Class information for:
Level 1: IMSI CATCHER//ADMINISTRATION TOOLS//APPLICATION FIREWALLS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
36388 81 23.8 19%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
36388 1                   IMSI CATCHER//ADMINISTRATION TOOLS//APPLICATION FIREWALLS 81

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 IMSI CATCHER authKW 753967 2% 100% 2
2 ADMINISTRATION TOOLS authKW 376984 1% 100% 1
3 APPLICATION FIREWALLS authKW 376984 1% 100% 1
4 CONSTRUCTION VEHICLE CV INDUSTRY authKW 376984 1% 100% 1
5 DECENTRALIZED AUTHORIZATION MANAGEMENT authKW 376984 1% 100% 1
6 DIAGNOSTIC TROUBLE CODE DTC authKW 376984 1% 100% 1
7 DISCRETIONARY AUTHORIZATION authKW 376984 1% 100% 1
8 DISTANCE VECTOR HOP authKW 376984 1% 100% 1
9 EMERGENCY SUPPORT SYSTEM authKW 376984 1% 100% 1
10 EOBD authKW 376984 1% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 1537 36% 0% 29
2 Telecommunications 689 25% 0% 20
3 Computer Science, Software Engineering 653 21% 0% 17
4 Communication 627 11% 0% 9
5 Computer Science, Hardware & Architecture 181 9% 0% 7
6 Computer Science, Theory & Methods 120 11% 0% 9
7 Engineering, Electrical & Electronic 87 21% 0% 17
8 Transportation Science & Technology 66 4% 0% 3
9 Political Science 25 4% 0% 3
10 Geography, Physical 14 2% 0% 2

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ESTONIAN OFF 376984 1% 100% 1
2 ETSIG 376984 1% 100% 1
3 MOBILE NETWORKS GRP 376984 1% 100% 1
4 RD ULTS DIFFUS 376984 1% 100% 1
5 SUPERNETWORKS CHINA 376984 1% 100% 1
6 TEAM PANNING 376984 1% 100% 1
7 IIG TELEMAT 188491 1% 50% 1
8 SABR 188491 1% 50% 1
9 RD FEASIBIL ANAL 125660 1% 33% 1
10 CITEXVI 94244 1% 25% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS 93079 11% 3% 9
2 IEEE SECURITY & PRIVACY 14902 6% 1% 5
3 JOURNAL OF INTERNET TECHNOLOGY 6534 5% 0% 4
4 COMPUTERS & SECURITY 5048 5% 0% 4
5 INFORMATION SYSTEMS 2310 4% 0% 3
6 COMPUTER LAW & SECURITY REVIEW 1751 1% 0% 1
7 IEEE WIRELESS COMMUNICATIONS 1530 2% 0% 2
8 IEEE TRANSACTIONS ON SERVICES COMPUTING 1060 1% 0% 1
9 ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL 1039 1% 0% 1
10 INTERNATIONAL JOURNAL OF DIGITAL EARTH 995 1% 0% 1

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 IMSI CATCHER 753967 2% 100% 2 Search IMSI+CATCHER Search IMSI+CATCHER
2 ADMINISTRATION TOOLS 376984 1% 100% 1 Search ADMINISTRATION+TOOLS Search ADMINISTRATION+TOOLS
3 APPLICATION FIREWALLS 376984 1% 100% 1 Search APPLICATION+FIREWALLS Search APPLICATION+FIREWALLS
4 CONSTRUCTION VEHICLE CV INDUSTRY 376984 1% 100% 1 Search CONSTRUCTION+VEHICLE+CV+INDUSTRY Search CONSTRUCTION+VEHICLE+CV+INDUSTRY
5 DECENTRALIZED AUTHORIZATION MANAGEMENT 376984 1% 100% 1 Search DECENTRALIZED+AUTHORIZATION+MANAGEMENT Search DECENTRALIZED+AUTHORIZATION+MANAGEMENT
6 DIAGNOSTIC TROUBLE CODE DTC 376984 1% 100% 1 Search DIAGNOSTIC+TROUBLE+CODE+DTC Search DIAGNOSTIC+TROUBLE+CODE+DTC
7 DISCRETIONARY AUTHORIZATION 376984 1% 100% 1 Search DISCRETIONARY+AUTHORIZATION Search DISCRETIONARY+AUTHORIZATION
8 DISTANCE VECTOR HOP 376984 1% 100% 1 Search DISTANCE+VECTOR+HOP Search DISTANCE+VECTOR+HOP
9 EMERGENCY SUPPORT SYSTEM 376984 1% 100% 1 Search EMERGENCY+SUPPORT+SYSTEM Search EMERGENCY+SUPPORT+SYSTEM
10 EOBD 376984 1% 100% 1 Search EOBD Search EOBD

