Class information for:
Level 1: TRUST MANAGEMENT//TRUST MODEL//REPUTATION SYSTEM

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
4035 1860 29.7 30%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1665 2             PEER TO PEER//PEER TO PEER NETWORKS//PEER-TO-PEER NETWORKING AND APPLICATIONS 6842
4035 1                   TRUST MANAGEMENT//TRUST MODEL//REPUTATION SYSTEM 1860

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 TRUST MANAGEMENT authKW 816747 5% 51% 98
2 TRUST MODEL authKW 662025 4% 61% 66
3 REPUTATION SYSTEM authKW 466918 2% 66% 43
4 WORMHOLE ATTACK authKW 366841 2% 72% 31
5 MOBILE AD HOC NETWORKS authKW 307690 7% 14% 133
6 REPUTATION authKW 285379 8% 12% 146
7 REPUTATION SYSTEMS authKW 271700 2% 47% 35
8 SECURE ROUTING authKW 270816 2% 50% 33
9 TRUST EVALUATION authKW 230101 1% 52% 27
10 MANET authKW 195665 5% 13% 89

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 57822 46% 0% 849
2 Telecommunications 43358 40% 0% 752
3 Computer Science, Hardware & Architecture 14378 16% 0% 294
4 Computer Science, Theory & Methods 14347 24% 0% 455
5 Computer Science, Software Engineering 6177 14% 0% 254
6 Computer Science, Artificial Intelligence 5719 15% 0% 277
7 Engineering, Electrical & Electronic 3366 26% 0% 491
8 Computer Science, Interdisciplinary Applications 555 5% 0% 98
9 Automation & Control Systems 134 2% 0% 40
10 Operations Research & Management Science 95 2% 0% 39

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ALGORITHMS SECUR GRP 52527 0% 80% 4
2 EMEDIA 37517 0% 57% 4
3 INGN INFORMAC COMUNICAC 37501 1% 19% 12
4 DCSL 36932 0% 75% 3
5 BUSINESS INFORMAT TECHNOL MEDIA 32830 0% 100% 2
6 EXTENDED ENTERPRISE BUSINESS INTELLIGENCE 32830 0% 100% 2
7 GRP IND UNIV COOPERAT 32830 0% 100% 2
8 INFORMAT TECHNOL COMMUN SECUR 32830 0% 100% 2
9 MULTIMEDIA NETWORKS CEMNET 32830 0% 100% 2
10 YD 32830 0% 100% 2

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECURITY AND COMMUNICATION NETWORKS 61349 4% 5% 72
2 PEER-TO-PEER NETWORKING AND APPLICATIONS 34546 2% 7% 29
3 AD HOC NETWORKS 22594 2% 3% 42
4 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 21282 1% 5% 25
5 IEEE TRANSACTIONS ON MOBILE COMPUTING 12302 2% 2% 37
6 COMPUTATIONAL INTELLIGENCE 11381 1% 4% 19
7 COMPUTER NETWORKS 10495 3% 1% 49
8 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 10401 2% 2% 33
9 COMPUTERS & SECURITY 9978 1% 2% 27
10 ELECTRONIC COMMERCE RESEARCH 7289 0% 5% 9

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 TRUST MANAGEMENT 816747 5% 51% 98 Search TRUST+MANAGEMENT Search TRUST+MANAGEMENT
2 TRUST MODEL 662025 4% 61% 66 Search TRUST+MODEL Search TRUST+MODEL
3 REPUTATION SYSTEM 466918 2% 66% 43 Search REPUTATION+SYSTEM Search REPUTATION+SYSTEM
4 WORMHOLE ATTACK 366841 2% 72% 31 Search WORMHOLE+ATTACK Search WORMHOLE+ATTACK
5 MOBILE AD HOC NETWORKS 307690 7% 14% 133 Search MOBILE+AD+HOC+NETWORKS Search MOBILE+AD+HOC+NETWORKS
6 REPUTATION 285379 8% 12% 146 Search REPUTATION Search REPUTATION
7 REPUTATION SYSTEMS 271700 2% 47% 35 Search REPUTATION+SYSTEMS Search REPUTATION+SYSTEMS
8 SECURE ROUTING 270816 2% 50% 33 Search SECURE+ROUTING Search SECURE+ROUTING
9 TRUST EVALUATION 230101 1% 52% 27 Search TRUST+EVALUATION Search TRUST+EVALUATION
10 MANET 195665 5% 13% 89 Search MANET Search MANET

