Computer Science
Anomaly Detection
33%
Authentication
66%
Authentication Mechanism
88%
Authentication Protocol
66%
Authorized User
16%
Cybersecurity
66%
Data Privacy
30%
Data Retrieval
16%
de-noising
22%
Deep Learning Method
22%
Deep Learning Model
33%
Detection Mechanism
16%
Discriminative Power
16%
Distributed Denial of Service Attack
100%
Engineering Education
33%
Explainable Artificial Intelligence
33%
Extracted Feature
16%
Federated Learning
66%
Industrial Internet of Things
66%
Industry 4.0
40%
Information Retrieval
16%
Information Storage
16%
Internet-Of-Things
66%
Interpretability
33%
Intrusion Detection System
33%
Iris Recognition
33%
iris recognition system
16%
Learning Approach
66%
Learning System
38%
Location Information
16%
Long Short-Term Memory Network
33%
Machine Learning
38%
Machine Learning Approach
26%
Medical Information
16%
Multi-Access Edge Computing
66%
Network Security
21%
Particle Swarm Optimization
66%
Permitting Access
16%
Potential Threat
16%
Probability Map
33%
Regularization
33%
Retrieving Data
16%
Security Measure
38%
Security protocols
16%
Software-Defined Networking
33%
Storage System
16%
Supervised Learning
33%
System Efficiency
16%
Variance Analysis
16%
Virtual Reality
33%