Research Article

Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication

Table 1

Subdiscipline of publications.

SubdisciplineTotal no.

Computer communication networks3,197
Cryptology1,261
Computational intelligence832
Computers and society677
Information systems and communication service627
Software engineering541
Data structures and information theory516
Operating systems505
Robotics and automation130
IT in business412
Electrical engineering373
Security274
Theory of computation270
Coding and information theory256
Database management252
Processor architectures235
E-commerce/e-business217
Image processing and computer vision195
System performance and evaluation193
Simulation and modelling185
Legal aspects of computing166
Circuits and systems152
Programming languages, compilers, interpreters145
Programming techniques145
Computer applications140
Pattern recognition134
Robotics and automation130
Control, robotics, mechatronics128
Information systems applications (incl.Internet)121
Engineering, general115
Security science and technology115
Health informatics112
Computer appl. In administrative data processing101
Computer engineering87
Data storage representation86
Electronics and microelectronics, instrumentation81
Logics and meanings of programs81
Public health81
Medicine/public health, general80
Probability theory and stochastic processes78
Control and systems theory76