INIS
accuracy
13%
algorithms
48%
applications
15%
architecture
20%
authentication
40%
body areas
10%
business
6%
classification
17%
clouds
11%
commerce
16%
comparative evaluations
20%
computer codes
20%
control
7%
cost
6%
cryptography
43%
data
100%
datasets
18%
demand
7%
design
13%
detection
50%
devices
20%
dynamics
15%
ecosystems
8%
environment
23%
errors
7%
evaluation
10%
images
23%
implementation
6%
information
33%
interactions
8%
internet
15%
intrusion
22%
intrusion detection systems
21%
learning
25%
levels
9%
machine learning
27%
management
7%
optimization
6%
people
12%
performance
27%
prediction
11%
randomness
6%
resources
6%
risks
8%
security
52%
sensors
6%
solutions
7%
units
10%
values
6%
verification
19%
Computer Science
Access Control
6%
Advanced Encryption Standard
5%
Anomaly Detection
5%
Authentication
32%
Authentication Mechanism
5%
Authentication Protocol
11%
Blockchain
10%
Blowfish
6%
Classification Algorithm
5%
Cloud Computing
5%
Cloud Environment
11%
Comparative Analysis
5%
Data Integrity
15%
Data Privacy
6%
Data Sharing
8%
Deep Learning Method
6%
Denial-of-Service Attack
5%
Distributed Denial of Service Attack
13%
Encryption Technique
5%
Entity Authentication
5%
Experimental Result
12%
Facebook
10%
Federated Learning
10%
Information Retrieval
7%
Integrity Verification
6%
Internet-Of-Things
6%
Intrusion Detection
20%
Intrusion Detection System
27%
Learning System
8%
Machine Learning
7%
Machine Learning Algorithm
6%
mobile commerce
11%
Neural Network
5%
Online Social Networks
25%
Password
9%
Privacy Preservation
6%
Privacy Preserving
6%
public key
7%
Public Key Certificate
5%
Public Key Infrastructure
25%
Security and Privacy
5%
Sensor Node
6%
Smart Contract
5%
Social Network
13%
Social Networking Site
5%
Software-Defined Network
10%
Steganography
6%
Unauthorized Person
6%
User Authentication
15%
Wearable Device
8%