[{"name":"犯罪侦查","count":243,"id":1},{"name":"痕迹检验","count":203,"id":2},{"name":"犯罪学与犯罪侦查","count":167,"id":3},{"name":"刑事科学技术与法医","count":160,"id":4},{"name":"刑事政策与刑事法律","count":147,"id":5},{"name":"文件检验","count":127,"id":6},{"name":"Crime and Investigation","count":102,"id":7},{"name":"公安学与公安管理","count":96,"id":8},{"name":"刑事化验","count":94,"id":9},{"name":"法医检验","count":88,"id":10},{"name":"网络安全与信息技术","count":87,"id":11},{"name":"Trace Examination","count":72,"id":12},{"name":"Criminology and Criminal Investigation","count":52,"id":13},{"name":"Criminal Policy and Criminal Law","count":48,"id":14},{"name":"刑事侦查","count":45,"id":15},{"name":"Document Examination","count":44,"id":16},{"name":"公安图像","count":41,"id":17},{"name":"Forensic Science and Forensic Medicine","count":30,"id":18},{"name":"Criminal Chemical Examination","count":23,"id":19},{"name":"Cyber Security and Information Technology","count":19,"id":20},{"name":"刑事犯罪侦查","count":19,"id":21},{"name":"Forensic Medicine Exmination","count":15,"id":22},{"name":"Science of Public Security and Public Security Administration","count":15,"id":23},{"name":"声像检验","count":15,"id":24},{"name":"Criminal Science and Technology and Forensic Medicine","count":12,"id":25},{"name":"Forensic Medicine Examination","count":12,"id":26},{"name":"刑事照相","count":12,"id":27},{"name":"Public Security Image","count":11,"id":28},{"name":"刑事法律研究","count":11,"id":29},{"name":"新时代公安高等教育改革","count":11,"id":30},{"name":"电信网络诈骗犯罪治理","count":10,"id":31},{"name":"反恐怖主义研究","count":9,"id":32},{"name":"Public Security Science and Public Security Management","count":8,"id":33},{"name":"Network Security and Information Technology","count":7,"id":34},{"name":"总体国家安全观视野下的犯罪治理","count":7,"id":35},{"name":"国家安全与反恐","count":6,"id":36},{"name":"治安防控","count":6,"id":37},{"name":"警犬技术","count":6,"id":38},{"name":"Criminology and Criminal Investigatio","count":5,"id":39},{"name":"Cyber Telecom Crime Control","count":5,"id":40},{"name":"Forensic Medicine","count":5,"id":41},{"name":"Public security science and public security management","count":5,"id":42},{"name":"法律·心理","count":5,"id":43},{"name":"犯罪学与犯罪侦查研究","count":5,"id":44},{"name":"经济犯罪侦查","count":5,"id":45},{"name":"Criminal Science and Technology and Forensic Medicin","count":4,"id":46},{"name":"Criminal science and technology and forensic medicine","count":4,"id":47},{"name":"Forensic Chemical","count":4,"id":48},{"name":"Network security and information technology","count":4,"id":49},{"name":"Policing and Policing Management","count":4,"id":50},{"name":"以审判为中心的刑事诉讼制度改革","count":4,"id":51},{"name":"刑法研究","count":4,"id":52},{"name":"毒品犯罪治理","count":4,"id":53},{"name":"法律研究","count":4,"id":54},{"name":"网络犯罪侦查","count":4,"id":55},{"name":"Criminology and criminal investigation","count":3,"id":56},{"name":"National Security and Counterterrorism","count":3,"id":57},{"name":"Network Security and Information Technolog","count":3,"id":58},{"name":"Public Security Science and Public Security Managemen","count":3,"id":59},{"name":"Research on Criminal Law","count":3,"id":60},{"name":"Trial-centered Litigation System Reform","count":3,"id":61},{"name":"侦查研究","count":3,"id":62},{"name":"公安学与公安技术基础理论","count":3,"id":63},{"name":"司法鉴定问题改革","count":3,"id":64},{"name":"国家安全问题研究","count":3,"id":65},{"name":"恐怖主义犯罪治理","count":3,"id":66},{"name":"情报主导警务","count":3,"id":67},{"name":"扫黑除恶中的法律适用","count":3,"id":68},{"name":"数字化犯罪治理","count":3,"id":69},{"name":"未成年人刑事司法保护","count":3,"id":70},{"name":"治安治理与公安管理研究","count":3,"id":71},{"name":"法医医检验","count":3,"id":72},{"name":"缉毒禁毒","count":3,"id":73},{"name":"视频监控与侦查","count":3,"id":74},{"name":"认罪认罚从宽制度","count":3,"id":75},{"name":"重大突发事件中的犯罪防控","count":3,"id":76},{"name":"Anti Terrorism Research","count":2,"id":77},{"name":"Antiterrorism Studies","count":2,"id":78},{"name":"Counter-terrorism Studies","count":2,"id":79},{"name":"Criminal policy and criminal law","count":2,"id":80},{"name":"Griminal Ghemical Examination","count":2,"id":81},{"name":"Issues on Judicial Expertise Reform","count":2,"id":82},{"name":"公安学公安管理","count":2,"id":83},{"name":"刑事科学技术研究","count":2,"id":84},{"name":"法律","count":2,"id":85},{"name":"警犬","count":2,"id":86},{"name":"Crime Control from the Perspective of Overall National Security","count":1,"id":87},{"name":"Crime Prevention in Significant Emergent Events","count":1,"id":88},{"name":"Criminal Governance Under the Overall National Security Concept","count":1,"id":89},{"name":"Forensic Image","count":1,"id":90},{"name":"Intelligence based Policing","count":1,"id":91},{"name":"Investigative Studies","count":1,"id":92},{"name":"Juvenile criminal judicial protection","count":1,"id":93},{"name":"Legal Applications of National Crackdown on Gangs","count":1,"id":94},{"name":"National Security Studies","count":1,"id":95},{"name":"Police Dog Technology","count":1,"id":96},{"name":"Policing and Fundamental Theories of Policing Technology","count":1,"id":97},{"name":"Prevention and Control of Digital Crime","count":1,"id":98},{"name":"Public Order Studies","count":1,"id":99},{"name":"Reform of Public Security Higher Education in the New Era","count":1,"id":100},{"name":"Research on National Security and Counterterrorism","count":1,"id":101},{"name":"Terrorist crime governance","count":1,"id":102},{"name":"专稿","count":1,"id":103},{"name":"信息技术与网络安全研究","count":1,"id":104},{"name":"公安学科基础理论研究","count":1,"id":105},{"name":"公安情报","count":1,"id":106},{"name":"公安视听技术研究","count":1,"id":107},{"name":"刑事法律","count":1,"id":108},{"name":"刑事诉讼法研究","count":1,"id":109},{"name":"国家安全与反恐研究","count":1,"id":110},{"name":"基础学科","count":1,"id":111},{"name":"基础科学","count":1,"id":112},{"name":"治安研究","count":1,"id":113},{"name":"犯罪研究","count":1,"id":114}]