Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
35852 | 91 | 28.5 | 26% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | CAPTCHA | authKW | 5824283 | 30% | 64% | 27 |
2 | HUMAN INTERACTIVE PROOFS | authKW | 2013339 | 7% | 100% | 6 |
3 | ABUSE OF WEB SITES AND SERVICES | authKW | 671113 | 2% | 100% | 2 |
4 | DOCUMENT IMAGE DEGRADATIONS | authKW | 671113 | 2% | 100% | 2 |
5 | HUMAN MACHINE DISCRIMINATION | authKW | 671113 | 2% | 100% | 2 |
6 | LEGIBILITY OF TEXT | authKW | 671113 | 2% | 100% | 2 |
7 | OCR PERFORMANCE EVALUATION | authKW | 671113 | 2% | 100% | 2 |
8 | RECAPTCHA | authKW | 447407 | 2% | 67% | 2 |
9 | 3D CAPTCHA | authKW | 335557 | 1% | 100% | 1 |
10 | ANTI BOT TECHNIQUES | authKW | 335557 | 1% | 100% | 1 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 1883 | 37% | 0% | 34 |
2 | Computer Science, Software Engineering | 1171 | 26% | 0% | 24 |
3 | Computer Science, Theory & Methods | 1125 | 31% | 0% | 28 |
4 | Computer Science, Cybernetics | 443 | 7% | 0% | 6 |
5 | Ergonomics | 440 | 7% | 0% | 6 |
6 | Computer Science, Hardware & Architecture | 269 | 10% | 0% | 9 |
7 | Computer Science, Artificial Intelligence | 217 | 13% | 0% | 12 |
8 | Telecommunications | 210 | 13% | 0% | 12 |
9 | Engineering, Electrical & Electronic | 96 | 21% | 0% | 19 |
10 | Literary Theory & Criticism | 39 | 1% | 0% | 1 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | NACL CIENCIA TECNOL SISTEMAS EMBARCADOS CR | 335557 | 1% | 100% | 1 |
2 | O CIENCIAS COMP ESTAT | 335557 | 1% | 100% | 1 |
3 | CYBERCRIME COMP SECUR | 167777 | 1% | 50% | 1 |
4 | RADCLIFFE ADV STUDIES | 167777 | 1% | 50% | 1 |
5 | UNIPD | 167777 | 1% | 50% | 1 |
6 | UNIVERSAL USABIL | 149133 | 2% | 22% | 2 |
7 | INFORMAT SECUR CRIT INFRASTRUCT PROTECT GRP | 67110 | 1% | 20% | 1 |
8 | SMARTNESS SEMANT SECUR S3 | 67110 | 1% | 20% | 1 |
9 | DEUSTOTECH COMP | 47935 | 1% | 14% | 1 |
10 | MOL MAT ANALYT CHEM | 47935 | 1% | 14% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | COMPUTERS & SECURITY | 10114 | 7% | 1% | 6 |
2 | UNIVERSAL ACCESS IN THE INFORMATION SOCIETY | 5100 | 2% | 1% | 2 |
3 | ECONTENT | 3194 | 1% | 1% | 1 |
4 | LIT-LITERATURE INTERPRETATION THEORY | 3021 | 1% | 1% | 1 |
5 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 2787 | 2% | 0% | 2 |
6 | INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY | 2771 | 1% | 1% | 1 |
7 | IEEE SECURITY & PRIVACY | 2120 | 2% | 0% | 2 |
8 | JOURNAL OF WEB ENGINEERING | 1719 | 1% | 1% | 1 |
9 | INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION | 1592 | 2% | 0% | 2 |
10 | MULTIMEDIA TOOLS AND APPLICATIONS | 1575 | 4% | 0% | 4 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | CAPTCHA | 5824283 | 30% | 64% | 27 | Search CAPTCHA | Search CAPTCHA |
2 | HUMAN INTERACTIVE PROOFS | 2013339 | 7% | 100% | 6 | Search HUMAN+INTERACTIVE+PROOFS | Search HUMAN+INTERACTIVE+PROOFS |
