Class information for:
Level 1: INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
7457 1365 29.4 29%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
7457 1                   INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION 1365

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 INTRUSION DETECTION authKW 3359554 24% 46% 330
2 INTRUSION DETECTION SYSTEM authKW 1275305 8% 51% 112
3 ALERT CORRELATION authKW 685029 3% 88% 35
4 ANOMALY DETECTION authKW 656682 12% 17% 170
5 MASQUERADE DETECTION authKW 335529 1% 100% 15
6 MISUSE DETECTION authKW 308520 1% 69% 20
7 NETWORK INTRUSION DETECTION authKW 287461 2% 46% 28
8 NETWORK SECURITY authKW 282126 8% 12% 104
9 SYSTEM CALL authKW 207033 1% 49% 19
10 COMPUTER SECURITY authKW 189522 4% 16% 54

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 35041 42% 0% 567
2 Computer Science, Theory & Methods 13962 28% 0% 383
3 Computer Science, Artificial Intelligence 12854 26% 0% 349
4 Telecommunications 10302 23% 0% 318
5 Computer Science, Hardware & Architecture 8763 14% 0% 197
6 Computer Science, Software Engineering 7323 17% 0% 235
7 Engineering, Electrical & Electronic 2023 24% 0% 330
8 Computer Science, Interdisciplinary Applications 1036 8% 0% 109
9 Operations Research & Management Science 340 4% 0% 55
10 Engineering, General 105 3% 0% 36

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECUR GRP SECREG 89474 0% 100% 4
2 RELIABLE SOFTWARE GRP 67100 0% 50% 6
3 INFORMAT SYST ASSURANCE 62130 0% 56% 5
4 CNSIS 44737 0% 100% 2
5 NAI S 44737 0% 100% 2
6 NETWORKED SYST INFORMAT SECUR 44737 0% 100% 2
7 INFORMAT SECUR EXCELLENCE 40261 0% 60% 3
8 COMMUN DECOM 33550 0% 50% 3
9 GRP SIGNALS TELEMAT COMMUN 29823 0% 67% 2
10 IIRTRC ELECT ENGN COMP SCI 29823 0% 67% 2

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMPUTERS & SECURITY 113928 6% 7% 78
2 SECURITY AND COMMUNICATION NETWORKS 41940 4% 4% 51
3 JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 20876 3% 2% 40
4 LECTURE NOTES IN COMPUTER SCIENCE 13515 17% 0% 233
5 IEEE SECURITY & PRIVACY 12740 1% 3% 19
6 COMPUTER NETWORKS 11551 3% 1% 44
7 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT 9340 1% 4% 10
8 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 7775 1% 3% 10
9 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 6673 1% 2% 12
10 COMPUTER COMMUNICATIONS 6133 3% 1% 35

