Engineering & Materials Science
Blockchain
100%
Deep learning
78%
Internet of things
75%
Security of data
73%
Big data
72%
Health
55%
Machine learning
51%
Intrusion detection
49%
Communication
48%
Students
47%
Malware
47%
Monitoring
44%
Binary codes
42%
Denial-of-service attack
41%
Education
39%
Network protocols
38%
Advanced metering infrastructures
29%
Industry
27%
Unmanned aerial vehicles (UAV)
26%
Access control
24%
Teaching
24%
Classifiers
24%
Clustering algorithms
24%
Smart power grids
23%
Cryptography
23%
Data mining
23%
Computer crime
22%
Experiments
21%
Internet
21%
Long short-term memory
21%
Sensors
20%
Vehicular ad hoc networks
20%
Cognitive radio
20%
Plug-in electric vehicles
20%
Local area networks
19%
Scanning
19%
Anomaly detection
19%
Curricula
18%
Artificial intelligence
18%
Cloud computing
18%
Electric vehicles
17%
Reverse engineering
17%
Feature extraction
17%
Biometrics
17%
Digital forensics
16%
Wireless local area networks (WLAN)
16%
Mobile computing
16%
Electric load forecasting
16%
Sensor networks
15%
Packet networks
15%
Quality of service
15%
Scalability
14%
Network security
14%
Throughput
14%
Customer satisfaction
14%
Intensive care units
14%
Servers
14%
Learning algorithms
14%
Taxonomies
13%
Data Analytics
13%
Authentication
13%
Fuzzy logic
12%
Convolutional neural networks
12%
Semantics
12%
Websites
12%
Computer networks
12%
Risk assessment
12%
Statistics
12%
Information technology
11%
Wireless networks
11%
eHealth
11%
Time series
11%
Mobile ad hoc networks
11%
Switches
11%
Fog computing
11%
Topology
10%
Data structures
10%
Costs
10%
Data Sharing
9%
Network performance
9%
Mobile agents
9%
Data storage equipment
9%
Industrial internet of things (IIoT)
9%
Smart meters
9%
Large dataset
9%
Bins
9%
Marketing
9%
Vehicle-to-grid
9%
Data streams
9%
Gamification
9%
Nearest neighbor search
9%
Software defined networking
8%
Crack detection
8%
Statistical tests
8%
Peeling
8%
Data privacy
8%
Genetic algorithms
8%
Deep neural networks
8%
Steganography
8%
Availability
8%
Mathematics
Learning
27%
Load Forecasting
21%
Electric Vehicle
21%
Smart Grid
20%
Healthcare
17%
Machine Learning
15%
Ensemble
15%
Traffic
14%
Health
14%
Vehicular Ad Hoc Networks
14%
Model
13%
Communication
13%
Plug-in
13%
Memory Term
12%
Attack
12%
Evaluation
11%
Transactions
10%
Privacy
10%
Multisequences
10%
Classifier
9%
Sensor Networks
9%
Feature Selection
9%
Energy
9%
Framework
8%
Prediction
8%
Sensor
8%
Resources
8%
Social Networks
8%
Role-based Access Control
8%
Internet of Things
7%
Memory Model
7%
Ensemble Methods
7%
Scalability
7%
Software
7%
Wireless Sensor Networks
7%
One-class Classification
7%
Electronics
7%
Performance
7%
Vertex of a graph
7%
Emotion Recognition
7%
Query
7%
Evaluate
7%
Peer to Peer
7%
Routing
6%
Access Control
6%
Data Streams
6%
Privacy Preserving
6%
Concept Drift
6%
Spectrum Sensing
6%
Regression
6%
Plasmon
6%
Covert Channel
6%
Output
6%
Review
6%
Classification Problems
6%
Unmanned Aerial Vehicle
6%
Echocardiography
6%
Mobile Ad Hoc Networks
6%
Binary Code
6%
Cognitive Radio
6%
Text Categorization
6%
Firewall
6%
Social Influence
5%
Data Mining
5%
Steganalysis
5%
Backbone
5%
Information Extraction
5%
Optimization
5%
Collision Avoidance
5%
Training
5%
Customer Satisfaction
5%
Genetic Algorithm
5%
Trend Analysis
5%
Taxonomy
5%
Nearest Neighbor Search
5%
Range Query
5%
Model Uncertainty
5%
Coding
5%
Hyperparameters
5%
Federation
5%
Network Traffic
5%
Fingerprinting
5%
Energy Consumption
5%
Profile
5%
Data Quality
5%
Multi-model
5%
Multimedia
5%
Learning Algorithm
5%
Architecture
5%
Random Forest
5%
Business & Economics
Deep Learning
43%
Big Data
41%
Attack
28%
Internet of Things
25%
Prediction
20%
Machine Learning
17%
Ad Hoc Networks
17%
Information Security
15%
United Arab Emirates
15%
Cybersecurity
14%
Education
13%
Intrusion Detection System
12%
Node
12%
Cloud Services
11%
Curriculum
11%
Service Selection
9%
Multi-agent Systems
9%
Feature Selection
9%
Resources
9%
New Zealand
9%
Learning Algorithm
9%
Telemedicine
9%
Healthcare
8%
Denial
8%
Learning Model
8%
Electric Vehicle
8%
Technology Adoption
8%
Trust Model
8%
Threat
8%
Vulnerability
7%
Artificial Intelligence
7%
Twitter
7%
Privacy
7%
Performance Evaluation
7%
Data Quality
7%
Quality Management
7%
Critical Success Factors
7%
Quality Evaluation
7%
Local Area Networks
7%
Cloud Computing
7%
Communication
7%
Enforcement
6%
At-risk Students
6%
Energy
6%
Energy Trading
6%
Experiment
6%
Data Mining
6%
Routing Protocol
6%
Modeling
6%
Authentication
6%
Cognitive Radio
5%
Intrusion Detection
5%
Diffusion Process
5%
Extremism
5%
Quality Assessment
5%
Linux
5%
Simulation
5%
Sensor Networks
5%
Exercise
5%
Small and Medium-sized Enterprises (SMEs)
5%
Information Systems
5%
Mobile Devices
5%
Information Extraction
5%
Software piracy
5%