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 KUMAR, S , DUTTA, K , (2016) INTRUSION DETECTION IN MOBILE AD HOC NETWORKS: TECHNIQUES, SYSTEMS, AND FUTURE CHALLENGES.SECURITY AND COMMUNICATION NETWORKS. VOL. 9. ISSUE 14. P. 2484 -2556 57 59% 0
2 RUAN, YF , DURRESI, A , (2016) A SURVEY OF TRUST MANAGEMENT SYSTEMS FOR ONLINE SOCIAL COMMUNITIES - TRUST MODELING, TRUST INFERENCE AND ATTACKS.KNOWLEDGE-BASED SYSTEMS. VOL. 106. ISSUE . P. 150 -163 35 71% 0
3 BIDGOLY, AJ , LADANI, BT , (2016) BENCHMARKING REPUTATION SYSTEMS: A QUANTITATIVE VERIFICATION APPROACH.COMPUTERS IN HUMAN BEHAVIOR. VOL. 57. ISSUE . P. 274 -291 23 88% 2
4 BIDGOLY, AJ , LADANI, BT , (2016) MODELING AND QUANTITATIVE VERIFICATION OF TRUST SYSTEMS AGAINST MALICIOUS ATTACKERS.COMPUTER JOURNAL. VOL. 59. ISSUE 7. P. 1005 -1027 24 96% 0
5 JIANG, WJ , WANG, GJ , BHUIYAN, MZA , WU, J , (2016) UNDERSTANDING GRAPH-BASED TRUST EVALUATION IN ONLINE SOCIAL NETWORKS: METHODOLOGIES AND CHALLENGES.ACM COMPUTING SURVEYS. VOL. 49. ISSUE 1. P. - 31 70% 0
6 KRAOUNAKIS, S , DEMETROPOULOS, IN , MICHALAS, A , OBAIDAT, MS , SARIGIANNIDIS, PG , LOUTA, MD , (2015) A ROBUST REPUTATION-BASED COMPUTATIONAL MODEL FOR TRUST ESTABLISHMENT IN PERVASIVE SYSTEMS.IEEE SYSTEMS JOURNAL. VOL. 9. ISSUE 3. P. 878 -891 25 86% 1
7 BIDGOLY, AJ , LADANI, BT , (2015) MODELLING AND QUANTITATIVE VERIFICATION OF REPUTATION SYSTEMS AGAINST MALICIOUS ATTACKERS.COMPUTER JOURNAL. VOL. 58. ISSUE 10. P. 2567 -2582 19 90% 0
8 VAVILIS, S , PETKOVIC, M , ZANNONE, N , (2014) A REFERENCE MODEL FOR REPUTATION SYSTEMS.DECISION SUPPORT SYSTEMS. VOL. 61. ISSUE . P. 147 -154 19 79% 15
9 AHMED, A , ABU BAKAR, K , CHANNA, MI , HASEEB, K , KHAN, AW , (2015) A SURVEY ON TRUST BASED DETECTION AND ISOLATION OF MALICIOUS NODES IN AD-HOC AND SENSOR NETWORKS.FRONTIERS OF COMPUTER SCIENCE. VOL. 9. ISSUE 2. P. 280 -296 18 86% 4
10 FAN, XX , LI, MC , MA, JH , REN, YZ , ZHAO, H , SU, ZY , (2012) BEHAVIOR-BASED REPUTATION MANAGEMENT IN P2P FILE-SHARING NETWORKS.JOURNAL OF COMPUTER AND SYSTEM SCIENCES. VOL. 78. ISSUE 6. P. 1737 -1750 19 86% 9

Classes with closest relation at Level 1



Rank Class id link
1 5759 KEY MANAGEMENT//GROUP KEY MANAGEMENT//KEY PREDISTRIBUTION
2 28189 TRUST NEGOTIATION//AUTOMATED TRUST NEGOTIATION//SOFTWARE TRUSTWORTHINESS
3 30058 USER BEHAVIOR SIMILARITY//LOCATION PROXIMITY//WEB BASED SOCIAL NETWORKS
4 33882 INTEROPERABLE TRANSACTIONS//SPONTANEOUS NETWORK//ACCOUNTABLE CLOUD SERVICE ACS
5 28668 JAMMING ATTACK//JAMMING//REACTIVE JAMMING
6 2369 PEER TO PEER//PEER TO PEER NETWORKS//P2P
7 28772 AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR
8 6256 DELAY TOLERANT NETWORKS//OPPORTUNISTIC NETWORKS//DTN
9 5659 CONNECTED DOMINATING SET//MOBILE AD HOC NETWORKS//AD HOC NETWORKS
10 28047 HIMALIS//FUTURE NETWORK//NEW GENERATION NETWORK

Go to start page