[{"name":"犯罪侦查","count":244,"id":1},{"name":"痕迹检验","count":203,"id":2},{"name":"犯罪学与犯罪侦查","count":165,"id":3},{"name":"刑事科学技术与法医","count":160,"id":4},{"name":"刑事政策与刑事法律","count":149,"id":5},{"name":"文件检验","count":127,"id":6},{"name":"Crime and Investigation","count":102,"id":7},{"name":"公安学与公安管理","count":96,"id":8},{"name":"刑事化验","count":94,"id":9},{"name":"法医检验","count":88,"id":10},{"name":"网络安全与信息技术","count":88,"id":11},{"name":"Trace Examination","count":72,"id":12},{"name":"Criminal Policy and Criminal Law","count":49,"id":13},{"name":"Criminology and Criminal Investigation","count":49,"id":14},{"name":"刑事侦查","count":45,"id":15},{"name":"Document Examination","count":44,"id":16},{"name":"公安图像","count":41,"id":17},{"name":"Forensic Science and Forensic Medicine","count":30,"id":18},{"name":"Criminal Chemical Examination","count":23,"id":19},{"name":"Cyber Security and Information Technology","count":19,"id":20},{"name":"刑事犯罪侦查","count":19,"id":21},{"name":"Forensic Medicine Exmination","count":15,"id":22},{"name":"Science of Public Security and Public Security Administration","count":15,"id":23},{"name":"声像检验","count":15,"id":24},{"name":"Criminal Science and Technology and Forensic Medicine","count":12,"id":25},{"name":"Forensic Medicine Examination","count":12,"id":26},{"name":"刑事照相","count":12,"id":27},{"name":"Public Security Image","count":11,"id":28},{"name":"新时代公安高等教育改革","count":11,"id":29},{"name":"电信网络诈骗犯罪治理","count":10,"id":30},{"name":"反恐怖主义研究","count":9,"id":31},{"name":"Public Security Science and Public Security Management","count":8,"id":32},{"name":"国家安全与反恐","count":8,"id":33},{"name":"Network Security and Information Technology","count":7,"id":34},{"name":"总体国家安全观视野下的犯罪治理","count":7,"id":35},{"name":"治安防控","count":6,"id":36},{"name":"警犬技术","count":6,"id":37},{"name":"Criminology and Criminal Investigatio","count":5,"id":38},{"name":"Cyber Telecom Crime Control","count":5,"id":39},{"name":"Forensic Medicine","count":5,"id":40},{"name":"Public security science and public security management","count":5,"id":41},{"name":"法律·心理","count":5,"id":42},{"name":"经济犯罪侦查","count":5,"id":43},{"name":"Criminal Science and Technology and Forensic Medicin","count":4,"id":44},{"name":"Criminal science and technology and forensic medicine","count":4,"id":45},{"name":"Forensic Chemical","count":4,"id":46},{"name":"Network security and information technology","count":4,"id":47},{"name":"Policing and Policing Management","count":4,"id":48},{"name":"以审判为中心的刑事诉讼制度改革","count":4,"id":49},{"name":"毒品犯罪治理","count":4,"id":50},{"name":"法律研究","count":4,"id":51},{"name":"网络犯罪侦查","count":4,"id":52},{"name":"Criminology and criminal investigation","count":3,"id":53},{"name":"National Security and Counterterrorism","count":3,"id":54},{"name":"Network Security and Information Technolog","count":3,"id":55},{"name":"Public Security Science and Public Security Managemen","count":3,"id":56},{"name":"Trial-centered Litigation System Reform","count":3,"id":57},{"name":"公安学与公安技术基础理论","count":3,"id":58},{"name":"司法鉴定问题改革","count":3,"id":59},{"name":"国家安全问题研究","count":3,"id":60},{"name":"恐怖主义犯罪治理","count":3,"id":61},{"name":"情报主导警务","count":3,"id":62},{"name":"扫黑除恶中的法律适用","count":3,"id":63},{"name":"数字化犯罪治理","count":3,"id":64},{"name":"未成年人刑事司法保护","count":3,"id":65},{"name":"法医医检验","count":3,"id":66},{"name":"缉毒禁毒","count":3,"id":67},{"name":"视频监控与侦查","count":3,"id":68},{"name":"认罪认罚从宽制度","count":3,"id":69},{"name":"重大突发事件中的犯罪防控","count":3,"id":70},{"name":"Anti Terrorism Research","count":2,"id":71},{"name":"Antiterrorism Studies","count":2,"id":72},{"name":"Counter-terrorism Studies","count":2,"id":73},{"name":"Criminal policy and criminal law","count":2,"id":74},{"name":"Griminal Ghemical Examination","count":2,"id":75},{"name":"Issues on Judicial Expertise Reform","count":2,"id":76},{"name":"公安学公安管理","count":2,"id":77},{"name":"法律","count":2,"id":78},{"name":"警犬","count":2,"id":79},{"name":"Crime Control from the Perspective of Overall National Security","count":1,"id":80},{"name":"Crime Prevention in Significant Emergent Events","count":1,"id":81},{"name":"Criminal Governance Under the Overall National Security Concept","count":1,"id":82},{"name":"Forensic Image","count":1,"id":83},{"name":"Intelligence based Policing","count":1,"id":84},{"name":"Juvenile criminal judicial protection","count":1,"id":85},{"name":"Legal Applications of National Crackdown on Gangs","count":1,"id":86},{"name":"National Security Studies","count":1,"id":87},{"name":"Police Dog Technology","count":1,"id":88},{"name":"Policing and Fundamental Theories of Policing Technology","count":1,"id":89},{"name":"Prevention and Control of Digital Crime","count":1,"id":90},{"name":"Reform of Public Security Higher Education in the New Era","count":1,"id":91},{"name":"Terrorist crime governance","count":1,"id":92},{"name":"专稿","count":1,"id":93},{"name":"公安情报","count":1,"id":94},{"name":"刑事法律","count":1,"id":95},{"name":"基础学科","count":1,"id":96},{"name":"基础科学","count":1,"id":97}]