↓ Skip to main content

Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive…

Overview of attention for book
Cover of 'Availability, Reliability, and Security in Information Systems : IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Availability, Reliability, and Security in Information Systems
  3. Altmetric Badge
    Chapter 2 A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method Architecture
  4. Altmetric Badge
    Chapter 3 Metrics-Based Incremental Determinization of Finite Automata
  5. Altmetric Badge
    Chapter 4 Towards Developing Secure Software Using Problem-Oriented Security Patterns
  6. Altmetric Badge
    Chapter 5 Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services
  7. Altmetric Badge
    Chapter 6 A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven Engineering
  8. Altmetric Badge
    Chapter 7 Adaptive User-Centered Security
  9. Altmetric Badge
    Chapter 8 Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital
  10. Altmetric Badge
    Chapter 9 Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers
  11. Altmetric Badge
    Chapter 10 Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE
  12. Altmetric Badge
    Chapter 11 Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)
  13. Altmetric Badge
    Chapter 12 Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters
  14. Altmetric Badge
    Chapter 13 Crypto-Biometric Models for Information Secrecy
  15. Altmetric Badge
    Chapter 14 One-Time Biometrics for Online Banking and Electronic Payment Authentication
  16. Altmetric Badge
    Chapter 15 Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices
  17. Altmetric Badge
    Chapter 16 Availability, Reliability, and Security in Information Systems
  18. Altmetric Badge
    Chapter 17 Availability, Reliability, and Security in Information Systems
  19. Altmetric Badge
    Chapter 18 Availability, Reliability, and Security in Information Systems
  20. Altmetric Badge
    Chapter 19 Availability, Reliability, and Security in Information Systems
  21. Altmetric Badge
    Chapter 20 Availability, Reliability, and Security in Information Systems
  22. Altmetric Badge
    Chapter 21 Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering
  23. Altmetric Badge
    Chapter 22 Availability, Reliability, and Security in Information Systems
  24. Altmetric Badge
    Chapter 23 Availability, Reliability, and Security in Information Systems
  25. Altmetric Badge
    Chapter 24 Availability, Reliability, and Security in Information Systems
Attention for Chapter 22: Availability, Reliability, and Security in Information Systems
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (80th percentile)
  • Good Attention Score compared to outputs of the same age and source (67th percentile)

Mentioned by

news
1 news outlet

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Availability, Reliability, and Security in Information Systems
Chapter number 22
Book title
Availability, Reliability, and Security in Information Systems
Published in
Lecture notes in computer science, September 2014
DOI 10.1007/978-3-319-10975-6_22
Book ISBNs
978-3-31-910974-9, 978-3-31-910975-6
Authors

Guohong Zhao, Wanrong Yu, Baokang Zhao, Chunqing Wu

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 67%
Other 1 33%
Readers by discipline Count As %
Computer Science 3 100%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 7. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 28 November 2016.
All research outputs
#4,196,076
of 22,903,988 outputs
Outputs from Lecture notes in computer science
#988
of 8,129 outputs
Outputs of similar age
#43,685
of 238,803 outputs
Outputs of similar age from Lecture notes in computer science
#20
of 223 outputs
Altmetric has tracked 22,903,988 research outputs across all sources so far. Compared to these this one has done well and is in the 80th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,129 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 82% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 238,803 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 80% of its contemporaries.
We're also able to compare this research output to 223 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 67% of its contemporaries.