Engineering & Materials Science
Authentication
100%
Intrusion detection
79%
Denial-of-service attack
60%
Cryptography
53%
Mobile commerce
47%
Machine learning
45%
Internet
31%
Learning algorithms
30%
Data transfer
20%
Data Sharing
20%
Network protocols
19%
Classifiers
18%
Industry
17%
Servers
16%
Logistic regression
16%
Communication
15%
Steganography
15%
Network architecture
14%
Software defined networking
12%
Network security
12%
Public key cryptography
12%
Internet of things
12%
Secure communication
12%
Intensive care units
12%
Cloud computing
12%
Sensor nodes
11%
Unified Modeling Language
11%
Support vector machines
11%
Data structures
11%
Random forests
11%
Soft computing
10%
Blockchain
10%
Biometrics
10%
Security of data
10%
Cellular telephones
10%
Entertainment
9%
Ecosystems
9%
Mobile computing
9%
Data privacy
9%
Mobile ad hoc networks
9%
Real time systems
9%
Electrocardiography
9%
Topology
9%
Testbeds
8%
Decision trees
8%
Marketing
8%
Decision making
8%
Routers
8%
Access control
8%
Routing protocols
8%
Mathematics
Key Agreement
29%
Secure Communication
28%
Authentication
27%
Encryption
25%
Intrusion Detection System
23%
Denial of Service
21%
Privacy Preservation
19%
Data Integrity
17%
Intrusion Detection
16%
System Architecture
15%
Network Evolution
15%
Mobile Communication
15%
Data Transfer
14%
Network Architecture
13%
Soft Computing
13%
Public Key Infrastructure
13%
Key Exchange
13%
Execution Time
12%
Multi-class
11%
Evolution System
11%
Comparative Analysis
11%
Learning Algorithm
10%
Cryptosystem
10%
Bubble
10%
Fuzzy Logic
10%
Comparative Study
10%
Attack
10%
Machine Learning
10%
Rule Induction
9%
Market
9%
Prediction
9%
Trends
9%
Genetic Programming
8%
Performance
8%
Software
8%
Unordered
7%
Wireless Communication
6%
Cloud Computing
6%
Privacy
5%
Demand
5%
Visual Cryptography
5%