Computer Science
Authentication Mechanism
66%
Internet-Of-Things
50%
Business Client
50%
Authentication
50%
Authentication Protocol
50%
Multi-Access Edge Computing
50%
Industry 4.0
25%
Supervised Learning
25%
Anomaly Detection
25%
Explainable Artificial Intelligence
25%
Intrusion Detection System
25%
Engineering Education
25%
Virtual Reality
25%
Long Short-Term Memory Network
25%
Regularization
25%
Distributed Denial of Service Attack
25%
Software-Defined Networking
25%
Security Measure
23%
Learning System
18%
Machine Learning
18%
Financial Statement
16%
Statistical Study
16%
Company Management
16%
System Efficiency
12%
Information Storage
12%
Authorized User
12%
Security protocols
12%
Retrieving Data
12%
Data Privacy
12%
Permitting Access
12%
Storage System
12%
Information Retrieval
12%
Potential Threat
12%
Medical Information
12%
Data Retrieval
12%
Internet of Things Device
10%
Software-Defined Network
10%
Elliptic Curve
9%
Execution Time
9%
Computing Environment
8%
Elimination Method
8%
Quality Audit
8%
Data-Client
8%
Feature Selection
8%
k-means Clustering
8%
Performance Improvement
8%
Feature Extraction
8%
Mean Algorithm
8%
Lstm
8%
Virtual Reality Technology
7%
Learning Experiences
7%
Systems Performance
6%
Hardware-in-the-Loop
6%
Random Decision Forest
6%
Explanatory Power
6%
Network Security
6%
Decision-Making
6%
Network Intrusion Detection System
6%
Measurement Data
6%
random oracle model
5%
Comparative Analysis
5%
User Data
5%
Information Security
5%
Energy Consumption
5%
Economics, Econometrics and Finance
Stock Exchange
100%
Accounting Standards
50%
Financial Statement
36%
Geopolitical Risks
25%
Durable Good
16%
Time Series
16%
Real Estate Sector
16%
Cash Management
5%