Class information for:
Level 1: 72 BIT KEY//ABNORMAL MALICIOUS CODE//ABNORMAL NETWORK CONNECTION

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
29225 190 18.7 21%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
29225 1                   72 BIT KEY//ABNORMAL MALICIOUS CODE//ABNORMAL NETWORK CONNECTION 190

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 72 BIT KEY authKW 160713 1% 100% 1
2 ABNORMAL MALICIOUS CODE authKW 160713 1% 100% 1
3 ABNORMAL NETWORK CONNECTION authKW 160713 1% 100% 1
4 ABUSE OF PROTOCOLS authKW 160713 1% 100% 1
5 ACCESS CONTROL TECHNIQUES authKW 160713 1% 100% 1
6 ACCESS CONTROL TO NETWORK RESOURCES authKW 160713 1% 100% 1
7 ADAPTIVE RULE AND RULE GENERATION authKW 160713 1% 100% 1
8 AEGEAN UNIT address 160713 1% 100% 1
9 ASYMMETRIC PUBLIC KEY SYSTEM authKW 160713 1% 100% 1
10 AUTOMATED FIREWALL MANAGEMENT authKW 160713 1% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Hardware & Architecture 5980 32% 0% 60
2 COMPUTER APPLICATIONS & CYBERNETICS 3922 4% 0% 8
3 Computer Science, Software Engineering 2239 25% 0% 48
4 Computer Science, Information Systems 1278 22% 0% 41
5 Computer Science, Theory & Methods 1248 23% 0% 43
6 Telecommunications 1104 21% 0% 39
7 Multidisciplinary Sciences 249 6% 0% 12
8 Information Science & Library Science 156 5% 0% 9
9 Criminology & Penology 114 3% 0% 5
10 Law 44 3% 0% 6

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 AEGEAN UNIT 160713 1% 100% 1
2 DEC INCLUDED DEV PROJECTS 160713 1% 100% 1
3 GRP DEVELOPING TOPS 20 160713 1% 100% 1
4 SALFORD LAW 160713 1% 100% 1
5 SECUR PRACTICE 160713 1% 100% 1
6 COMP NETWORK SECUR 80355 1% 50% 1
7 INFORMAT TECHNOL OPERAT 40177 1% 25% 1
8 SERV DIDATT SCI 40177 1% 25% 1
9 SUN MICROSYST S 32141 1% 20% 1
10 DIPARTIMENTO INFORMAT RM C OCELLI 26784 1% 17% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 AT&T TECHNICAL JOURNAL 125401 11% 4% 21
2 INFORMATION AGE 27060 2% 4% 4
3 ABACUS-NEW YORK 14282 1% 4% 2
4 AMERICAN SCIENTIST 13389 6% 1% 11
5 COMMUNICATIONS OF THE ACM 9785 8% 0% 16
6 IEEE SECURITY & PRIVACY 9143 3% 1% 6
7 COMPUTERS & SECURITY 8606 4% 1% 8
8 COMPUTER DECISIONS 7559 1% 2% 2
9 AT&T BELL LABORATORIES TECHNICAL JOURNAL 7139 1% 2% 2
10 INTERFACES IN COMPUTING 4725 1% 3% 1

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 72 BIT KEY 160713 1% 100% 1 Search 72+BIT+KEY Search 72+BIT+KEY
2 ABNORMAL MALICIOUS CODE 160713 1% 100% 1 Search ABNORMAL+MALICIOUS+CODE Search ABNORMAL+MALICIOUS+CODE
3 ABNORMAL NETWORK CONNECTION 160713 1% 100% 1 Search ABNORMAL+NETWORK+CONNECTION Search ABNORMAL+NETWORK+CONNECTION
4 ABUSE OF PROTOCOLS 160713 1% 100% 1 Search ABUSE+OF+PROTOCOLS Search ABUSE+OF+PROTOCOLS
5 ACCESS CONTROL TECHNIQUES 160713 1% 100% 1 Search ACCESS+CONTROL+TECHNIQUES Search ACCESS+CONTROL+TECHNIQUES
6 ACCESS CONTROL TO NETWORK RESOURCES 160713 1% 100% 1 Search ACCESS+CONTROL+TO+NETWORK+RESOURCES Search ACCESS+CONTROL+TO+NETWORK+RESOURCES
7 ADAPTIVE RULE AND RULE GENERATION 160713 1% 100% 1 Search ADAPTIVE+RULE+AND+RULE+GENERATION Search ADAPTIVE+RULE+AND+RULE+GENERATION
8 ASYMMETRIC PUBLIC KEY SYSTEM 160713 1% 100% 1 Search ASYMMETRIC+PUBLIC+KEY+SYSTEM Search ASYMMETRIC+PUBLIC+KEY+SYSTEM
9 AUTOMATED FIREWALL MANAGEMENT 160713 1% 100% 1 Search AUTOMATED+FIREWALL+MANAGEMENT Search AUTOMATED+FIREWALL+MANAGEMENT
10 BIOMETRICS TECHNOLOGIES 160713 1% 100% 1 Search BIOMETRICS+TECHNOLOGIES Search BIOMETRICS+TECHNOLOGIES

