Class information for:
Level 1: PHISHING//PHISHING ATTACKS//ANTI PHISHING

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
30552 167 33.8 22%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
30552 1                   PHISHING//PHISHING ATTACKS//ANTI PHISHING 167

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 PHISHING authKW 3291215 22% 50% 36
2 PHISHING ATTACKS authKW 1300245 5% 89% 8
3 ANTI PHISHING authKW 1218975 6% 67% 10
4 WEB SPOOFING authKW 914236 3% 100% 5
5 PHISHING DETECTION authKW 761862 3% 83% 5
6 PHISHING EMAIL authKW 548542 2% 100% 3
7 SSL TLS PROTOCOL authKW 548542 2% 100% 3
8 SECURE USABILITY authKW 365695 1% 100% 2
9 USER PROTECTION authKW 365695 1% 100% 2
10 COMMUN MANAGEMENT SCI SYST address 243795 1% 67% 2

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 5582 47% 0% 79
2 Computer Science, Software Engineering 2244 27% 0% 45
3 Computer Science, Theory & Methods 936 21% 0% 35
4 Computer Science, Hardware & Architecture 732 12% 0% 20
5 Telecommunications 422 14% 0% 23
6 Computer Science, Artificial Intelligence 360 13% 0% 21
7 Operations Research & Management Science 124 7% 0% 11
8 Information Science & Library Science 106 4% 0% 7
9 Engineering, Electrical & Electronic 71 14% 0% 24
10 Religion 57 2% 0% 4

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMMUN MANAGEMENT SCI SYST 243795 1% 67% 2
2 CY USABLE PRIVACY SECUR 182847 1% 100% 1
3 E BUSSINESS 182847 1% 100% 1
4 ETH RELIG SOC PROGRAM 182847 1% 100% 1
5 HAIFA TEL AVIV 182847 1% 100% 1
6 HORST GORTZ IT SECURITY 182847 1% 100% 1
7 INITIAT CYBERSECUR EDUC 182847 1% 100% 1
8 PORTAL SERV SECUR TEAM 182847 1% 100% 1
9 RISK PERCEPT COMMUN 182847 1% 100% 1
10 RSCOE 182847 1% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 IEEE SECURITY & PRIVACY 34986 7% 2% 11
2 ACM TRANSACTIONS ON INTERNET TECHNOLOGY 25528 3% 3% 5
3 COMPUTERS & SECURITY 22047 7% 1% 12
4 ACM TRANSACTIONS ON PRIVACY AND SECURITY 15235 1% 8% 1
5 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 8701 2% 2% 3
6 SECURITY AND COMMUNICATION NETWORKS 8439 5% 1% 8
7 JOURNAL OF THE SOCIETY OF CHRISTIAN ETHICS 3993 1% 1% 2
8 ACM TRANSACTIONS ON APPLIED PERCEPTION 3149 1% 1% 2
9 IEEE INTERNET COMPUTING 3124 2% 0% 4
10 SECURITIES REGULATION LAW JOURNAL 2831 1% 1% 2

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 PHISHING 3291215 22% 50% 36 Search PHISHING Search PHISHING
2 PHISHING ATTACKS 1300245 5% 89% 8 Search PHISHING+ATTACKS Search PHISHING+ATTACKS
3 ANTI PHISHING 1218975 6% 67% 10 Search ANTI+PHISHING Search ANTI+PHISHING
4 WEB SPOOFING 914236 3% 100% 5 Search WEB+SPOOFING Search WEB+SPOOFING
5 PHISHING DETECTION 761862 3% 83% 5 Search PHISHING+DETECTION Search PHISHING+DETECTION
6 PHISHING EMAIL 548542 2% 100% 3 Search PHISHING+EMAIL Search PHISHING+EMAIL
7 SSL TLS PROTOCOL 548542 2% 100% 3 Search SSL+TLS+PROTOCOL Search SSL+TLS+PROTOCOL
8 SECURE USABILITY 365695 1% 100% 2 Search SECURE+USABILITY Search SECURE+USABILITY
9 USER PROTECTION 365695 1% 100% 2 Search USER+PROTECTION Search USER+PROTECTION
10 PHISHING WEBSITES 243795 1% 67% 2 Search PHISHING+WEBSITES Search PHISHING+WEBSITES

