INIS
data
100%
cryptography
56%
algorithms
51%
detection
48%
information
40%
devices
35%
internet
28%
machine learning
26%
body areas
26%
intrusion
26%
comparative evaluations
25%
environment
20%
performance
18%
defense
17%
learning
16%
errors
16%
intrusion detection systems
15%
security
14%
evaluation
13%
verification
13%
units
13%
computer codes
13%
architecture
13%
dynamics
13%
clouds
13%
tools
13%
images
13%
websites
13%
sensors
13%
interactions
13%
solutions
12%
layers
11%
curves
10%
resources
9%
cyber attacks
8%
applications
8%
people
8%
risks
7%
demand
7%
patients
7%
capacity
7%
energy
7%
randomness
7%
losses
6%
advertising
6%
cost
6%
host
6%
datasets
6%
aggregation
6%
increasing
6%
implementation
6%
values
6%
humans
6%
classification
5%
correlations
5%
Computer Science
Encryption
36%
Body Sensor Network
26%
Intrusion Detection
26%
Roles
18%
Wearable Sensor
16%
Algorithms
15%
Online Social Networks
13%
Machine Learning Algorithm
13%
Ownership Information
13%
Identity Attribute
13%
Data Sharing
13%
User
13%
Cyberattack
13%
Protect Sensitive Data
13%
Performance Evaluation
13%
Encryption Technique
13%
Federated Learning
13%
Key Generation
13%
Blowfish
13%
Cyberbullying
13%
Intrusion Detection System
13%
Models
11%
Advanced Persistent Threat
11%
Application
10%
Social Media
8%
Cyber Attack
8%
Sensor Node
8%
Rule Generation
8%
Internet of Things
8%
Internet
8%
Attack
8%
Least Significant Bit
6%
Steganography
6%
Attackers
5%
Machine Learning
5%