INIS
data
100%
cryptography
55%
algorithms
53%
detection
46%
information
38%
devices
36%
internet
26%
machine learning
25%
body areas
25%
intrusion
25%
comparative evaluations
24%
security
21%
environment
19%
verification
17%
tools
17%
performance
17%
defense
16%
learning
15%
errors
15%
intrusion detection systems
14%
evaluation
12%
units
12%
computer codes
12%
architecture
12%
dynamics
12%
clouds
12%
images
12%
websites
12%
sensors
12%
recovery
12%
ecosystems
12%
interactions
12%
solutions
11%
layers
10%
curves
9%
resources
8%
cyber attacks
8%
applications
8%
people
8%
risks
7%
demand
7%
patients
7%
capacity
6%
energy
6%
randomness
6%
losses
6%
advertising
6%
cost
6%
host
6%
datasets
6%
aggregation
6%
increasing
6%
implementation
5%
values
5%
humans
5%
classification
5%
control
5%
Computer Science
User
53%
Encryption
41%
Online Social Networks
38%
Models
28%
Intrusion Detection
25%
Attack
22%
Internet of Things
21%
Detection
20%
Server
17%
Encryption Technique
16%
Roles
16%
Internet
15%
Algorithms
15%
Intrusion Detection System
14%
Machine Learning Algorithm
12%
Ownership Information
12%
Identity Attribute
12%
Data Sharing
12%
Cyberattack
12%
Protect Sensitive Data
12%
Performance Evaluation
12%
Federated Learning
12%
Key Generation
12%
Blowfish
12%
Cyberbullying
12%
Social Media
12%
Emergence
12%
Statistical Analysis
12%
Machine Learning Approach
12%
Cyber
12%
Privacy Preserving
12%
Communication Cost
12%
Integrity Verification
12%
Cloud Environment
12%
Websites
12%
Inspired Algorithm
12%
Software
12%
Data Integrity
12%
Reference Model
12%
Testbed
12%
Distributed Denial of Service Attack
12%
Advanced Persistent Threat
10%
Wearable Device
10%
Application
9%
Attackers
9%
Sensor Node
8%
Rule Generation
8%
Machine Learning
8%
Cyber Attack
8%
Steganography
6%
Events
6%
Gathering Data
6%
Sensitive Attribute
6%
Ensemble Method
6%
Social Networking Site
6%
Twitter
6%
Experimental Result
6%
Username
6%
Defense Mechanism
5%