Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
36388 | 81 | 23.8 | 19% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | IMSI CATCHER | authKW | 753967 | 2% | 100% | 2 |
2 | ADMINISTRATION TOOLS | authKW | 376984 | 1% | 100% | 1 |
3 | APPLICATION FIREWALLS | authKW | 376984 | 1% | 100% | 1 |
4 | CONSTRUCTION VEHICLE CV INDUSTRY | authKW | 376984 | 1% | 100% | 1 |
5 | DECENTRALIZED AUTHORIZATION MANAGEMENT | authKW | 376984 | 1% | 100% | 1 |
6 | DIAGNOSTIC TROUBLE CODE DTC | authKW | 376984 | 1% | 100% | 1 |
7 | DISCRETIONARY AUTHORIZATION | authKW | 376984 | 1% | 100% | 1 |
8 | DISTANCE VECTOR HOP | authKW | 376984 | 1% | 100% | 1 |
9 | EMERGENCY SUPPORT SYSTEM | authKW | 376984 | 1% | 100% | 1 |
10 | EOBD | authKW | 376984 | 1% | 100% | 1 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 1537 | 36% | 0% | 29 |
2 | Telecommunications | 689 | 25% | 0% | 20 |
3 | Computer Science, Software Engineering | 653 | 21% | 0% | 17 |
4 | Communication | 627 | 11% | 0% | 9 |
5 | Computer Science, Hardware & Architecture | 181 | 9% | 0% | 7 |
6 | Computer Science, Theory & Methods | 120 | 11% | 0% | 9 |
7 | Engineering, Electrical & Electronic | 87 | 21% | 0% | 17 |
8 | Transportation Science & Technology | 66 | 4% | 0% | 3 |
9 | Political Science | 25 | 4% | 0% | 3 |
10 | Geography, Physical | 14 | 2% | 0% | 2 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ESTONIAN OFF | 376984 | 1% | 100% | 1 |
2 | ETSIG | 376984 | 1% | 100% | 1 |
3 | MOBILE NETWORKS GRP | 376984 | 1% | 100% | 1 |
4 | RD ULTS DIFFUS | 376984 | 1% | 100% | 1 |
5 | SUPERNETWORKS CHINA | 376984 | 1% | 100% | 1 |
6 | TEAM PANNING | 376984 | 1% | 100% | 1 |
7 | IIG TELEMAT | 188491 | 1% | 50% | 1 |
8 | SABR | 188491 | 1% | 50% | 1 |
9 | RD FEASIBIL ANAL | 125660 | 1% | 33% | 1 |
10 | CITEXVI | 94244 | 1% | 25% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS | 93079 | 11% | 3% | 9 |
2 | IEEE SECURITY & PRIVACY | 14902 | 6% | 1% | 5 |
3 | JOURNAL OF INTERNET TECHNOLOGY | 6534 | 5% | 0% | 4 |
4 | COMPUTERS & SECURITY | 5048 | 5% | 0% | 4 |
5 | INFORMATION SYSTEMS | 2310 | 4% | 0% | 3 |
6 | COMPUTER LAW & SECURITY REVIEW | 1751 | 1% | 0% | 1 |
7 | IEEE WIRELESS COMMUNICATIONS | 1530 | 2% | 0% | 2 |
8 | IEEE TRANSACTIONS ON SERVICES COMPUTING | 1060 | 1% | 0% | 1 |
9 | ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL | 1039 | 1% | 0% | 1 |
10 | INTERNATIONAL JOURNAL OF DIGITAL EARTH | 995 | 1% | 0% | 1 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | IMSI CATCHER | 753967 | 2% | 100% | 2 | Search IMSI+CATCHER | Search IMSI+CATCHER |
2 | ADMINISTRATION TOOLS | 376984 | 1% | 100% | 1 | Search ADMINISTRATION+TOOLS | Search ADMINISTRATION+TOOLS |
3 | APPLICATION FIREWALLS | 376984 | 1% | 100% | 1 | Search APPLICATION+FIREWALLS | Search APPLICATION+FIREWALLS |