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 REYNOLDS, JK , (1991) THE HELMINTHIASIS OF THE INTERNET.COMPUTER NETWORKS AND ISDN SYSTEMS. VOL. 22. ISSUE 5. P. 347-361 17 74% 1
2 ANDREASSEN, AL , LEIGHTON, WJ , SCHREIBER, DF , (1988) INFORMATION SECURITY - AN OVERVIEW.AT&T TECHNICAL JOURNAL. VOL. 67. ISSUE 3. P. 2-8 7 100% 1
3 PALMIERI, F , FIORE, U , (2008) CONTAINING LARGE-SCALE WORM SPREADING IN THE INTERNET BY COOPERATIVE DISTRIBUTION OF TRAFFIC FILTERING POLICIES.COMPUTERS & SECURITY. VOL. 27. ISSUE 1-2. P. 48-62 3 100% 1
4 BEST, PJ , MOHAY, G , ANDERSON, A , (1997) MIATA: A MACHINE-INDEPENDENT AUDIT TRAIL ANALYSER.AUSTRALIAN COMPUTER JOURNAL. VOL. 29. ISSUE 2. P. 57-63 5 83% 1
5 BROOKS, TA , KAPLAN, MM , (1994) SECURITY TECHNOLOGIES.AT&T TECHNICAL JOURNAL. VOL. 73. ISSUE 5. P. 4-8 6 75% 1
6 CROAK, MR , (1994) EMERGING TECHNOLOGIES AND THE MESSAGING MARKET.AT&T TECHNICAL JOURNAL. VOL. 73. ISSUE 3. P. 4-6 5 83% 0
7 VAUGHN, RB , (2003) ADVANCES IN THE PROVISION OF SYSTEM AND SOFTWARE SECURITY - THIRTY YEARS OF PROGRESS.ADVANCES IN COMPUTERS, VOL 58. VOL. 58. ISSUE . P. 287-340 3 100% 0
8 OPPLIGER, R , (1997) INTERNET SECURITY: FIREWALLS AND BEYOND.COMMUNICATIONS OF THE ACM. VOL. 40. ISSUE 5. P. 92-102 3 100% 30
9 LABUSCHAGNE, L , ELOFF, JHP , (1998) THE USE OF REAL-TIME RISK ANALYSIS TO ENABLE DYNAMIC ACTIVATION OF COUNTERMEASURES.COMPUTERS & SECURITY. VOL. 17. ISSUE 4. P. 347-357 3 100% 1
10 LANDSBERG, GL , (1991) COMPUTER VIRUSES AND SOME METHOD OF THEIR DISARMING.USPEKHI FIZICHESKIKH NAUK. VOL. 161. ISSUE 2. P. 161-191 4 100% 0

Classes with closest relation at Level 1



Rank Class id link
1 34697 SOCIAL NETWORK SECURITY//INTERACTION ORIENTED//SOCIAL BOT
2 36534 FUNCT TERMINAL CIRCUITS GRP//DATA NETWORK EXPLORATORY DEV//DIGITAL TRANSMISS D5 CHANNEL UNITS GRP
3 32918 EVOLUTION OF FOSS SYSTEMS//HOGG HUBERMAN MODEL//LINUX DISTRIBUTIONS
4 37532 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
5 8401 COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT
6 20229 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
7 34292 COUNTER FRAUD STUDIES//MASS MARKETING FRAUD//HACKERS
8 28772 AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR
9 35804 SOFTWARE ENGN REAL TIME GRP//DISTRIBUTION MIDDLEWARE//ARINC 653
10 34179 INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY//ADOPTED RISK//BUDDHISM AND TIBET

Go to start page