Engineering & Materials Science
Intrusion detection
100%
Machine learning
45%
Security of data
38%
Software defined networking
36%
Semantics
31%
Information fusion
28%
Websites
26%
Deep neural networks
24%
Agglomeration
22%
Taxonomies
21%
Internet of things
20%
Data mining
17%
Deep learning
17%
Anomaly detection
17%
Terrorism
16%
Condensation
16%
Data privacy
13%
Packet networks
12%
Health
12%
Entropy
11%
Classifiers
11%
National security
11%
Computer networks
11%
Testing
11%
Perturbation techniques
10%
Neural networks
9%
Transfer learning
9%
Long short-term memory
9%
Denial-of-service attack
9%
Detectors
8%
Association rules
8%
Experiments
8%
Image classification
8%
Static analysis
8%
Search engines
8%
Metadata
8%
Uncertainty
7%
Fans
7%
Dynamic analysis
7%
Pattern recognition
7%
Artificial intelligence
7%
Cyborgs
7%
Internet
6%
Education
6%
Ontology
6%
Wireless sensor networks
6%
Monitoring
6%
Information use
6%
Statistics
6%
Defects
5%
Business & Economics
Attack
52%
Phishing
35%
Intrusion Detection
31%
Machine Learning
29%
Learning Model
21%
Readability
20%
Deep Learning
15%
Incidents
13%
Transfer Learning
12%
Privacy Preserving
11%
Web Search
11%
Data Protection
10%
Evasion
10%
Open Source
10%
Arab Countries
10%
Profiling
10%
Privacy
10%
Domain Knowledge
9%
Dynamic Analysis
9%
Internet of Things
9%
Cybersecurity
9%
Query
9%
Textual Analysis
8%
Classifier
8%
Data Sources
8%
Violations
7%
Semantic Similarity
7%
Language
7%
Intrusion Detection System
6%
Software
5%
Information Quality
5%
Google
5%
Health
5%
Anonymization
5%
Vocabulary
5%
Mathematics
Attack
38%
Network Intrusion Detection
16%
Software
15%
Firewall
14%
Software System
11%
Privacy
10%
Condensation
9%
Augmentation
9%
Prefix
9%
Intrusion Detection
8%
Clustering
7%
Machine Learning
6%
Trace
6%
Testing
5%
Feature Vector
5%
Graph in graph theory
5%