Sort by
Computer Science
Internet-Of-Things
100%
Internet of Things
96%
Intrusion Detection System
56%
Scale-Invariant Feature Transform
40%
Processing Time
40%
Information Security
36%
Network Architecture
35%
System Calls
35%
Blockchain
35%
Security Vulnerability
25%
Fingerprint Identification
23%
Sybil Attack
23%
Cybersecurity
23%
Artificial Intelligence
21%
Image Matching
20%
Artificial Intelligence of Things
19%
Identity Management
18%
Matching Process
17%
Flooding Attack
17%
Identification Algorithm
17%
Access Control
17%
Cyber Security Vulnerability Assessment
17%
Physical Security Vulnerability Assessment
17%
Social Implication
17%
image feature
17%
Deep Learning
17%
Smart Environment
17%
Long Short-Term Memory Network
17%
Decision Maker
17%
Testing Platform
17%
Address Resolution
17%
Linux Container
17%
Collecting Data
17%
Distributed Denial of Service Attack
17%
Distributed Denial of Service
17%
Controller Area Network
17%
Computer Vision
17%
Structured Communication
17%
U-Net
17%
Privacy Policies
17%
Security Risk Assessment
17%
Threat Intelligence
17%
Tumor Detection
17%
Mobile Agents
17%
Communication Module
17%
Authentication Method
17%
Feature Detector
17%
Privacy Challenge
17%
Configuration Option
17%
Uniform Resource Locator
17%
Transition Phase
17%
Internal Attack
17%
Security Design
17%
Traditional Datacenter
17%
Hypervisor Level
17%
Ensemble Learning
17%
Detection Accuracy
17%
Security Recommendation
17%
Resource Configuration
17%
Computer Configuration
17%
Hypervisor
17%
Physical Layout
17%
Static Program Analysis
17%
Social Platform
17%
Spoofing
17%
Conceptual Model
17%
Advanced Encryption Standard Algorithm
17%
On-Line Education
17%
Biometric Modality
17%
User Behavior
17%
Preliminary Survey
17%
Vulnerability Assessment
17%
Risk Mitigation
17%
e-learning
17%
Software Systems
17%
Recurrent Neural Network
17%
Security Framework
17%
Advanced Encryption Standard
17%
Explainable Artificial Intelligence
17%
Service Application
17%
Short Description
17%
Wired Network
17%
Network Application
17%
Active Research
17%
Industrial Network
17%
Healthcare Data
17%
Anomaly Detection
17%
Smart Grid Security
17%
Smart Contract
17%
Internet of Things Device
17%
Presented Approach
11%
Consensus Algorithm
11%
Data Integrity
10%
Security Solution
9%
False Positive Rate
9%
Routing Protocol
9%
Online Information
8%
Image Content
8%
binarization
8%
Security Technique
8%
Keyphrases
Internet of Things
79%
Intrusion Detection System
39%
Explainable Deep Learning
35%
Advanced Encryption Standard Algorithm
35%
Internet of Things Networks
35%
Blockchain
35%
Artificial Intelligence
35%
Cybersecurity
24%
Cloud Services
21%
Network Security
21%
Security Services
21%
Cybersecurity Assessment
17%
Fingerprint Recognition
17%
Concept Web
17%
Risk Mitigation
17%
Security Risk Assessment
17%
Hybrid Data Center
17%
Security Vulnerability Assessment
17%
Urban Transition
17%
Animal Biometrics
17%
Distributed Security
17%
Fingerprint Orientation Field Estimation
17%
Ridge Orientation
17%
GPGPU
17%
Cattle Tracking
17%
Kernel Support Vector Machine
17%
Bio-inspired
17%
Brain Tumor Detection
17%
Security Adaptation
17%
Organizational Adoption
17%
Steganography Techniques
17%
Energy Cloud
17%
Image Steganography
17%
Deception Strategy
17%
Authentication Management
17%
Web Security
17%
Remote Patient Monitoring System
17%
Remote Patient Monitoring
17%
Trust-based
17%
Identity Management
17%
Indicators of Compromise
17%
Distributed Denial of Service (DDoS)
17%
Comprehensive Vulnerability
17%
Linux Containers
17%
Ecosystem Security
17%
Adware Detection
17%
RPL Security
17%
Smart Environments
17%
Multiple Mobile Agents
17%
Intrusion Attacks
17%
Controller Area Network
17%
Flow Features
17%
Address Resolution Protocol
17%
Adware
17%
Security Foundations
17%
Trust Mechanism
17%
Sybil Attack
17%
Brain Tumor Segmentation
17%
Flooding Attack
17%
Threat Intelligence
17%
Muzzle Prints
17%
Communication Module
17%
Cattle Identification
17%
Hybrid Ensemble Learning
17%
Glioma Classification
17%
CNN Structure
17%
Residual Block
17%
Glioma Detection
17%
Implementation Framework
17%
M-payment
17%
Substitution Technique
17%
Gradient Value
17%
DDoS Dataset
17%
Least Significant Bit Substitution
17%
Adaptive Steganography
17%
Pixel Difference
17%
Edge Direction
17%
Mobile Traffic
17%
Implementation Aspects
17%
Industrial Control Network
17%
Gated Recurrent Unit Model
17%
Uniform Resource Locators
17%
Educational Information
17%
FPGA Optimization
17%
Syscalls
17%
Metering Infrastructure
17%
CorA
17%
Intelligent Authentication
17%
Automatic Mapping
17%
5G Healthcare
17%
Privacy Concerns
17%
Privacy Notice
17%
Configuration Options
17%
Eye Recognition
17%
TensorFlow
17%
User Behavior Trust
17%
Protocol Spoofing
17%
Contextual Embeddings
17%
Online Social Platforms
17%
Identity Control Theory
17%