INIS
data
100%
security
52%
detection
50%
algorithms
48%
cryptography
43%
authentication
40%
information
33%
performance
27%
machine learning
27%
learning
25%
environment
23%
images
23%
intrusion
22%
intrusion detection systems
21%
comparative evaluations
20%
architecture
20%
computer codes
20%
devices
20%
verification
19%
datasets
18%
classification
17%
commerce
16%
applications
15%
internet
15%
dynamics
15%
accuracy
13%
design
13%
people
12%
prediction
11%
clouds
11%
evaluation
10%
body areas
10%
units
10%
levels
9%
risks
8%
ecosystems
8%
interactions
8%
management
7%
demand
7%
errors
7%
solutions
7%
control
7%
values
6%
business
6%
implementation
6%
randomness
6%
sensors
6%
resources
6%
cost
6%
optimization
6%
Computer Science
Authentication
32%
Intrusion Detection System
27%
Public Key Infrastructure
25%
Online Social Networks
25%
Intrusion Detection
20%
User Authentication
15%
Data Integrity
15%
Social Network
13%
Distributed Denial of Service Attack
13%
Experimental Result
12%
Authentication Protocol
11%
mobile commerce
11%
Cloud Environment
11%
Blockchain
10%
Facebook
10%
Software-Defined Network
10%
Federated Learning
10%
Password
9%
Wearable Device
8%
Data Sharing
8%
Learning System
8%
Machine Learning
7%
public key
7%
Information Retrieval
7%
Sensor Node
6%
Internet-Of-Things
6%
Machine Learning Algorithm
6%
Privacy Preserving
6%
Steganography
6%
Blowfish
6%
Data Privacy
6%
Deep Learning Method
6%
Integrity Verification
6%
Privacy Preservation
6%
Access Control
6%
Unauthorized Person
6%
Denial-of-Service Attack
5%
Comparative Analysis
5%
Authentication Mechanism
5%
Entity Authentication
5%
Anomaly Detection
5%
Public Key Certificate
5%
Encryption Technique
5%
Security and Privacy
5%
Smart Contract
5%
Social Networking Site
5%
Cloud Computing
5%
Advanced Encryption Standard
5%
Neural Network
5%
Classification Algorithm
5%