Class information for:
Level 1: ATTACK GRAPH//SECURITY METRICS//MTTSF

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
27112 237 29.0 26%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
27112 1                   ATTACK GRAPH//SECURITY METRICS//MTTSF 237

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ATTACK GRAPH authKW 979852 7% 45% 17
2 SECURITY METRICS authKW 488224 5% 32% 12
3 MTTSF authKW 386523 1% 100% 3
4 NETWORK HARDENING authKW 386523 1% 100% 3
5 EMC APPROACH authKW 257682 1% 100% 2
6 INFORMATION SECURITY EVALUATION authKW 257682 1% 100% 2
7 SPACE BORNE COMPUTING authKW 257682 1% 100% 2
8 INTRUSION TOLERANCE authKW 176868 4% 15% 9
9 NETWORK RISK authKW 171787 1% 67% 2
10 ACCIDENTAL FAULT authKW 128841 0% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 6669 43% 0% 103
2 Computer Science, Software Engineering 5167 34% 0% 81
3 Computer Science, Hardware & Architecture 3854 23% 0% 54
4 Computer Science, Theory & Methods 3631 34% 0% 81
5 Telecommunications 736 15% 0% 36
6 Computer Science, Artificial Intelligence 173 8% 0% 18
7 Engineering, Electrical & Electronic 133 16% 0% 38
8 Computer Science, Interdisciplinary Applications 78 5% 0% 13
9 Robotics 16 1% 0% 2
10 Engineering, General 16 3% 0% 6

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ADV CONTROL SIMULAT 128841 0% 100% 1
2 AREA CYBERSECUR DISTRIBUTED SYST 128841 0% 100% 1
3 AUTHENTICAT SERV 128841 0% 100% 1
4 CIVIL MANAGEMENT ENGN 128841 0% 100% 1
5 DEV DEPENDABLE COMP TECHNOL 128841 0% 100% 1
6 DPTO ENG COMP SIST DIGITAIS 128841 0% 100% 1
7 GT ARC 128841 0% 100% 1
8 INESCC SYST COMP ENGN COIMBRA PORTUGAL 128841 0% 100% 1
9 KETI 128841 0% 100% 1
10 PROJECT SYST 128841 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 68541 7% 3% 16
2 IEEE SECURITY & PRIVACY 20367 4% 2% 10
3 COMPUTERS & SECURITY 8730 4% 1% 9
4 JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT 7434 2% 1% 4
5 INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 3704 1% 1% 2
6 IET INFORMATION SECURITY 3595 1% 1% 3
7 LECTURE NOTES IN COMPUTER SCIENCE 2532 18% 0% 42
8 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 1876 2% 0% 5
9 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 1792 1% 1% 2
10 JOURNAL OF SUPERCOMPUTING 1508 2% 0% 5

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 ATTACK GRAPH 979852 7% 45% 17 Search ATTACK+GRAPH Search ATTACK+GRAPH
2 SECURITY METRICS 488224 5% 32% 12 Search SECURITY+METRICS Search SECURITY+METRICS
3 MTTSF 386523 1% 100% 3 Search MTTSF Search MTTSF
4 NETWORK HARDENING 386523 1% 100% 3 Search NETWORK+HARDENING Search NETWORK+HARDENING
5 EMC APPROACH 257682 1% 100% 2 Search EMC+APPROACH Search EMC+APPROACH
6 INFORMATION SECURITY EVALUATION 257682 1% 100% 2 Search INFORMATION+SECURITY+EVALUATION Search INFORMATION+SECURITY+EVALUATION
7 SPACE BORNE COMPUTING 257682 1% 100% 2 Search SPACE+BORNE+COMPUTING Search SPACE+BORNE+COMPUTING
8 INTRUSION TOLERANCE 176868 4% 15% 9 Search INTRUSION+TOLERANCE Search INTRUSION+TOLERANCE
9 NETWORK RISK 171787 1% 67% 2 Search NETWORK+RISK Search NETWORK+RISK
10 ACCIDENTAL FAULT 128841 0% 100% 1 Search ACCIDENTAL+FAULT Search ACCIDENTAL+FAULT

