Class information for:
Level 1: DOMAIN NAME SYSTEM DNS//DOMAIN NAME SYSTEM//MALICIOUS DOMAIN DETECTION

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
35245 100 24.3 19%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
3344 2             INFORMATION CENTRIC NETWORKING//WEB CACHING//CONTENT CENTRIC NETWORKING 1740
35245 1                   DOMAIN NAME SYSTEM DNS//DOMAIN NAME SYSTEM//MALICIOUS DOMAIN DETECTION 100

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 DOMAIN NAME SYSTEM DNS authKW 880136 7% 41% 7
2 DOMAIN NAME SYSTEM authKW 575469 7% 27% 7
3 MALICIOUS DOMAIN DETECTION authKW 407140 2% 67% 2
4 AND COMMAND AND CONTROL authKW 305356 1% 100% 1
5 ATTACK RESILIENCY authKW 305356 1% 100% 1
6 AUTHORITATIVE DNS RECORDS authKW 305356 1% 100% 1
7 CLOUD THREAT S address 305356 1% 100% 1
8 CONFIGURATIONS ERRORS authKW 305356 1% 100% 1
9 CONNECTION MANAGEMENT PROTOCOL authKW 305356 1% 100% 1
10 DAY IN THE LIFE OF THE INTERNET authKW 305356 1% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 3740 50% 0% 50
2 Telecommunications 2281 40% 0% 40
3 Computer Science, Hardware & Architecture 1378 21% 0% 21
4 Computer Science, Software Engineering 404 15% 0% 15
5 Engineering, Electrical & Electronic 259 31% 0% 31
6 Computer Science, Theory & Methods 206 13% 0% 13
7 Computer Science, Artificial Intelligence 195 12% 0% 12
8 International Relations 81 4% 0% 4
9 Communication 52 3% 0% 3
10 Computer Science, Cybernetics 42 2% 0% 2

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 CLOUD THREAT S 305356 1% 100% 1
2 ELASTICA 305356 1% 100% 1
3 HOPKINS INTERNETWORKING HINRG GRP 305356 1% 100% 1
4 IND DEV BOARD 305356 1% 100% 1
5 INFORMAT ETH 305356 1% 100% 1
6 PROGRAM TELECOMMUN 305356 1% 100% 1
7 SCI TECHNOL 4285 305356 1% 100% 1
8 SURFNET BV 305356 1% 100% 1
9 COMMUN DISTRIBUTED SYST GRP 152677 1% 50% 1
10 UBIQUITOUS NETWORKED SYST UBINES 152677 1% 50% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ACM SIGCOMM COMPUTER COMMUNICATION REVIEW 30539 11% 1% 11
2 ACM TRANSACTIONS ON INTERNET TECHNOLOGY 15347 3% 2% 3
3 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 5708 3% 1% 3
4 IEEE NETWORK 2988 3% 0% 3
5 INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 2195 1% 1% 1
6 COMPUTER NETWORKS 2042 5% 0% 5
7 IEEE SECURITY & PRIVACY 1929 2% 0% 2
8 INDEX ON CENSORSHIP 1588 1% 1% 1
9 JOURNAL OF HIGH SPEED NETWORKS 1452 1% 0% 1
10 SPACE AND CULTURE 1445 1% 0% 1

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 DOMAIN NAME SYSTEM DNS 880136 7% 41% 7 Search DOMAIN+NAME+SYSTEM+DNS Search DOMAIN+NAME+SYSTEM+DNS
2 DOMAIN NAME SYSTEM 575469 7% 27% 7 Search DOMAIN+NAME+SYSTEM Search DOMAIN+NAME+SYSTEM
3 MALICIOUS DOMAIN DETECTION 407140 2% 67% 2 Search MALICIOUS+DOMAIN+DETECTION Search MALICIOUS+DOMAIN+DETECTION
4 AND COMMAND AND CONTROL 305356 1% 100% 1 Search AND+COMMAND+AND+CONTROL Search AND+COMMAND+AND+CONTROL
5 ATTACK RESILIENCY 305356 1% 100% 1 Search ATTACK+RESILIENCY Search ATTACK+RESILIENCY
6 AUTHORITATIVE DNS RECORDS 305356 1% 100% 1 Search AUTHORITATIVE+DNS+RECORDS Search AUTHORITATIVE+DNS+RECORDS
7 CONFIGURATIONS ERRORS 305356 1% 100% 1 Search CONFIGURATIONS+ERRORS Search CONFIGURATIONS+ERRORS
8 CONNECTION MANAGEMENT PROTOCOL 305356 1% 100% 1 Search CONNECTION+MANAGEMENT+PROTOCOL Search CONNECTION+MANAGEMENT+PROTOCOL
9 DAY IN THE LIFE OF THE INTERNET 305356 1% 100% 1 Search DAY+IN+THE+LIFE+OF+THE+INTERNET Search DAY+IN+THE+LIFE+OF+THE+INTERNET
10 DEFENSIVE WARFARE 305356 1% 100% 1 Search DEFENSIVE+WARFARE Search DEFENSIVE+WARFARE

