Research Article
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Table 1
Subdiscipline of publications.
| Subdiscipline | Total no. |
| Computer communication networks | 3,197 | Cryptology | 1,261 | Computational intelligence | 832 | Computers and society | 677 | Information systems and communication service | 627 | Software engineering | 541 | Data structures and information theory | 516 | Operating systems | 505 | Robotics and automation | 130 | IT in business | 412 | Electrical engineering | 373 | Security | 274 | Theory of computation | 270 | Coding and information theory | 256 | Database management | 252 | Processor architectures | 235 | E-commerce/e-business | 217 | Image processing and computer vision | 195 | System performance and evaluation | 193 | Simulation and modelling | 185 | Legal aspects of computing | 166 | Circuits and systems | 152 | Programming languages, compilers, interpreters | 145 | Programming techniques | 145 | Computer applications | 140 | Pattern recognition | 134 | Robotics and automation | 130 | Control, robotics, mechatronics | 128 | Information systems applications (incl.Internet) | 121 | Engineering, general | 115 | Security science and technology | 115 | Health informatics | 112 | Computer appl. In administrative data processing | 101 | Computer engineering | 87 | Data storage representation | 86 | Electronics and microelectronics, instrumentation | 81 | Logics and meanings of programs | 81 | Public health | 81 | Medicine/public health, general | 80 | Probability theory and stochastic processes | 78 | Control and systems theory | 76 |
|
|