INIS
data
100%
cryptography
43%
detection
38%
information
37%
learning
32%
algorithms
30%
devices
23%
comparative evaluations
20%
environment
19%
security
18%
body areas
18%
units
18%
machine learning
18%
performance
18%
images
17%
accuracy
14%
verification
14%
interactions
13%
errors
13%
internet
13%
intrusion
12%
dynamics
12%
clouds
12%
levels
11%
risks
10%
patients
10%
websites
9%
ecosystems
9%
fraud
8%
management
8%
datasets
8%
tools
8%
control
8%
defense
8%
solutions
7%
neural networks
7%
architecture
7%
evaluation
7%
applications
7%
intrusion detection systems
7%
assessments
6%
layers
6%
classification
6%
randomness
6%
computer codes
6%
sensors
6%
recovery
6%
authentication
6%
disasters
6%
optimization
6%
size
6%
flowers
6%
hospitals
6%
losses
5%
curves
5%
people
5%
storage
5%
simulation
5%
Computer Science
Online Social Networks
34%
Social Network
18%
Data Integrity
18%
Federated Learning
18%
Wearable Device
16%
Intrusion Detection
12%
Privacy Preserving
12%
Data Sharing
12%
Blockchain
12%
Data Privacy
12%
Facebook
12%
Integrity Verification
12%
Cloud Environment
12%
Internet-Of-Things
10%
Encryption Technique
9%
Information Retrieval
9%
Access Control
8%
Social Networking (Online)
8%
Key Generation
7%
Learning Technique
7%
Intrusion Detection System
7%
Attackers
6%
Ownership Information
6%
Identity Attribute
6%
Cyberattack
6%
Protect Sensitive Data
6%
Blowfish
6%
Machine Learning Approach
6%
Communication Cost
6%
Reference Model
6%
Testbed
6%
Distributed Denial of Service Attack
6%
Inspired Algorithm
6%
Privacy-Preserving Technique
6%
Authentication
6%
Cyberbullying
6%
Data Management
6%
Advanced Persistent Threat
6%
Security and Privacy
6%
World Wide Web Consortium
6%
Distinctiveness
6%
Steganography
6%
External Server
6%
Health Information
6%
Modeling Threat
6%
Verification Process
6%
public key
6%
Unauthorized Person
6%
Verification System
6%
Client Server
6%
Secure Sockets Layer Protocol
6%
Secure Sockets Layer
6%
Certificate Private Key
6%
Health Care
6%
Smart Contract
6%
Identity Theft
6%
Recovery System
6%
Recovery Algorithm
6%
Identity Verification
6%
Digital Identity
6%
Paramount Importance
6%
Hamming Distance
6%
Security Attack
6%
selective encryption
6%
Image Analysis
6%
Transmitted Data
6%
Prediction Accuracy
6%
Privacy Technique
6%
Social Networking Website
6%
Data Retrieval
6%
Advanced Encryption Standard
6%
Digitization
6%
Neural Network
6%
Coder
6%
Deep Learning Method
6%
Anomaly Detection
6%
Healthcare Data
6%
Fraud Detection
6%
Unsupervised Learning
6%
Selection Method
6%
Unauthorized Access
5%
Privacy Preservation
5%
Privacy Breach
5%
Information Loss
5%
Sensitive Attribute
5%
Unauthorized User
5%
Instagram
5%