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 WANG, Z , (2012) ANALYSIS OF FLOODING DOS ATTACKS UTILIZING DNS NAME ERROR QUERIES.KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS. VOL. 6. ISSUE 10. P. 2750 -2763 5 83% 1
2 WANG, Z , WANG, R , (2013) OPTIMIZING DNS SERVER SELECTION.APPLIED MATHEMATICS & INFORMATION SCIENCES. VOL. 7. ISSUE 6. P. 2233 -2240 4 100% 2
3 GAO, HY , YEGNESWARAN, V , JIANG, J , CHEN, Y , PORRAS, P , GHOSH, S , DUAN, HX , (2016) REEXAMINING DNS FROM A GLOBAL RECURSIVE RESOLVER PERSPECTIVE.IEEE-ACM TRANSACTIONS ON NETWORKING. VOL. 24. ISSUE 1. P. 43 -57 3 100% 1
4 KOC, Y , JAMAKOVIC, A , GIJSEN, B , (2012) A GLOBAL REFERENCE MODEL OF THE DOMAIN NAME SYSTEM.INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION. VOL. 5. ISSUE 3-4. P. 108-117 3 100% 2
5 SHUE, CA , KALAFUT, AJ , (2013) RESOLVERS REVEALED: CHARACTERIZING DNS RESOLVERS AND THEIR CLIENTS.ACM TRANSACTIONS ON INTERNET TECHNOLOGY. VOL. 12. ISSUE 4. P. - 4 67% 0
6 SHANG, H , WILLS, CE , (2006) PIGGYBACKING RELATED DOMAIN NAMES TO IMPROVE DNS PERFORMANCE.COMPUTER NETWORKS. VOL. 50. ISSUE 11. P. 1733 -1748 3 100% 6
7 VAN RIJSWIJK-DEIJ, R , JONKER, M , SPEROTTO, A , PRAS, A , (2016) A HIGH-PERFORMANCE, SCALABLE INFRASTRUCTURE FOR LARGE-SCALE ACTIVE DNS MEASUREMENTS.IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS. VOL. 34. ISSUE 6. P. 1877 -1888 3 75% 0
8 SOOD, AK , ZEADALLY, S , (2016) DRIVE-BY DOWNLOAD ATTACKS A COMPARATIVE STUDY.IT PROFESSIONAL. VOL. 18. ISSUE 5. P. 18 -25 2 100% 0
9 HMOOD, HS , LI, ZT , ABDULWAHID, HK , ZHANG, Y , (2015) ADAPTIVE CACHING APPROACH TO PREVENT DNS CACHE POISONING ATTACK.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 973 -985 2 100% 0
10 GAO, HY , YEGNESWARAN, V , CHEN, Y , PORRAS, P , GHOSH, S , JIANG, J , DUAN, HX , (2013) AN EMPIRICAL REEXAMINATION OF GLOBAL DNS BEHAVIOR.ACM SIGCOMM COMPUTER COMMUNICATION REVIEW. VOL. 43. ISSUE 4. P. 267-278 2 100% 4

Classes with closest relation at Level 1



Rank Class id link
1 8042 INFORMATION CENTRIC NETWORKING//WEB CACHING//CONTENT CENTRIC NETWORKING
2 33445 SYSTEM RESPONSE TIME//AUDIO CONTENT ADAPTATION FOR MOBILE DEVICES//AUTOMATIC VIDEO SEGMENTATION
3 15358 IP TRACEBACK//DDOS//DDOS ATTACKS
4 33320 HAZING//ATHLETE PROTECTION//ATHLETE WELFARE
5 32910 HPC MARKET//PARALLEL PROCESSING ON CLUSTERS//PARALLELISM MANAGEMENT
6 18831 BGP//INTER DOMAIN ROUTING//BORDER GATEWAY PROTOCOL BGP
7 36105 ACCOUNTING INFORMATION MANAGEMENT//BELFER SCI INT RELAT//COMPLETED CONTRACT METHOD
8 20510 TRAFFIC CLASSIFICATION//TRAFFIC IDENTIFICATION//APPLICATION IDENTIFICATION
9 32726 DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION
10 2369 PEER TO PEER//PEER TO PEER NETWORKS//P2P

Go to start page