Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
30058 | 175 | 31.8 | 28% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | USER BEHAVIOR SIMILARITY | authKW | 348977 | 1% | 100% | 2 |
2 | LOCATION PROXIMITY | authKW | 232650 | 1% | 67% | 2 |
3 | WEB BASED SOCIAL NETWORKS | authKW | 224339 | 2% | 43% | 3 |
4 | 4V CHALLENGES | authKW | 174488 | 1% | 100% | 1 |
5 | ACADEMIC SEARCH CLOUD | authKW | 174488 | 1% | 100% | 1 |
6 | ACTIVE TIME RANGE | authKW | 174488 | 1% | 100% | 1 |
7 | ADV DATA ENGN | address | 174488 | 1% | 100% | 1 |
8 | ANONYMOUS MEMBER | authKW | 174488 | 1% | 100% | 1 |
9 | AUTOMATED PSEUDONYM CHANGE | authKW | 174488 | 1% | 100% | 1 |
10 | BURST EVENTS | authKW | 174488 | 1% | 100% | 1 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 5880 | 47% | 0% | 83 |
2 | Computer Science, Software Engineering | 1596 | 22% | 0% | 39 |
3 | Information Science & Library Science | 1082 | 13% | 0% | 22 |
4 | Telecommunications | 1081 | 21% | 0% | 37 |
5 | Computer Science, Hardware & Architecture | 928 | 13% | 0% | 23 |
6 | Computer Science, Theory & Methods | 518 | 15% | 0% | 27 |
7 | Computer Science, Artificial Intelligence | 308 | 11% | 0% | 20 |
8 | Engineering, Electrical & Electronic | 215 | 22% | 0% | 39 |
9 | Computer Science, Cybernetics | 53 | 2% | 0% | 3 |
10 | Ergonomics | 53 | 2% | 0% | 3 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ADV DATA ENGN | 174488 | 1% | 100% | 1 |
2 | CYBER SECUR THE HAGUE CSA | 174488 | 1% | 100% | 1 |
3 | E COMMERCE PLICAT | 174488 | 1% | 100% | 1 |
4 | FTW TELECOMMUN VIENNA | 174488 | 1% | 100% | 1 |
5 | INFORMAT COMP SECUR ARCHITECTU GRP ICSA | 174488 | 1% | 100% | 1 |
6 | INFORMAT FORUM 2 12 | 174488 | 1% | 100% | 1 |
7 | INSITUTE SERV ENGN | 174488 | 1% | 100% | 1 |
8 | IST SCI TECHNOL INFORMAZ A FAEDO | 174488 | 1% | 100% | 1 |
9 | IT ERS | 174488 | 1% | 100% | 1 |
10 | KENAN SCI LIB | 174488 | 1% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | COMPUTERS & SECURITY | 14606 | 6% | 1% | 10 |
2 | PEER-TO-PEER NETWORKING AND APPLICATIONS | 10923 | 3% | 1% | 5 |
3 | IEEE INTERNET COMPUTING | 9140 | 4% | 1% | 7 |
4 | IEEE SECURITY & PRIVACY | 6892 | 3% | 1% | 5 |
5 | ECONTENT | 6643 | 1% | 2% | 2 |
6 | ACM TRANSACTIONS ON THE WEB | 3650 | 1% | 1% | 2 |
7 | ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA | 3140 | 1% | 1% | 2 |
8 | TSINGHUA SCIENCE AND TECHNOLOGY | 2810 | 1% | 1% | 2 |
9 | JOURNAL OF ACADEMIC LIBRARIANSHIP | 2642 | 3% | 0% | 5 |
10 | JOURNAL OF WEB SEMANTICS | 2073 | 1% | 1% | 2 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | USER BEHAVIOR SIMILARITY | 348977 | 1% | 100% | 2 | Search USER+BEHAVIOR+SIMILARITY | Search USER+BEHAVIOR+SIMILARITY |
2 | LOCATION PROXIMITY | 232650 | 1% | 67% | 2 | Search LOCATION+PROXIMITY | Search LOCATION+PROXIMITY |
3 | WEB BASED SOCIAL NETWORKS | 224339 | 2% | 43% | 3 | Search WEB+BASED+SOCIAL+NETWORKS | Search WEB+BASED+SOCIAL+NETWORKS |