4 | CONSTRUCTION VEHICLE CV INDUSTRY | 376984 | 1% | 100% | 1 | Search CONSTRUCTION+VEHICLE+CV+INDUSTRY | Search CONSTRUCTION+VEHICLE+CV+INDUSTRY |
5 | DECENTRALIZED AUTHORIZATION MANAGEMENT | 376984 | 1% | 100% | 1 | Search DECENTRALIZED+AUTHORIZATION+MANAGEMENT | Search DECENTRALIZED+AUTHORIZATION+MANAGEMENT |
6 | DIAGNOSTIC TROUBLE CODE DTC | 376984 | 1% | 100% | 1 | Search DIAGNOSTIC+TROUBLE+CODE+DTC | Search DIAGNOSTIC+TROUBLE+CODE+DTC |
7 | DISCRETIONARY AUTHORIZATION | 376984 | 1% | 100% | 1 | Search DISCRETIONARY+AUTHORIZATION | Search DISCRETIONARY+AUTHORIZATION |
8 | DISTANCE VECTOR HOP | 376984 | 1% | 100% | 1 | Search DISTANCE+VECTOR+HOP | Search DISTANCE+VECTOR+HOP |
9 | EMERGENCY SUPPORT SYSTEM | 376984 | 1% | 100% | 1 | Search EMERGENCY+SUPPORT+SYSTEM | Search EMERGENCY+SUPPORT+SYSTEM |
10 | EOBD | 376984 | 1% | 100% | 1 | Search EOBD | Search EOBD |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | IGURE, VM , WILLIAMS, RD , (2008) TAXONOMIES OF ATTACKS AND VULNERABILITIES IN COMPUTER SYSTEMS.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 10. ISSUE 1. P. 6-19 | 8 | 44% | 31 |
2 | NAARTTIJARVI, M , (2016) SWEDISH POLICE IMPLEMENTATION OF IMSI-CATCHERS IN A EUROPEAN LAW PERSPECTIVE.COMPUTER LAW & SECURITY REVIEW. VOL. 32. ISSUE 6. P. 852 -867 | 3 | 100% | 0 |
3 | KOZAK, F , HUDEC, P , (2014) RADIO SENSOR FOR MONITORING OF UMTS MOBILE TERMINALS.RADIOENGINEERING. VOL. 23. ISSUE 2. P. 594-600 | 3 | 100% | 0 |
4 | SAMET, R , CELIK, OF , (2016) FAKE GSM BASE STATION ATTACK DETECTION ALGORITHM.JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY. VOL. 31. ISSUE 1. P. 161 -169 | 3 | 75% | 0 |
5 | VALES-ALONSO, J , GONZALEZ-CASTANO, FJ , POUSADA-CARBALLO, JM , (2003) EXPERIMENTAL REAL-TIME DETECTOR OF GSM TERMINALS.IEEE COMMUNICATIONS LETTERS. VOL. 7. ISSUE 3. P. 148-149 | 3 | 100% | 0 |
6 | RYOO, JW , CHOI, YB , OH, TH , CORBIN, G , (2009) A MULTI-DIMENSIONAL CLASSIFICATION FRAMEWORK FOR DEVELOPING CONTEXT-SPECIFIC WIRELESS LOCAL AREA NETWORK ATTACK TAXONOMIES.INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS. VOL. 7. ISSUE 2. P. 253-267 | 2 | 100% | 3 |
7 | LIU, FH , LO, HF , CHEN, LC , LEE, WT , (2013) COMPREHENSIVE SECURITY INTEGRATED MODEL AND ONTOLOGY WITHIN CLOUD COMPUTING.JOURNAL OF INTERNET TECHNOLOGY. VOL. 14. ISSUE 6. P. 935-945 | 4 | 33% | 7 |
8 | KOIEN, GM , (2007) PRIVACY ENHANCED MOBILE AUTHENTICATION.WIRELESS PERSONAL COMMUNICATIONS. VOL. 40. ISSUE 3. P. 443-455 | 2 | 67% | 1 |
9 | ANAND, C , GNANAMURTHY, RK , (2016) LOCALIZED DOS ATTACK DETECTION ARCHITECTURE FOR RELIABLE DATA TRANSMISSION OVER WIRELESS SENSOR NETWORK.WIRELESS PERSONAL COMMUNICATIONS. VOL. 90. ISSUE 2. P. 847 -859 | 2 | 50% | 0 |
10 | XU, CQ , YANG, F , TENG, J , JIANG, SX , (2015) STEALTHY MOBILE PHONE IDENTITY CATCHER.IEICE TRANSACTIONS ON COMMUNICATIONS. VOL. E98B. ISSUE 3. P. 494 -501 | 1 | 100% | 0 |
Classes with closest relation at Level 1 |