Keyphrases
5G Healthcare
18%
Adaptive Security
18%
Adaptive Steganography
18%
Address Resolution Protocol
18%
Advanced Encryption Standard Algorithm
36%
Adware
18%
Adware Detection
18%
Animal Biometrics
18%
Authentication Management
18%
Automatic Mapping
18%
Bio-inspired
18%
Brain Tumor Detection
18%
Brain Tumor Segmentation
18%
Cattle Identification
18%
Cattle Tracking
18%
Cloud Services
18%
CNN Structure
18%
Communication Module
18%
Comprehensive Vulnerability
18%
Concept Web
18%
Configuration Options
18%
Contextual Embeddings
18%
Controller Area Network
18%
CorA
18%
Cybersecurity
18%
Cybersecurity Assessment
18%
DDoS Dataset
18%
Deception Strategy
18%
Distributed Denial of Service (DDoS)
18%
Distributed Security
18%
Ecosystem Security
18%
Edge Direction
18%
Educational Information
18%
Energy Cloud
18%
Explainable Deep Learning
36%
Eye Recognition
18%
Fingerprint Orientation Field Estimation
18%
Fingerprint Recognition
18%
Flooding Attack
18%
Flow Features
18%
FPGA Optimization
18%
Gated Recurrent Unit Model
18%
Glioma Classification
18%
Glioma Detection
18%
GPGPU
18%
Gradient Value
18%
Hybrid Data Center
18%
Hybrid Ensemble Learning
18%
Identity Control Theory
18%
Identity Management
18%
Image Steganography
18%
Implementation Aspects
18%
Implementation Framework
18%
Indicators of Compromise
18%
Industrial Control Network
18%
Intelligent Authentication
18%
Internet of Things
56%
Internet of Things Networks
36%
Intrusion Attacks
18%
Intrusion Detection System
40%
Kernel Support Vector Machine
18%
Least Significant Bit Substitution
18%
Linux Containers
18%
M-payment
18%
Metering Infrastructure
18%
Mobile Traffic
18%
Multiple Mobile Agents
18%
Muzzle Prints
18%
Online Social Platforms
18%
Organizational Adoption
18%
Pixel Difference
18%
Privacy Concerns
18%
Privacy Notice
18%
Protocol Spoofing
18%
Remote Patient Monitoring
18%
Remote Patient Monitoring System
18%
Residual Block
18%
Ridge Orientation
18%
Risk Mitigation
18%
RPL Security
18%
Security Adaptation
18%
Security Foundations
18%
Security Risk Assessment
18%
Security Services
21%
Security Vulnerability Assessment
18%
Smart Environments
18%
Steganography Techniques
18%
Substitution Technique
18%
Sybil Attack
18%
Syscalls
18%
System Call
18%
TensorFlow
18%
Threat Intelligence
18%
Trust Mechanism
18%
Trust-based
18%
Uniform Resource Locators
18%
Urban Transition
18%
User Behavior Trust
18%
User Identity
18%
Web Security
18%
Computer Science
Access Control
18%
Address Resolution
18%
Advanced Encryption Standard Algorithm
18%
Authentication Method
18%
binarization
9%
Biometric Modality
18%
Collecting Data
18%
Commodity Hardware
9%
Communication Module
18%
Computer Configuration
18%
Computer Vision
18%
Conceptual Model
18%
Configuration Option
18%
Consensus Algorithm
12%
Controller Area Network
18%
Cyber Security Vulnerability Assessment
18%
Decision Maker
18%
Deep Learning
18%
Detection Accuracy
18%
Difference Histogram
9%
Distributed Denial of Service
18%
Distributed Denial of Service Attack
18%
e-learning
18%
Embedding Capacity
9%
Ensemble Learning
18%
Feature Detector
18%
Fingerprint Identification
24%
Flooding Attack
18%
Gradient Magnitude
9%
Graphics Processing Unit
9%
Hide Secret Data
9%
Hypervisor
18%
Hypervisor Level
18%
Identification Algorithm
18%
Identity Management
19%
Image Content
9%
image feature
18%
Image Matching
21%
Information Security
37%
Internal Attack
18%
Internet of Things
100%
Internet of Things Device
14%
Internet-Of-Things
18%
Intrusion Detection System
58%
Linux Container
18%
Long Short-Term Memory Network
18%
Matching Process
18%
Metadata
9%
Mobile Agents
18%
Mobile Network
9%
Network Application
9%
Network Architecture
18%
On-Line Education
18%
Online Information
9%
Parallel Stage
9%
Physical Layout
18%
Physical Security Vulnerability Assessment
18%
Preliminary Survey
18%
Presented Approach
12%
Privacy Challenge
18%
Privacy Policies
18%
Processing Time
42%
Quality of Service
9%
Recurrent Neural Network
18%
Resource Configuration
18%
Risk Mitigation
18%
Routing Protocol
9%
Scale-Invariant Feature Transform
42%
Security Design
18%
Security Framework
18%
Security Recommendation
18%
Security Risk Assessment
18%
Security Solution
9%
Security Technique
9%
Security Vulnerability
22%
Service Application
9%
Short Description
9%
Smart Environment
18%
Social Implication
18%
Social Platform
18%
Software Security
9%
Software Systems
18%
Spoofing
18%
Static Program Analysis
18%
Structured Communication
18%
Sybil Attack
24%
System Calls
18%
Testing Platform
18%
Threat Intelligence
18%
Traditional Datacenter
18%
Training Phase
9%
Transition Phase
18%
Treatment Outcome
9%
Tumor Detection
18%
U-Net
18%
Uniform Resource Locator
18%
User Behavior
18%
User Data
9%
Vulnerability Assessment
18%
Wired Network
9%