Computer Science
Intrusion Detection
100%
Deep Learning Method
100%
Big Data Environment
100%
Big Data
100%
Threat Detection
100%
Internet-Of-Things
77%
Machine Learning
72%
Network Traffic
66%
Deep Learning Model
55%
Cyber Attack
55%
Intrusion Detection System
50%
Cybersecurity
44%
Industry 4.0
33%
Malicious Activity
27%
Smart Environment
27%
Research Project
27%
Industrial Application
27%
Botnets
22%
Smart City
22%
Leaning Parameter
16%
Security Solution
16%
Malware
16%
Essential Feature
16%
Support Vector Machine
16%
Security Architecture
16%
Industrial Environment
16%
Internet of Medical Things
16%
Learning System
11%
Traffic Characteristic
11%
Data Preprocessing
11%
Detection Accuracy
11%
Testbed
11%
Detection Rate
11%
Sybil Attack
11%
Map-Reduce
11%
Clustering Algorithm
11%
Time Complexity
11%
classification result
11%
Feature Selection
11%
Training Process
11%
Computer Network
11%
Grey Wolf Optimization
11%
Data Partitioning
11%
Feature Extraction
11%
Evaluation Models
11%
Sampling Data
11%
Trust Management
11%
Smart Device
11%
Research Direction
11%
Data Partition
5%
Data Processing
5%
Denial-of-Service Attack
5%
Statistical Approach
5%
Evaluation Measure
5%
Data Preparation
5%
Network Forensics
5%
Information Study
5%
Hierarchical Clustering
5%
Class Imbalance
5%
Preprocessing Phase
5%
Benchmarking
5%
Simulation Environment
5%
Fair Comparison
5%
Experimental Result
5%
Quality of Service
5%
Learning Process
5%
Management Tool
5%
Virtual Machine
5%
Parameter Value
5%
Final Decision
5%
Machine Learning Algorithm
5%
Discriminative Power
5%
Learning Technique
5%
Learning Algorithm
5%
Web of Science
5%
Interface System
5%
Industrial Internet of Things
5%
Training Dataset
5%
Human Intervention
5%
Data Transformation
5%
Model Complexity
5%
Threat Intelligence
5%
Successful Completion
5%
Process Optimization
5%
Ensemble Learning
5%
Membership Function
5%
Cybersecurity Framework
5%
Evaluation Result
5%
Stratified Random
5%
Behavioral Feature
5%
Clustered Data
5%
Anomaly Detection
5%
Detection Process
5%
Sensor Network
5%
Optimization Problem
5%
Security Vulnerability
5%
Attack Prevention
5%
Future Generation
5%
Fuzzy Mathematics
5%
System Implementation
5%
Attack Surface
5%
Learning Network
5%
Network Estimation
5%
Data Mining
5%
Deep Autoencoder
5%
Long Short-Term Memory Network
5%
Random Decision Forest
5%
Objective Optimization
5%
Cybercriminals
5%
Extreme Gradient Boosting
5%
Massive Amount
5%
Autoencoder
5%
Hybrid Approach
5%
Generalization Ability
5%
Online Transaction
5%
Computer System
5%
Parallel Processing
5%
Normal Traffic
5%
Class Imbalance Problem
5%
Ensemble Approach
5%
Use Case
5%
Variational Autoencoder
5%
Legitimate Traffic
5%
Data Analytics
5%
Deep Neural Network
5%
Computational Complexity
5%
Malicious Attack
5%
United States of America
5%
Literature Review
5%
Machine Learning Model
5%