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 IGURE, VM , WILLIAMS, RD , (2008) TAXONOMIES OF ATTACKS AND VULNERABILITIES IN COMPUTER SYSTEMS.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 10. ISSUE 1. P. 6-19 8 44% 31
2 NAARTTIJARVI, M , (2016) SWEDISH POLICE IMPLEMENTATION OF IMSI-CATCHERS IN A EUROPEAN LAW PERSPECTIVE.COMPUTER LAW & SECURITY REVIEW. VOL. 32. ISSUE 6. P. 852 -867 3 100% 0
3 KOZAK, F , HUDEC, P , (2014) RADIO SENSOR FOR MONITORING OF UMTS MOBILE TERMINALS.RADIOENGINEERING. VOL. 23. ISSUE 2. P. 594-600 3 100% 0
4 SAMET, R , CELIK, OF , (2016) FAKE GSM BASE STATION ATTACK DETECTION ALGORITHM.JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY. VOL. 31. ISSUE 1. P. 161 -169 3 75% 0
5 VALES-ALONSO, J , GONZALEZ-CASTANO, FJ , POUSADA-CARBALLO, JM , (2003) EXPERIMENTAL REAL-TIME DETECTOR OF GSM TERMINALS.IEEE COMMUNICATIONS LETTERS. VOL. 7. ISSUE 3. P. 148-149 3 100% 0
6 RYOO, JW , CHOI, YB , OH, TH , CORBIN, G , (2009) A MULTI-DIMENSIONAL CLASSIFICATION FRAMEWORK FOR DEVELOPING CONTEXT-SPECIFIC WIRELESS LOCAL AREA NETWORK ATTACK TAXONOMIES.INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS. VOL. 7. ISSUE 2. P. 253-267 2 100% 3
7 LIU, FH , LO, HF , CHEN, LC , LEE, WT , (2013) COMPREHENSIVE SECURITY INTEGRATED MODEL AND ONTOLOGY WITHIN CLOUD COMPUTING.JOURNAL OF INTERNET TECHNOLOGY. VOL. 14. ISSUE 6. P. 935-945 4 33% 7
8 KOIEN, GM , (2007) PRIVACY ENHANCED MOBILE AUTHENTICATION.WIRELESS PERSONAL COMMUNICATIONS. VOL. 40. ISSUE 3. P. 443-455 2 67% 1
9 ANAND, C , GNANAMURTHY, RK , (2016) LOCALIZED DOS ATTACK DETECTION ARCHITECTURE FOR RELIABLE DATA TRANSMISSION OVER WIRELESS SENSOR NETWORK.WIRELESS PERSONAL COMMUNICATIONS. VOL. 90. ISSUE 2. P. 847 -859 2 50% 0
10 XU, CQ , YANG, F , TENG, J , JIANG, SX , (2015) STEALTHY MOBILE PHONE IDENTITY CATCHER.IEICE TRANSACTIONS ON COMMUNICATIONS. VOL. E98B. ISSUE 3. P. 494 -501 1 100% 0

Classes with closest relation at Level 1



Rank Class id link
1 34697 SOCIAL NETWORK SECURITY//INTERACTION ORIENTED//SOCIAL BOT
2 37591 BELLSOUTH CORP PROF//COMMON SNOOK CENTROPOMUS UNDECIMALIS//DOCUMENT RETRIEVAL INFORMATION RESOURCE MANAGEMENT
3 32918 EVOLUTION OF FOSS SYSTEMS//HOGG HUBERMAN MODEL//LINUX DISTRIBUTIONS
4 37301 FUZZY RELATIONS PROPERTIES//BIOINFORMAT MATH MODELLING IBPHBME//BURRIDGE SECUR ANAL VALUAT
5 33415 ABUGIDA//CAIRO SPEECH//CHINESE POLITICAL THEORY
6 29759 TYDSKRIF VIR DIE SUID-AFRIKAANSE REG//BULAQ ABUL ELA//DESERT ARCHITECTURE URBAN PLANNING
7 36777 MANAGEMENT CORP ECON//TALENT NURTURING//WEB BASED E MAIL
8 25529 SQL INJECTION ATTACK//SQL INJECTION//SOFTWARE FAULT ISOLATION
9 36840 CHAIR CONTROL ROBOT COMP SCI//ASSOCIATIONIST THEORY//AUDIO INTERPRETATION
10 30633 APPLICATION LAYERS//AUTOMOTIVE ASSEMBLY PLANT//BITCLOUD

Go to start page