Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
30552 | 167 | 33.8 | 22% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
20 | 3 | COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING | 118625 |
1591 | 2 | COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION | 7195 |
30552 | 1 | PHISHING//PHISHING ATTACKS//ANTI PHISHING | 167 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | PHISHING | authKW | 3291215 | 22% | 50% | 36 |
2 | PHISHING ATTACKS | authKW | 1300245 | 5% | 89% | 8 |
3 | ANTI PHISHING | authKW | 1218975 | 6% | 67% | 10 |
4 | WEB SPOOFING | authKW | 914236 | 3% | 100% | 5 |
5 | PHISHING DETECTION | authKW | 761862 | 3% | 83% | 5 |
6 | PHISHING EMAIL | authKW | 548542 | 2% | 100% | 3 |
7 | SSL TLS PROTOCOL | authKW | 548542 | 2% | 100% | 3 |
8 | SECURE USABILITY | authKW | 365695 | 1% | 100% | 2 |
9 | USER PROTECTION | authKW | 365695 | 1% | 100% | 2 |
10 | COMMUN MANAGEMENT SCI SYST | address | 243795 | 1% | 67% | 2 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 5582 | 47% | 0% | 79 |
2 | Computer Science, Software Engineering | 2244 | 27% | 0% | 45 |
3 | Computer Science, Theory & Methods | 936 | 21% | 0% | 35 |
4 | Computer Science, Hardware & Architecture | 732 | 12% | 0% | 20 |
5 | Telecommunications | 422 | 14% | 0% | 23 |
6 | Computer Science, Artificial Intelligence | 360 | 13% | 0% | 21 |
7 | Operations Research & Management Science | 124 | 7% | 0% | 11 |
8 | Information Science & Library Science | 106 | 4% | 0% | 7 |
9 | Engineering, Electrical & Electronic | 71 | 14% | 0% | 24 |
10 | Religion | 57 | 2% | 0% | 4 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | COMMUN MANAGEMENT SCI SYST | 243795 | 1% | 67% | 2 |
2 | CY USABLE PRIVACY SECUR | 182847 | 1% | 100% | 1 |
3 | E BUSSINESS | 182847 | 1% | 100% | 1 |
4 | ETH RELIG SOC PROGRAM | 182847 | 1% | 100% | 1 |
5 | HAIFA TEL AVIV | 182847 | 1% | 100% | 1 |
6 | HORST GORTZ IT SECURITY | 182847 | 1% | 100% | 1 |
7 | INITIAT CYBERSECUR EDUC | 182847 | 1% | 100% | 1 |
8 | PORTAL SERV SECUR TEAM | 182847 | 1% | 100% | 1 |
9 | RISK PERCEPT COMMUN | 182847 | 1% | 100% | 1 |
10 | RSCOE | 182847 | 1% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | IEEE SECURITY & PRIVACY | 34986 | 7% | 2% | 11 |
2 | ACM TRANSACTIONS ON INTERNET TECHNOLOGY | 25528 | 3% | 3% | 5 |
3 | COMPUTERS & SECURITY | 22047 | 7% | 1% | 12 |
4 | ACM TRANSACTIONS ON PRIVACY AND SECURITY | 15235 | 1% | 8% | 1 |
5 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 8701 | 2% | 2% | 3 |
6 | SECURITY AND COMMUNICATION NETWORKS | 8439 | 5% | 1% | 8 |
7 | JOURNAL OF THE SOCIETY OF CHRISTIAN ETHICS | 3993 | 1% | 1% | 2 |
8 | ACM TRANSACTIONS ON APPLIED PERCEPTION | 3149 | 1% | 1% | 2 |
9 | IEEE INTERNET COMPUTING | 3124 | 2% | 0% | 4 |
10 | SECURITIES REGULATION LAW JOURNAL | 2831 | 1% | 1% | 2 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | PHISHING | 3291215 | 22% | 50% | 36 | Search PHISHING | Search PHISHING |