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 DOHI, T , UEMURA, T , (2012) AN ADAPTIVE MODE CONTROL ALGORITHM OF A SCALABLE INTRUSION TOLERANT ARCHITECTURE.JOURNAL OF COMPUTER AND SYSTEM SCIENCES. VOL. 78. ISSUE 6. P. 1751 -1774 8 89% 3
2 HARATY, RA , ZBIB, M , MASUD, M , (2016) DATA DAMAGE ASSESSMENT AND RECOVERY ALGORITHM FROM MALICIOUS ATTACKS IN HEALTHCARE DATA SHARING SYSTEMS.PEER-TO-PEER NETWORKING AND APPLICATIONS. VOL. 9. ISSUE 5. P. 812 -823 5 100% 0
3 BOPCHE, GS , MEHTRE, BM , (2017) GRAPH SIMILARITY METRICS FOR ASSESSING TEMPORAL CHANGES IN ATTACK SURFACE OF DYNAMIC NETWORKS.COMPUTERS & SECURITY. VOL. 64. ISSUE . P. 16 -43 9 50% 0
4 WANG, LY , JAJODIA, S , SINGHAL, A , CHENG, PS , NOEL, S , (2014) K-ZERO DAY SAFETY: A NETWORK SECURITY METRIC FOR MEASURING THE RISK OF UNKNOWN VULNERABILITIES.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 11. ISSUE 1. P. 30-44 6 67% 16
5 BARIK, MS , SENGUPTA, A , MAZUMDAR, C , (2016) ATTACK GRAPH GENERATION AND ANALYSIS TECHNIQUES.DEFENCE SCIENCE JOURNAL. VOL. 66. ISSUE 6. P. 559 -567 5 83% 0
6 UEMURA, T , DOHI, T , KAIO, N , (2010) AVAILABILITY ANALYSIS OF AN INTRUSION TOLERANT DISTRIBUTED SERVER SYSTEM WITH PREVENTIVE MAINTENANCE.IEEE TRANSACTIONS ON RELIABILITY. VOL. 59. ISSUE 1. P. 18 -29 6 75% 3
7 UEMURA, T , DOHI, T , KAIO, N , (2010) DEPENDABILITY ANALYSIS OF A SCALABLE INTRUSION TOLERANT ARCHITECTURE WITH TWO DETECTION MODES.JOURNAL OF INTERNET TECHNOLOGY. VOL. 11. ISSUE 2. P. 289 -298 6 75% 1
8 ALMOHRI, HMJ , WATSON, LT , YAO, DF , OU, XM , (2016) SECURITY OPTIMIZATION OF DYNAMIC NETWORKS WITH PROBABILISTIC GRAPH MODELING AND LINEAR PROGRAMMING.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 13. ISSUE 4. P. 474 -487 5 71% 0
9 WINDELBERG, M , (2016) OBJECTIVES FOR MANAGING CYBER SUPPLY CHAIN RISK.INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION. VOL. 12. ISSUE . P. 4 -11 4 80% 1
10 HOLM, H , SHAHZAD, K , BUSCHLE, M , EKSTEDT, M , (2015) (PCYSEMOL)-CY-2: PREDICTIVE, PROBABILISTIC CYBER SECURITY MODELING LANGUAGE.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 12. ISSUE 6. P. 626 -639 6 55% 1

Classes with closest relation at Level 1



Rank Class id link
1 7457 INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION
2 13742 CYBER SECURITY//SMART GRID//FALSE DATA INJECTION ATTACK
3 36973 IT SECURITY DEVELOPMENT//E ENABLED AIRCRAFT//REGRESSION BENCHMARKING
4 30550 RUNTIME VERIFICATION//RUNTIME MONITORING//EXECUTION BASED MODEL CHECKING
5 37550 44 BSD CONS//CONNECTION ORIENTED NETWORK SERVICE//DIPARTIMENTO ELETTRON INTELIGNEZA ARTIFICIALE T
6 34931 BALTIC CYBER SHIELD//BLUE TEAM//COMPUTER ASSISTED SURVEY
7 8401 COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT
8 14472 SOFTWARE FAULT TOLERANCE//N VERSION PROGRAMMING//EXCEPTION HANDLING
9 11246 REQUIREMENTS ENGINEERING//USE CASES//GOAL MODELING
10 27036 SOFTWARE AGING//SOFTWARE REJUVENATION//INFINITE SERVER QUEUEING MODEL

Go to start page