INIS
accuracy
17%
agriculture
6%
algorithms
30%
applications
7%
architecture
7%
assessments
6%
authentication
6%
body areas
18%
classification
6%
clouds
12%
comparative evaluations
20%
computer codes
6%
control
8%
cost
5%
cryptography
43%
curves
5%
data
100%
datasets
13%
defense
9%
detection
44%
devices
23%
disasters
6%
dynamics
12%
ecosystems
9%
environment
19%
errors
13%
evaluation
8%
flowers
6%
fraud
8%
hospitals
6%
images
17%
information
38%
interactions
15%
internet
13%
intrusion
12%
intrusion detection systems
7%
layers
6%
learning
40%
levels
11%
losses
5%
machine learning
29%
management
8%
neural networks
8%
optimization
6%
patients
10%
people
5%
performance
19%
prediction
5%
randomness
6%
recovery
6%
rice
6%
risks
10%
security
18%
sensors
6%
simulation
5%
size
6%
solutions
7%
storage
5%
tools
8%
units
18%
verification
14%
websites
11%
yields
6%
Computer Science
Access Control
8%
Advanced Encryption Standard
6%
Advanced Persistent Threat
6%
Anomaly Detection
6%
Attackers
6%
Authentication
6%
Blockchain
12%
Blowfish
6%
Certificate Private Key
6%
Client Server
6%
Cloud Environment
12%
Coder
6%
Communication Cost
6%
Cyberattack
6%
Cyberbullying
6%
Data Integrity
18%
Data Management
6%
Data Privacy
12%
Data Retrieval
6%
Data Sharing
12%
Deep Learning Method
6%
Digital Identity
6%
Digitization
6%
Distinctiveness
6%
Distributed Denial of Service Attack
6%
Encryption Technique
9%
External Server
6%
Facebook
12%
Federated Learning
18%
Fraud Detection
6%
Hamming Distance
6%
Health Care
6%
Health Information
6%
Healthcare Data
6%
Identity Attribute
6%
Identity Theft
6%
Identity Verification
6%
Image Analysis
6%
Information Loss
5%
Information Retrieval
9%
Inspired Algorithm
6%
Instagram
5%
Integrity Verification
12%
Internet-Of-Things
10%
Intrusion Detection
12%
Intrusion Detection System
7%
Key Generation
7%
Learning Technique
7%
Machine Learning Approach
6%
Modeling Threat
6%
Neural Network
6%
Online Social Networks
34%
Ownership Information
6%
Paramount Importance
6%
Prediction Accuracy
6%
Privacy Breach
5%
Privacy Preservation
5%
Privacy Preserving
12%
Privacy Technique
6%
Privacy-Preserving Technique
6%
Protect Sensitive Data
6%
public key
6%
Recovery Algorithm
6%
Recovery System
6%
Reference Model
6%
Secure Sockets Layer
6%
Secure Sockets Layer Protocol
6%
Security and Privacy
6%
Security Attack
6%
Selection Method
6%
selective encryption
6%
Sensitive Attribute
5%
Smart Contract
6%
Social Network
18%
Social Networking (Online)
8%
Social Networking Website
6%
Steganography
6%
Testbed
6%
Transmitted Data
6%
Unauthorized Access
5%
Unauthorized Person
6%
Unauthorized User
5%
Unsupervised Learning
6%
Verification Process
6%
Verification System
6%
Wearable Device
16%
World Wide Web Consortium
6%