2 | PHISHING ATTACKS | 1300245 | 5% | 89% | 8 | Search PHISHING+ATTACKS | Search PHISHING+ATTACKS |
3 | ANTI PHISHING | 1218975 | 6% | 67% | 10 | Search ANTI+PHISHING | Search ANTI+PHISHING |
4 | WEB SPOOFING | 914236 | 3% | 100% | 5 | Search WEB+SPOOFING | Search WEB+SPOOFING |
5 | PHISHING DETECTION | 761862 | 3% | 83% | 5 | Search PHISHING+DETECTION | Search PHISHING+DETECTION |
6 | PHISHING EMAIL | 548542 | 2% | 100% | 3 | Search PHISHING+EMAIL | Search PHISHING+EMAIL |
7 | SSL TLS PROTOCOL | 548542 | 2% | 100% | 3 | Search SSL+TLS+PROTOCOL | Search SSL+TLS+PROTOCOL |
8 | SECURE USABILITY | 365695 | 1% | 100% | 2 | Search SECURE+USABILITY | Search SECURE+USABILITY |
9 | USER PROTECTION | 365695 | 1% | 100% | 2 | Search USER+PROTECTION | Search USER+PROTECTION |
10 | PHISHING WEBSITES | 243795 | 1% | 67% | 2 | Search PHISHING+WEBSITES | Search PHISHING+WEBSITES |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | ALSHARNOUBY, M , ALACA, F , CHIASSON, S , (2015) WHY PHISHING STILL WORKS: USER STRATEGIES FOR COMBATING PHISHING ATTACKS.INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES. VOL. 82. ISSUE . P. 69 -82 | 11 | 92% | 4 |
2 | VARSHNEY, G , MISRA, M , ATREY, PK , (2016) A PHISH DETECTOR USING LIGHTWEIGHT SEARCH FEATURES.COMPUTERS & SECURITY. VOL. 62. ISSUE . P. 213 -228 | 9 | 100% | 0 |
3 | KIM, YG , LEE, M , CHO, S , CHA, S , (2012) A QUANTITATIVE APPROACH TO ESTIMATE A WEBSITE SECURITY RISK USING WHITELIST.SECURITY AND COMMUNICATION NETWORKS. VOL. 5. ISSUE 10. P. 1181 -1192 | 9 | 100% | 0 |
4 | ZHANG, W , REN, H , JIANG, QS , (2016) APPLICATION OF FEATURE ENGINEERING FOR PHISHING DETECTION.IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. VOL. E99D. ISSUE 4. P. 1062 -1070 | 9 | 82% | 0 |
5 | RAMESH, G , KRISHNAMURTHI, I , KUMAR, KSS , (2014) AN EFFICACIOUS METHOD FOR DETECTING PHISHING WEBPAGES THROUGH TARGET DOMAIN IDENTIFICATION.DECISION SUPPORT SYSTEMS. VOL. 61. ISSUE . P. 12 -22 | 8 | 67% | 8 |
6 | TAN, CL , CHIEW, KL , WONG, K , SZE, SN , (2016) PHISHWHO: PHISHING WEBPAGE DETECTION VIA IDENTITY KEYWORDS EXTRACTION AND TARGET DOMAIN NAME FINDER.DECISION SUPPORT SYSTEMS. VOL. 88. ISSUE . P. 18 -27 | 7 | 78% | 0 |
7 | ELMASSRY, MY , ALMOGREN, AS , (2016) A MOBILE SENSING METHOD TO COUNTERACT SOCIAL MEDIA WEBSITE IMPERSONATION.INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS. VOL. 12. ISSUE 10. P. - | 5 | 100% | 0 |
8 | MOGHIMI, M , VARJANI, AY , (2016) NEW RULE-BASED PHISHING DETECTION METHOD.EXPERT SYSTEMS WITH APPLICATIONS. VOL. 53. ISSUE . P. 231 -242 | 8 | 57% | 1 |
9 | KHONJI, M , IRAQI, Y , JONES, A , (2013) PHISHING DETECTION: A LITERATURE SURVEY.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 15. ISSUE 4. P. 2091-2121 | 5 | 83% | 16 |
10 | ABBASI, A , ZAHEDI, F , ZENG, D , CHEN, Y , CHEN, HC , NUNAMAKER, JF , (2015) ENHANCING PREDICTIVE ANALYTICS FOR ANTI-PHISHING BY EXPLOITING WEBSITE GENRE INFORMATION.JOURNAL OF MANAGEMENT INFORMATION SYSTEMS. VOL. 31. ISSUE 4. P. 109 -157 | 11 | 34% | 7 |
Classes with closest relation at Level 1 |