4 | 4V CHALLENGES | 174488 | 1% | 100% | 1 | Search 4V+CHALLENGES | Search 4V+CHALLENGES |
5 | ACADEMIC SEARCH CLOUD | 174488 | 1% | 100% | 1 | Search ACADEMIC+SEARCH+CLOUD | Search ACADEMIC+SEARCH+CLOUD |
6 | ACTIVE TIME RANGE | 174488 | 1% | 100% | 1 | Search ACTIVE+TIME+RANGE | Search ACTIVE+TIME+RANGE |
7 | ANONYMOUS MEMBER | 174488 | 1% | 100% | 1 | Search ANONYMOUS+MEMBER | Search ANONYMOUS+MEMBER |
8 | AUTOMATED PSEUDONYM CHANGE | 174488 | 1% | 100% | 1 | Search AUTOMATED+PSEUDONYM+CHANGE | Search AUTOMATED+PSEUDONYM+CHANGE |
9 | BURST EVENTS | 174488 | 1% | 100% | 1 | Search BURST+EVENTS | Search BURST+EVENTS |
10 | BUYER PROFILING | 174488 | 1% | 100% | 1 | Search BUYER+PROFILING | Search BUYER+PROFILING |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | CHENG, Y , PARK, J , SANDHU, R , (2016) AN ACCESS CONTROL MODEL FOR ONLINE SOCIAL NETWORKS USING USER-TO-USER RELATIONSHIPS.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 13. ISSUE 4. P. 424 -436 | 6 | 86% | 0 |
2 | SUCH, JM , CRIADO, N , (2016) RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING. VOL. 28. ISSUE 7. P. 1851 -1863 | 7 | 70% | 0 |
3 | KOKCIYAN, N , YOLUM, P , (2016) PRIGUARD: A SEMANTIC APPROACH TO DETECT PRIVACY VIOLATIONS IN ONLINE SOCIAL NETWORKS.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING. VOL. 28. ISSUE 10. P. 2724 -2737 | 7 | 70% | 0 |
4 | RANJBAR, A , MAHESWARAN, M , (2014) USING COMMUNITY STRUCTURE TO CONTROL INFORMATION SHARING IN ONLINE SOCIAL NETWORKS.COMPUTER COMMUNICATIONS. VOL. 41. ISSUE . P. 11 -21 | 4 | 100% | 5 |
5 | PALOMAR, E , GONZALEZ-MANZANO, L , ALCAIDE, A , GALAN, A , (2016) IMPLEMENTING A PRIVACY-ENHANCED ATTRIBUTE-BASED CREDENTIAL SYSTEM FOR ONLINE SOCIAL NETWORKS WITH CO-OWNERSHIP MANAGEMENT.IET INFORMATION SECURITY. VOL. 10. ISSUE 2. P. 60 -68 | 6 | 67% | 0 |
6 | SUCH, JM , ROVATSOS, M , (2016) PRIVACY POLICY NEGOTIATION IN SOCIAL MEDIA.ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS. VOL. 11. ISSUE 1. P. - | 5 | 71% | 0 |
7 | KIM, M , RHO, S , (2015) DYNAMIC KNOWLEDGE MANAGEMENT FROM MULTIPLE SOURCES IN CROWDSOURCING ENVIRONMENTS.NEW REVIEW OF HYPERMEDIA AND MULTIMEDIA. VOL. 21. ISSUE 3-4. P. 199 -211 | 5 | 71% | 0 |
8 | PANG, J , ZHANG, Y , (2015) A NEW ACCESS CONTROL SCHEME FOR FACEBOOK-STYLE SOCIAL NETWORKS.COMPUTERS & SECURITY. VOL. 54. ISSUE . P. 44 -59 | 4 | 80% | 2 |
9 | FOGUES, R , SUCH, JM , ESPINOSA, A , GARCIA-FORNES, A , (2015) OPEN CHALLENGES IN RELATIONSHIP-BASED PRIVACY MECHANISMS FOR SOCIAL NETWORK SERVICES.INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION. VOL. 31. ISSUE 5. P. 350 -370 | 7 | 41% | 6 |
10 | JUNG, YN , JOSHI, JBD , (2014) CPBAC: PROPERTY-BASED ACCESS CONTROL MODEL FOR SECURE COOPERATION IN ONLINE SOCIAL NETWORKS.COMPUTERS & SECURITY. VOL. 41. ISSUE . P. 19-39 | 4 | 80% | 2 |
Classes with closest relation at Level 1 |