Computer Science
Anomaly Detection
33%
Application Area
13%
Authentication
66%
Authentication Mechanism
88%
Authentication Protocol
66%
Authorized User
16%
Computer Network
13%
Computing Environment
11%
Cyber Physical Systems
13%
Cybersecurity
66%
Data Privacy
30%
Data Retrieval
16%
Distributed Denial of Service Attack
100%
Elliptic Curve
12%
Engineering Education
33%
Execution Time
12%
Explainable Artificial Intelligence
33%
Federated Learning
66%
Industrial Internet of Things
66%
Industry 4.0
40%
Information Retrieval
16%
Information Storage
16%
Internet of Things Device
14%
Internet-Of-Things
66%
Intrusion Detection System
33%
Leaning Parameter
13%
Learning Approach
66%
Learning System
38%
Long Short-Term Memory Network
33%
Machine Learning
38%
Machine Learning Approach
26%
Massive Amount
13%
Medical Information
16%
Multi-Access Edge Computing
66%
Network Security
21%
Particle Swarm Optimization
66%
Permitting Access
16%
Potential Threat
16%
Primary Objective
13%
Regularization
33%
Retrieving Data
16%
Security Measure
38%
Security protocols
16%
Sensitive Informations
13%
Software-Defined Network
13%
Software-Defined Networking
33%
Storage System
16%
Supervised Learning
33%
System Efficiency
16%
Virtual Reality
33%