Research Article
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Table 1
Subdiscipline of publications.
| | Subdiscipline | Total no. |
| | Computer communication networks | 3,197 | | Cryptology | 1,261 | | Computational intelligence | 832 | | Computers and society | 677 | | Information systems and communication service | 627 | | Software engineering | 541 | | Data structures and information theory | 516 | | Operating systems | 505 | | Robotics and automation | 130 | | IT in business | 412 | | Electrical engineering | 373 | | Security | 274 | | Theory of computation | 270 | | Coding and information theory | 256 | | Database management | 252 | | Processor architectures | 235 | | E-commerce/e-business | 217 | | Image processing and computer vision | 195 | | System performance and evaluation | 193 | | Simulation and modelling | 185 | | Legal aspects of computing | 166 | | Circuits and systems | 152 | | Programming languages, compilers, interpreters | 145 | | Programming techniques | 145 | | Computer applications | 140 | | Pattern recognition | 134 | | Robotics and automation | 130 | | Control, robotics, mechatronics | 128 | | Information systems applications (incl.Internet) | 121 | | Engineering, general | 115 | | Security science and technology | 115 | | Health informatics | 112 | | Computer appl. In administrative data processing | 101 | | Computer engineering | 87 | | Data storage representation | 86 | | Electronics and microelectronics, instrumentation | 81 | | Logics and meanings of programs | 81 | | Public health | 81 | | Medicine/public health, general | 80 | | Probability theory and stochastic processes | 78 | | Control and systems theory | 76 |
|
|