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 ALSHARNOUBY, M , ALACA, F , CHIASSON, S , (2015) WHY PHISHING STILL WORKS: USER STRATEGIES FOR COMBATING PHISHING ATTACKS.INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES. VOL. 82. ISSUE . P. 69 -82 11 92% 4
2 VARSHNEY, G , MISRA, M , ATREY, PK , (2016) A PHISH DETECTOR USING LIGHTWEIGHT SEARCH FEATURES.COMPUTERS & SECURITY. VOL. 62. ISSUE . P. 213 -228 9 100% 0
3 KIM, YG , LEE, M , CHO, S , CHA, S , (2012) A QUANTITATIVE APPROACH TO ESTIMATE A WEBSITE SECURITY RISK USING WHITELIST.SECURITY AND COMMUNICATION NETWORKS. VOL. 5. ISSUE 10. P. 1181 -1192 9 100% 0
4 ZHANG, W , REN, H , JIANG, QS , (2016) APPLICATION OF FEATURE ENGINEERING FOR PHISHING DETECTION.IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. VOL. E99D. ISSUE 4. P. 1062 -1070 9 82% 0
5 RAMESH, G , KRISHNAMURTHI, I , KUMAR, KSS , (2014) AN EFFICACIOUS METHOD FOR DETECTING PHISHING WEBPAGES THROUGH TARGET DOMAIN IDENTIFICATION.DECISION SUPPORT SYSTEMS. VOL. 61. ISSUE . P. 12 -22 8 67% 8
6 TAN, CL , CHIEW, KL , WONG, K , SZE, SN , (2016) PHISHWHO: PHISHING WEBPAGE DETECTION VIA IDENTITY KEYWORDS EXTRACTION AND TARGET DOMAIN NAME FINDER.DECISION SUPPORT SYSTEMS. VOL. 88. ISSUE . P. 18 -27 7 78% 0
7 ELMASSRY, MY , ALMOGREN, AS , (2016) A MOBILE SENSING METHOD TO COUNTERACT SOCIAL MEDIA WEBSITE IMPERSONATION.INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS. VOL. 12. ISSUE 10. P. - 5 100% 0
8 MOGHIMI, M , VARJANI, AY , (2016) NEW RULE-BASED PHISHING DETECTION METHOD.EXPERT SYSTEMS WITH APPLICATIONS. VOL. 53. ISSUE . P. 231 -242 8 57% 1
9 KHONJI, M , IRAQI, Y , JONES, A , (2013) PHISHING DETECTION: A LITERATURE SURVEY.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 15. ISSUE 4. P. 2091-2121 5 83% 16
10 ABBASI, A , ZAHEDI, F , ZENG, D , CHEN, Y , CHEN, HC , NUNAMAKER, JF , (2015) ENHANCING PREDICTIVE ANALYTICS FOR ANTI-PHISHING BY EXPLOITING WEBSITE GENRE INFORMATION.JOURNAL OF MANAGEMENT INFORMATION SYSTEMS. VOL. 31. ISSUE 4. P. 109 -157 11 34% 7

Classes with closest relation at Level 1



Rank Class id link
1 8401 COMPUTERS & SECURITY//INFORMATION SECURITY//INFORMATION SECURITY MANAGEMENT
2 32030 NORMALIZED COMPRESSION DISTANCE//WORD REMOVAL//INFORMATION DISTANCE
3 34292 COUNTER FRAUD STUDIES//MASS MARKETING FRAUD//HACKERS
4 35852 CAPTCHA//HUMAN INTERACTIVE PROOFS//ABUSE OF WEB SITES AND SERVICES
5 23763 FRAUD DETECTION//INSURANCE FRAUD//CREDIT CARD FRAUD DETECTION
6 11493 TEXT CATEGORIZATION//TEXT CLASSIFICATION//SPAM FILTERING
7 30058 USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS
8 20229 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
9 34106 VIRTUAL REALITY LEARNING ENVIRONMENT//STUDIES IN INFORMATICS AND CONTROL//INNOVATION EDUCATION
10 36777 MANAGEMENT CORP ECON//TALENT NURTURING//WEB BASED E MAIL

Go to start page