Class information for:
Level 1: USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
30058 175 31.8 28%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1665 2             PEER TO PEER//PEER TO PEER NETWORKS//PEER-TO-PEER NETWORKING AND APPLICATIONS 6842
30058 1                   USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS 175

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 USER BEHAVIOR SIMILARITY authKW 348977 1% 100% 2
2 LOCATION PROXIMITY authKW 232650 1% 67% 2
3 WEB BASED SOCIAL NETWORKS authKW 224339 2% 43% 3
4 4V CHALLENGES authKW 174488 1% 100% 1
5 ACADEMIC SEARCH CLOUD authKW 174488 1% 100% 1
6 ACTIVE TIME RANGE authKW 174488 1% 100% 1
7 ADV DATA ENGN address 174488 1% 100% 1
8 ANONYMOUS MEMBER authKW 174488 1% 100% 1
9 AUTOMATED PSEUDONYM CHANGE authKW 174488 1% 100% 1
10 BURST EVENTS authKW 174488 1% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 5880 47% 0% 83
2 Computer Science, Software Engineering 1596 22% 0% 39
3 Information Science & Library Science 1082 13% 0% 22
4 Telecommunications 1081 21% 0% 37
5 Computer Science, Hardware & Architecture 928 13% 0% 23
6 Computer Science, Theory & Methods 518 15% 0% 27
7 Computer Science, Artificial Intelligence 308 11% 0% 20
8 Engineering, Electrical & Electronic 215 22% 0% 39
9 Computer Science, Cybernetics 53 2% 0% 3
10 Ergonomics 53 2% 0% 3

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ADV DATA ENGN 174488 1% 100% 1
2 CYBER SECUR THE HAGUE CSA 174488 1% 100% 1
3 E COMMERCE PLICAT 174488 1% 100% 1
4 FTW TELECOMMUN VIENNA 174488 1% 100% 1
5 INFORMAT COMP SECUR ARCHITECTU GRP ICSA 174488 1% 100% 1
6 INFORMAT FORUM 2 12 174488 1% 100% 1
7 INSITUTE SERV ENGN 174488 1% 100% 1
8 IST SCI TECHNOL INFORMAZ A FAEDO 174488 1% 100% 1
9 IT ERS 174488 1% 100% 1
10 KENAN SCI LIB 174488 1% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMPUTERS & SECURITY 14606 6% 1% 10
2 PEER-TO-PEER NETWORKING AND APPLICATIONS 10923 3% 1% 5
3 IEEE INTERNET COMPUTING 9140 4% 1% 7
4 IEEE SECURITY & PRIVACY 6892 3% 1% 5
5 ECONTENT 6643 1% 2% 2
6 ACM TRANSACTIONS ON THE WEB 3650 1% 1% 2
7 ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA 3140 1% 1% 2
8 TSINGHUA SCIENCE AND TECHNOLOGY 2810 1% 1% 2
9 JOURNAL OF ACADEMIC LIBRARIANSHIP 2642 3% 0% 5
10 JOURNAL OF WEB SEMANTICS 2073 1% 1% 2

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 USER BEHAVIOR SIMILARITY 348977 1% 100% 2 Search USER+BEHAVIOR+SIMILARITY Search USER+BEHAVIOR+SIMILARITY
2 LOCATION PROXIMITY 232650 1% 67% 2 Search LOCATION+PROXIMITY Search LOCATION+PROXIMITY
3 WEB BASED SOCIAL NETWORKS 224339 2% 43% 3 Search WEB+BASED+SOCIAL+NETWORKS Search WEB+BASED+SOCIAL+NETWORKS
4 4V CHALLENGES 174488 1% 100% 1 Search 4V+CHALLENGES Search 4V+CHALLENGES
5 ACADEMIC SEARCH CLOUD 174488 1% 100% 1 Search ACADEMIC+SEARCH+CLOUD Search ACADEMIC+SEARCH+CLOUD
6 ACTIVE TIME RANGE 174488 1% 100% 1 Search ACTIVE+TIME+RANGE Search ACTIVE+TIME+RANGE
7 ANONYMOUS MEMBER 174488 1% 100% 1 Search ANONYMOUS+MEMBER Search ANONYMOUS+MEMBER
8 AUTOMATED PSEUDONYM CHANGE 174488 1% 100% 1 Search AUTOMATED+PSEUDONYM+CHANGE Search AUTOMATED+PSEUDONYM+CHANGE
9 BURST EVENTS 174488 1% 100% 1 Search BURST+EVENTS Search BURST+EVENTS
10 BUYER PROFILING 174488 1% 100% 1 Search BUYER+PROFILING Search BUYER+PROFILING

