Computer Science
5G Mobile Communication
5%
Academic Community
5%
Analysis Methodology
5%
Anomaly Detection
65%
Artificial Intelligence
65%
Artificial Intelligence Model
5%
Authentication
5%
Authentication Mechanism
5%
Authentication Method
5%
Authentication Protocol
5%
Beyond 5G
5%
City Initiative
5%
Communication Design
5%
Communication Model
5%
Communication Network
5%
Communication Protocol
5%
Communication Technique
5%
Computer Network
10%
Critical Infrastructure
10%
Critical System
5%
Cybersecurity
10%
Data Mining
5%
Deep Learning Method
15%
Deep Learning Technique
10%
Deep Reinforcement Learning
10%
Detection Mechanism
5%
Development Framework
5%
Differential Privacy
5%
Digital Service
10%
Distributed Denial of Service Attack
10%
Distribution Method
5%
Dynamic Resource Allocation
25%
Effective Communication
5%
Energy Consumption
20%
Energy Efficiency
20%
Energy Efficient
5%
Environmental Concern
5%
Environmental Conservation
5%
Expected Outcome
20%
Facilitate Understanding
5%
Future Development
5%
Healthcare Service
5%
Input Parameter
5%
Internet-Of-Things
85%
Intrusion Detection
5%
Intrusion Detection System
15%
IoT Application
5%
Knowledge Discovery
5%
Leaning Parameter
5%
Learning Approach
5%
Literature Review
5%
Malicious Activity
5%
Malicious Attack
5%
Memory Model
5%
Metaheuristics
20%
Methodologies and Framework
10%
Microservice
5%
Mobile Computing
5%
Modeling and Simulation
5%
Network Environment
5%
Network Operation
5%
Network Performance
10%
Network Reliability
5%
Network Resource
15%
Network Security
10%
Objective Research
5%
Operational Cost
5%
Operational Efficiency
5%
Optimization Algorithm
5%
Outcome Simulation
5%
Peer Review Process
5%
Primary Objective
5%
Process Optimization
5%
Quality of Service
5%
Radiology Information System
20%
Real Application
5%
Reflecting Surface
25%
Research Direction
5%
Research Problem
10%
Residual Energy
5%
Resource Allocation
35%
routing scheme
5%
Scientific Knowledge
10%
Secure Communication
100%
Security Breach
5%
Security Implication
5%
Security Incident
5%
Security Measure
5%
Security Mechanism
5%
Security protocols
5%
Security Requirements
5%
Sensitive Informations
5%
Service Provider
10%
Simulation Mode
5%
Smart City
15%
Technological Development
5%
Telecommunication
30%
Traffic Management
5%
Transmission Process
5%
Unauthorized Access
5%
Unmanned Aerial Vehicle
5%
Urban Environment
5%
Use Case
5%
Vehicular Communication
5%
Visible Spectrum
5%
Wireless Communication
20%