+ALLOCATION Search AUTOMATIC+POOL+ALLOCATION

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 DEEPA, G , THILAGAM, PS , (2016) SECURING WEB APPLICATIONS FROM INJECTION AND LOGIC VULNERABILITIES: APPROACHES AND CHALLENGES.INFORMATION AND SOFTWARE TECHNOLOGY. VOL. 74. ISSUE . P. 160 -180 11 58% 0
2 PALSETIA, N , DEEPA, G , KHAN, FA , THILAGAM, PS , PAIS, AR , (2016) SECURING NATIVE XML DATABASE-DRIVEN WEB APPLICATIONS FROM XQUERY INJECTION VULNERABILITIES.JOURNAL OF SYSTEMS AND SOFTWARE. VOL. 122. ISSUE . P. 93 -109 9 69% 0
3 SAINI, A , GAUR, MS , LAXMI, V , CONTI, M , (2016) COLLUDING BROWSER EXTENSION ATTACK ON USER PRIVACY AND ITS IMPLICATION FOR WEB BROWSERS.COMPUTERS & SECURITY. VOL. 63. ISSUE . P. 14 -28 6 100% 0
4 NAGARAKATTE, S , MARTIN, MMK , ZDANCEWIC, S , (2013) HARDWARE-ENFORCED COMPREHENSIVE MEMORY SAFETY.IEEE MICRO. VOL. 33. ISSUE 3. P. 38 -47 6 100% 3
5 SHAR, LK , TAN, HBK , (2013) DEFEATING SQL INJECTION.COMPUTER. VOL. 46. ISSUE 3. P. 69-77 5 100% 10
6 KAYAALP, M , OZSOY, M , ABU GHAZALEH, N , PONOMAREV, D , (2014) EFFICIENTLY SECURING SYSTEMS FROM CODE REUSE ATTACKS.IEEE TRANSACTIONS ON COMPUTERS. VOL. 63. ISSUE 5. P. 1144 -1156 5 100% 1
7 BARUA, RK , SIMPSON, MS , (2013) MEMSAFE: ENSURING THE SPATIAL AND TEMPORAL MEMORY SAFETY OF C?AT RUNTIME.SOFTWARE-PRACTICE & EXPERIENCE. VOL. 43. ISSUE 1. P. 93 -128 8 44% 10
8 LI, XW , XUE, Y , (2014) A SURVEY ON SERVER-SIDE APPROACHES TO SECURING WEB APPLICATIONS.ACM COMPUTING SURVEYS. VOL. 46. ISSUE 4. P. - 5 71% 3
9 DELOZIER, C , EISENBERG, R , NAGARAKATTE, S , OSERA, PM , MARTIN, MMK , ZDANCEWIC, S , (2013) IRONCLAD C PLUS PLUS A LIBRARY-AUGMENTED TYPE-SAFE SUBSET OF C PLUS.ACM SIGPLAN NOTICES. VOL. 48. ISSUE 10. P. 287-304 5 71% 0
10 AGAPIE, A , ANDREICA, A , CHIRA, C , GIUCLEA, M , (2014) PREDICTABILITY IN CELLULAR AUTOMATA.PLOS ONE. VOL. 9. ISSUE 10. P. - 4 80% 0

Classes with closest relation at Level 1



Rank Class id link
1 23300 RETURN ORIENTED PROGRAMMING//DEVICE DRIVERS//HYPERVISORS
2 12130 POINTER ANALYSIS//POINTS TO ANALYSIS//PARTIAL REDUNDANCY ELIMINATION
3 21011 MALWARE DETECTION//MALWARE//ANDROID SECURITY
4 15574 PROGRAM SLICING//PROGRAM DEPENDENCE GRAPH//DYNAMIC SLICING
5 20701 INFORMATION FLOW CONTROL//BYTECODE VERIFICATION//LANGUAGE BASED SECURITY
6 36388 IMSI CATCHER//ADMINISTRATION TOOLS//APPLICATION FIREWALLS
7 7457 INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION
8 20229 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
9 37039 SECT PL ELECT//AUTONOMOUS SYSTEM SECURITY//BIOMETRIC PROTOCOLS
10 10164 GARBAGE COLLECTION//ACM SIGPLAN NOTICES//MEMORY MANAGEMENT

Go to start page