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 CHENG, Y , PARK, J , SANDHU, R , (2016) AN ACCESS CONTROL MODEL FOR ONLINE SOCIAL NETWORKS USING USER-TO-USER RELATIONSHIPS.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 13. ISSUE 4. P. 424 -436 6 86% 0
2 SUCH, JM , CRIADO, N , (2016) RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING. VOL. 28. ISSUE 7. P. 1851 -1863 7 70% 0
3 KOKCIYAN, N , YOLUM, P , (2016) PRIGUARD: A SEMANTIC APPROACH TO DETECT PRIVACY VIOLATIONS IN ONLINE SOCIAL NETWORKS.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING. VOL. 28. ISSUE 10. P. 2724 -2737 7 70% 0
4 RANJBAR, A , MAHESWARAN, M , (2014) USING COMMUNITY STRUCTURE TO CONTROL INFORMATION SHARING IN ONLINE SOCIAL NETWORKS.COMPUTER COMMUNICATIONS. VOL. 41. ISSUE . P. 11 -21 4 100% 5
5 PALOMAR, E , GONZALEZ-MANZANO, L , ALCAIDE, A , GALAN, A , (2016) IMPLEMENTING A PRIVACY-ENHANCED ATTRIBUTE-BASED CREDENTIAL SYSTEM FOR ONLINE SOCIAL NETWORKS WITH CO-OWNERSHIP MANAGEMENT.IET INFORMATION SECURITY. VOL. 10. ISSUE 2. P. 60 -68 6 67% 0
6 SUCH, JM , ROVATSOS, M , (2016) PRIVACY POLICY NEGOTIATION IN SOCIAL MEDIA.ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS. VOL. 11. ISSUE 1. P. - 5 71% 0
7 KIM, M , RHO, S , (2015) DYNAMIC KNOWLEDGE MANAGEMENT FROM MULTIPLE SOURCES IN CROWDSOURCING ENVIRONMENTS.NEW REVIEW OF HYPERMEDIA AND MULTIMEDIA. VOL. 21. ISSUE 3-4. P. 199 -211 5 71% 0
8 PANG, J , ZHANG, Y , (2015) A NEW ACCESS CONTROL SCHEME FOR FACEBOOK-STYLE SOCIAL NETWORKS.COMPUTERS & SECURITY. VOL. 54. ISSUE . P. 44 -59 4 80% 2
9 FOGUES, R , SUCH, JM , ESPINOSA, A , GARCIA-FORNES, A , (2015) OPEN CHALLENGES IN RELATIONSHIP-BASED PRIVACY MECHANISMS FOR SOCIAL NETWORK SERVICES.INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION. VOL. 31. ISSUE 5. P. 350 -370 7 41% 6
10 JUNG, YN , JOSHI, JBD , (2014) CPBAC: PROPERTY-BASED ACCESS CONTROL MODEL FOR SECURE COOPERATION IN ONLINE SOCIAL NETWORKS.COMPUTERS & SECURITY. VOL. 41. ISSUE . P. 19-39 4 80% 2

Classes with closest relation at Level 1



Rank Class id link
1 34697 SOCIAL NETWORK SECURITY//INTERACTION ORIENTED//SOCIAL BOT
2 26160 SCIENCE GATEWAY//JOURNAL OF GRID COMPUTING//APPLICATION KERNELS
3 37082 COLLECTIVE INFERENCE//COLLECTIVE CLASSIFICATION//CODE 5514
4 11889 INFORMATION PRIVACY//PRIVACY CONCERN//PRIVACY CALCULUS
5 37040 AGENT SYNTHESIS//ADAPTABLE MIDDLEWARE//ADAPTIVE TRADEOFF APPROACH
6 31000 DENSITY EQUALIZING MAPPING//CARTOGRAM//OCCUPAT MED SOCIAL MED ENVIRONM MED
7 28047 HIMALIS//FUTURE NETWORK//NEW GENERATION NETWORK
8 30552 PHISHING//PHISHING ATTACKS//ANTI PHISHING
9 36755 IDENTITY THEFT//AUDIENCE COMMODIFICATION//BERNARDO RUCCELAI
10 10353 ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL

Go to start page