Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
36636 | 77 | 25.0 | 32% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
36636 | 1 | STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION | 77 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | STREAM AUTHENTICATION | authKW | 1189696 | 8% | 50% | 6 |
2 | MULTIMEDIA AUTHENTICATION | authKW | 705004 | 5% | 44% | 4 |
3 | MULTICAST AUTHENTICATION | authKW | 528755 | 3% | 67% | 2 |
4 | DATA COMMUN SYST | address | 528751 | 5% | 33% | 4 |
5 | AUTHENTICATION PROBABILITY | authKW | 396567 | 1% | 100% | 1 |
6 | COLLABORATIVE IMAGE TRANSMISSION | authKW | 396567 | 1% | 100% | 1 |
7 | COLOR DEPTH BASED 3D VIDEO | authKW | 396567 | 1% | 100% | 1 |
8 | CROSS RECURRENCE PLOTS | authKW | 396567 | 1% | 100% | 1 |
9 | DATA ENCRYPTION ALGORITHM | authKW | 396567 | 1% | 100% | 1 |
10 | DATA INTEGRITY PROTECTION | authKW | 396567 | 1% | 100% | 1 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 3602 | 56% | 0% | 43 |
2 | Telecommunications | 2411 | 47% | 0% | 36 |
3 | Computer Science, Software Engineering | 1166 | 29% | 0% | 22 |
4 | Computer Science, Theory & Methods | 1062 | 32% | 0% | 25 |
5 | Computer Science, Hardware & Architecture | 484 | 14% | 0% | 11 |
6 | Engineering, Electrical & Electronic | 283 | 36% | 0% | 28 |
7 | Computer Science, Artificial Intelligence | 40 | 6% | 0% | 5 |
8 | Computer Science, Interdisciplinary Applications | 22 | 5% | 0% | 4 |
9 | Medical Informatics | 7 | 1% | 0% | 1 |
10 | Mathematical & Computational Biology | 2 | 1% | 0% | 1 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | DATA COMMUN SYST | 528751 | 5% | 33% | 4 |
2 | UNIT PRINCE ISITCOM HAMMAM SOUSSE | 396567 | 1% | 100% | 1 |
3 | SUPER INFORMAT MATH | 198283 | 1% | 50% | 1 |
4 | UBIQUITOUS NETWORK | 99140 | 1% | 25% | 1 |
5 | AEROSP INFORMAT SECUR TRUST COMP | 44061 | 1% | 11% | 1 |
6 | GRID MIDDLEWARE | 39655 | 1% | 10% | 1 |
7 | ISTI CNR | 39655 | 1% | 10% | 1 |
8 | MULTIMEDIA MOBILE COMMERCE | 39655 | 1% | 10% | 1 |
9 | DIPARTIMENTO ELETTRON PL | 33045 | 1% | 8% | 1 |
10 | TELECOMMUN PROGRAM | 24782 | 3% | 3% | 2 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | IEEE TRANSACTIONS ON MULTIMEDIA | 9775 | 9% | 0% | 7 |
2 | ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS | 8237 | 4% | 1% | 3 |
3 | ACM TRANSACTIONS ON INTERNET TECHNOLOGY | 2213 | 1% | 1% | 1 |
4 | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2213 | 1% | 1% | 1 |
5 | MOBILE NETWORKS & APPLICATIONS | 1664 | 3% | 0% | 2 |
6 | DEFENCE SCIENCE JOURNAL | 1298 | 3% | 0% | 2 |
7 | IET SOFTWARE | 1249 | 1% | 0% | 1 |
8 | SECURITY AND COMMUNICATION NETWORKS | 1142 | 3% | 0% | 2 |
9 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 1120 | 3% | 0% | 2 |
10 | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 1058 | 5% | 0% | 4 |
Author Key Words |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | ZHAO, YF , LO, SW , DENG, RH , DING, XH , (2014) TECHNIQUE FOR AUTHENTICATING H.264/SVC AND ITS PERFORMANCE EVALUATION OVER WIRELESS MOBILE NETWORKS.JOURNAL OF COMPUTER AND SYSTEM SCIENCES. VOL. 80. ISSUE 3. P. 520-532 | 7 | 78% | 1 |
2 | ZHU, XL , CHEN, CW , (2016) A JOINT SOURCE-CHANNEL ADAPTIVE SCHEME FOR WIRELESS H.264/AVC VIDEO AUTHENTICATION.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 11. ISSUE 1. P. 141 -153 | 8 | 53% | 0 |
3 | WANG, W , WANG, CQ , ZHAO, M , (2014) RESOURCE OPTIMIZED TTSH-URA FOR MULTIMEDIA STREAM AUTHENTICATION IN SWALLOWABLE-CAPSULE-BASED WIRELESS BODY SENSOR NETWORKS.IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS. VOL. 18. ISSUE 2. P. 404 -410 | 7 | 54% | 2 |
4 | DENG, RH , DING, XH , LO, SW , (2014) EFFICIENT AUTHENTICATION AND ACCESS CONTROL OF SCALABLE MULTIMEDIA STREAMS OVER PACKET-LOSSY NETWORKS.SECURITY AND COMMUNICATION NETWORKS. VOL. 7. ISSUE 3. P. 611 -625 | 7 | 54% | 0 |
5 | HAMEEDI, MSS , KANNAN, N , (2015) AGENT BASED SECURE MULTICAST AUTHENTICATION ON WIRELESS NETWORK.JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH. VOL. 74. ISSUE 5. P. 271 -276 | 4 | 80% | 0 |
6 | WANG, HX , YIN, BX , (2013) PERCEPTUAL HASHING-BASED ROBUST IMAGE AUTHENTICATION SCHEME FOR WIRELESS MULTIMEDIA SENSOR NETWORKS.INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS. VOL. . ISSUE . P. - | 6 | 50% | 1 |
7 | HEFEEDA, M , MOKHTARIAN, K , (2010) AUTHENTICATION SCHEMES FOR MULTIMEDIA STREAMS: QUANTITATIVE ANALYSIS AND COMPARISON.ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS. VOL. 6. ISSUE 1. P. - | 7 | 44% | 14 |
8 | WANG, W , PENG, DM , WANG, HG , SHARIF, H , CHEN, HH , (2010) A MULTIMEDIA QUALITY-DRIVEN NETWORK RESOURCE MANAGEMENT ARCHITECTURE FOR WIRELESS SENSOR NETWORKS WITH STREAM AUTHENTICATION.IEEE TRANSACTIONS ON MULTIMEDIA. VOL. 12. ISSUE 5. P. 439 -447 | 7 | 41% | 4 |
9 | ZHU, XL , CHEN, CW , (2012) A JOINT LAYERED SCHEME FOR RELIABLE AND SECURE MOBILE JPEG-2000 STREAMING.ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS. VOL. 8. ISSUE 3. P. - | 5 | 50% | 0 |
10 | ZHOU, L , ZHENG, BY , WEI, A , GELLER, B , CUI, JW , (2009) A SCALABLE INFORMATION SECURITY TECHNIQUE: JOINT AUTHENTICATION-CODING MECHANISM FOR MULTIMEDIA OVER HETEROGENEOUS WIRELESS NETWORKS.WIRELESS PERSONAL COMMUNICATIONS. VOL. 51. ISSUE 1. P. 5 -16 | 4 | 67% | 2 |
Classes with closest relation at Level 1 |