Computer Science
Anomaly Detection
25%
Authentication
50%
Authentication Mechanism
66%
Authentication Protocol
50%
Authorized User
12%
Business Client
50%
Company Management
16%
Comparative Analysis
5%
Computing Environment
8%
Data Privacy
12%
Data Retrieval
12%
Data-Client
8%
Decision-Making
6%
Distributed Denial of Service Attack
25%
Educational Outcome
28%
Elimination Method
8%
Elliptic Curve
9%
Energy Consumption
5%
Engineering Education
25%
Execution Time
9%
Explainable Artificial Intelligence
25%
Explanatory Power
6%
Feature Extraction
8%
Feature Selection
8%
Financial Statement
16%
Hardware-in-the-Loop
6%
Industry 4.0
25%
Information Retrieval
12%
Information Security
5%
Information Storage
12%
Internet of Things Device
10%
Internet-Of-Things
50%
Intrusion Detection System
25%
k-means Clustering
8%
Learning Experiences
7%
Learning System
18%
Long Short-Term Memory Network
25%
Lstm
8%
Machine Learning
18%
Mean Algorithm
8%
Measurement Data
6%
Medical Information
12%
Modern Technology
25%
Multi-Access Edge Computing
50%
Network Intrusion Detection System
6%
Network Security
6%
Performance Improvement
8%
Permitting Access
12%
Potential Threat
12%
Quality Audit
8%
Random Decision Forest
6%
random oracle model
5%
Regularization
25%
Research Result
25%
Retrieving Data
12%
Security Measure
23%
Security protocols
12%
Software-Defined Network
10%
Software-Defined Networking
25%
Statistical Study
16%
Storage System
12%
Supervised Learning
25%
System Efficiency
12%
Systems Performance
6%
User Data
5%
Virtual Reality
25%
Virtual Reality Technology
7%
Economics, Econometrics and Finance
Accounting Standards
50%
Cash Management
5%
Durable Good
16%
Financial Statement
36%
Geopolitical Risks
25%
Real Estate Sector
16%
Stock Exchange
100%
Time Series
16%