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 INTRUSION DETECTION 3359554 24% 46% 330 Search INTRUSION+DETECTION Search INTRUSION+DETECTION
2 INTRUSION DETECTION SYSTEM 1275305 8% 51% 112 Search INTRUSION+DETECTION+SYSTEM Search INTRUSION+DETECTION+SYSTEM
3 ALERT CORRELATION 685029 3% 88% 35 Search ALERT+CORRELATION Search ALERT+CORRELATION
4 ANOMALY DETECTION 656682 12% 17% 170 Search ANOMALY+DETECTION Search ANOMALY+DETECTION
5 MASQUERADE DETECTION 335529 1% 100% 15 Search MASQUERADE+DETECTION Search MASQUERADE+DETECTION
6 MISUSE DETECTION 308520 1% 69% 20 Search MISUSE+DETECTION Search MISUSE+DETECTION
7 NETWORK INTRUSION DETECTION 287461 2% 46% 28 Search NETWORK+INTRUSION+DETECTION Search NETWORK+INTRUSION+DETECTION
8 NETWORK SECURITY 282126 8% 12% 104 Search NETWORK+SECURITY Search NETWORK+SECURITY
9 SYSTEM CALL 207033 1% 49% 19 Search SYSTEM+CALL Search SYSTEM+CALL
10 COMPUTER SECURITY 189522 4% 16% 54 Search COMPUTER+SECURITY Search COMPUTER+SECURITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 BHUYAN, MH , BHATTACHARYYA, DK , KALITA, JK , (2014) NETWORK ANOMALY DETECTION: METHODS, SYSTEMS AND TOOLS.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 16. ISSUE 1. P. 303 -336 46 59% 47
2 LIN, WC , KE, SW , TSAI, CF , (2015) CANN: AN INTRUSION DETECTION SYSTEM BASED ON COMBINING CLUSTER CENTERS AND NEAREST NEIGHBORS.KNOWLEDGE-BASED SYSTEMS. VOL. 78. ISSUE . P. 13 -21 29 88% 18
3 TSAI, CF , HSU, YF , LIN, CY , LIN, WY , (2009) INTRUSION DETECTION BY MACHINE LEARNING: A REVIEW.EXPERT SYSTEMS WITH APPLICATIONS. VOL. 36. ISSUE 10. P. 11994 -12000 25 83% 130
4 HUBBALLI, N , SURYANARAYANAN, V , (2014) FALSE ALARM MINIMIZATION TECHNIQUES IN SIGNATURE-BASED INTRUSION DETECTION SYSTEMS: A SURVEY.COMPUTER COMMUNICATIONS. VOL. 49. ISSUE . P. 1 -17 25 81% 8
5 WU, SX , BANZHAF, W , (2010) THE USE OF COMPUTATIONAL INTELLIGENCE IN INTRUSION DETECTION SYSTEMS: A REVIEW.APPLIED SOFT COMPUTING. VOL. 10. ISSUE 1. P. 1 -35 37 44% 134
6 CHEN, CM , CHEN, YL , LIN, HC , (2010) AN EFFICIENT NETWORK INTRUSION DETECTION.COMPUTER COMMUNICATIONS. VOL. 33. ISSUE 4. P. 477 -484 23 92% 12
7 KHOR, KC , TING, CY , PHON-AMNUAISUK, S , (2012) A CASCADED CLASSIFIER APPROACH FOR IMPROVING DETECTION RATES ON RARE ATTACK CATEGORIES IN NETWORK INTRUSION DETECTION.APPLIED INTELLIGENCE. VOL. 36. ISSUE 2. P. 320-329 20 91% 25
8 AHMED, M , MAHMOOD, AN , HU, JK , (2016) A SURVEY OF NETWORK ANOMALY DETECTION TECHNIQUES.JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. VOL. 60. ISSUE . P. 19 -31 21 68% 4
9 PATEL, A , TAGHAVI, M , BAKHTIYARI, K , CELESTINO, J , (2013) AN INTRUSION DETECTION AND PREVENTION SYSTEM IN CLOUD COMPUTING: A SYSTEMATIC REVIEW.JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. VOL. 36. ISSUE 1. P. 25-41 22 67% 53
10 ELSHOUSH, HT , OSMAN, IM , (2011) ALERT CORRELATION IN COLLABORATIVE INTELLIGENT INTRUSION DETECTION SYSTEMS-A SURVEY.APPLIED SOFT COMPUTING. VOL. 11. ISSUE 7. P. 4349-4365 18 95% 27

Classes with closest relation at Level 1



Rank Class id link
1 15358 IP TRACEBACK//DDOS//DDOS ATTACKS
2 20510 TRAFFIC CLASSIFICATION//TRAFFIC IDENTIFICATION//APPLICATION IDENTIFICATION
3 27112 ATTACK GRAPH//SECURITY METRICS//MTTSF
4 21011 MALWARE DETECTION//MALWARE//ANDROID SECURITY
5 14382 ONE CLASS CLASSIFICATION//NOVELTY DETECTION//OUTLIER DETECTION
6 20229 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
7 25529 SQL INJECTION ATTACK//SQL INJECTION//SOFTWARE FAULT ISOLATION
8 26164 CELL OUTAGE DETECTION//FAULT PROPAGATION MODEL//EVENT CORRELATION
9 25235 INFORMAT AUTOMAT//EXPLORATORY PROJECTION PURSUIT//ARTIFICIAL INTELLIGENCE PL ELECT
10 30929 RF FINGERPRINT//RADIO FREQUENCY FINGERPRINTING//RADIOMETRIC IDENTIFICATION

Go to start page