Computer Science
Distributed Denial of Service Attack
100%
Authentication Mechanism
88%
Internet-Of-Things
66%
Authentication
66%
Multi-Access Edge Computing
66%
Particle Swarm Optimization
66%
Learning Approach
66%
Cybersecurity
66%
Industrial Internet of Things
66%
Federated Learning
66%
Authentication Protocol
66%
Industry 4.0
40%
Security Measure
38%
Learning System
38%
Machine Learning
38%
Supervised Learning
33%
Anomaly Detection
33%
Explainable Artificial Intelligence
33%
Intrusion Detection System
33%
Engineering Education
33%
Virtual Reality
33%
Long Short-Term Memory Network
33%
Regularization
33%
Software-Defined Networking
33%
Data Privacy
30%
Machine Learning Approach
26%
Network Security
21%
System Efficiency
16%
Information Storage
16%
Authorized User
16%
Security protocols
16%
Retrieving Data
16%
Information Retrieval
16%
Medical Information
16%
Data Retrieval
16%
Permitting Access
16%
Storage System
16%
Potential Threat
16%
Internet of Things Device
14%
Primary Objective
13%
Sensitive Informations
13%
Computer Network
13%
Cyber Physical Systems
13%
Massive Amount
13%
Application Area
13%
Leaning Parameter
13%
Software-Defined Network
13%
Execution Time
12%
Elliptic Curve
12%
Computing Environment
11%