3 | ABUSE OF WEB SITES AND SERVICES | 671113 | 2% | 100% | 2 | Search ABUSE+OF+WEB+SITES+AND+SERVICES | Search ABUSE+OF+WEB+SITES+AND+SERVICES |
4 | DOCUMENT IMAGE DEGRADATIONS | 671113 | 2% | 100% | 2 | Search DOCUMENT+IMAGE+DEGRADATIONS | Search DOCUMENT+IMAGE+DEGRADATIONS |
5 | HUMAN MACHINE DISCRIMINATION | 671113 | 2% | 100% | 2 | Search HUMAN+MACHINE+DISCRIMINATION | Search HUMAN+MACHINE+DISCRIMINATION |
6 | LEGIBILITY OF TEXT | 671113 | 2% | 100% | 2 | Search LEGIBILITY+OF+TEXT | Search LEGIBILITY+OF+TEXT |
7 | OCR PERFORMANCE EVALUATION | 671113 | 2% | 100% | 2 | Search OCR+PERFORMANCE+EVALUATION | Search OCR+PERFORMANCE+EVALUATION |
8 | RECAPTCHA | 447407 | 2% | 67% | 2 | Search RECAPTCHA | Search RECAPTCHA |
9 | 3D CAPTCHA | 335557 | 1% | 100% | 1 | Search 3D+CAPTCHA | Search 3D+CAPTCHA |
10 | ANTI BOT TECHNIQUES | 335557 | 1% | 100% | 1 | Search ANTI+BOT+TECHNIQUES | Search ANTI+BOT+TECHNIQUES |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | ROSHANBIN, N , MILLER, J , (2013) A SURVEY AND ANALYSIS OF CURRENT CAPTCHA APPROACHES.JOURNAL OF WEB ENGINEERING. VOL. 12. ISSUE 1-2. P. 1 -40 | 10 | 77% | 6 |
2 | SCHRYEN, G , WAGNER, G , SCHLEGEL, A , (2016) DEVELOPMENT OF TWO NOVEL FACE-RECOGNITION CAPTCHAS: A SECURITY AND USABILITY STUDY.COMPUTERS & SECURITY. VOL. 60. ISSUE . P. 95 -116 | 12 | 57% | 0 |
3 | HIDALGO, JMG , ALVAREZ, G , (2011) CAPTCHAS: AN ARTIFICIAL INTELLIGENCE APPLICATION TO WEB SECURITY.ADVANCES IN COMPUTERS, VOL 83. VOL. 83. ISSUE . P. 109 -181 | 10 | 71% | 5 |
4 | NGUYEN, VD , CHOW, YW , SUSILO, W , (2014) ON THE SECURITY OF TEXT-BASED 3D CAPTCHAS.COMPUTERS & SECURITY. VOL. 45. ISSUE . P. 84 -99 | 7 | 88% | 2 |
5 | MORADI, M , KEYVANPOUR, M , (2015) CAPTCHA AND ITS ALTERNATIVES: A REVIEW.SECURITY AND COMMUNICATION NETWORKS. VOL. 8. ISSUE 12. P. 2135 -2156 | 10 | 59% | 0 |
6 | YANG, TI , KOONG, CS , TSENG, CC , (2015) GAME-BASED IMAGE SEMANTIC CAPTCHA ON HANDSET DEVICES.MULTIMEDIA TOOLS AND APPLICATIONS. VOL. 74. ISSUE 14. P. 5141 -5156 | 5 | 100% | 2 |
7 | FOLEY, M , (2014) "PROVE YOU'RE HUMAN": FETISHIZING MATERIAL EMBODIMENT AND IMMATERIAL LABOR IN INFORMATION NETWORKS.CRITICAL STUDIES IN MEDIA COMMUNICATION. VOL. 31. ISSUE 5. P. 365 -379 | 4 | 100% | 2 |
8 | SOUPIONIS, Y , GRITZALIS, D , (2010) AUDIO CAPTCHA: EXISTING SOLUTIONS ASSESSMENT AND A NEW IMPLEMENTATION FOR VOIP TELEPHONY.COMPUTERS & SECURITY. VOL. 29. ISSUE 5. P. 603-618 | 4 | 100% | 11 |
9 | KIM, J , YANG, J , WOHN, K , (2014) AGECAPTCHA: AN IMAGE-BASED CAPTCHA THAT ANNOTATES IMAGES OF HUMAN FACES WITH THEIR AGE GROUPS.KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS. VOL. 8. ISSUE 3. P. 1071 -1092 | 7 | 47% | 0 |
10 | SAHA, SK , NAG, AK , DASGUPTA, D , (2015) HUMAN-COGNITION-BASED CAPTCHAS.IT PROFESSIONAL. VOL. 17. ISSUE 5. P. 42 -48 | 3 | 100% | 1 |
Classes with closest relation at Level 1 |