Engineering & Materials Science
Agglomeration
22%
Anomaly detection
17%
Artificial intelligence
7%
Association rules
8%
Classifiers
11%
Computer networks
11%
Condensation
16%
Cyborgs
7%
Data mining
17%
Data privacy
13%
Deep learning
17%
Deep neural networks
24%
Defects
5%
Denial-of-service attack
9%
Detectors
8%
Dynamic analysis
7%
Education
6%
Entropy
11%
Experiments
8%
Fans
7%
Health
12%
Image classification
8%
Information fusion
28%
Information use
6%
Internet
6%
Internet of things
20%
Intrusion detection
100%
Long short-term memory
9%
Machine learning
45%
Metadata
8%
Monitoring
6%
National security
11%
Neural networks
9%
Ontology
6%
Packet networks
12%
Pattern recognition
7%
Perturbation techniques
10%
Search engines
8%
Security of data
38%
Semantics
31%
Software defined networking
36%
Static analysis
8%
Statistics
6%
Taxonomies
21%
Terrorism
16%
Testing
11%
Transfer learning
9%
Uncertainty
7%
Websites
26%
Wireless sensor networks
6%
Business & Economics
Anonymization
5%
Arab Countries
10%
Attack
52%
Classifier
8%
Cybersecurity
9%
Data Protection
10%
Data Sources
8%
Deep Learning
15%
Domain Knowledge
9%
Dynamic Analysis
9%
Evasion
10%
Google
5%
Health
5%
Incidents
13%
Information Quality
5%
Internet of Things
9%
Intrusion Detection
31%
Intrusion Detection System
6%
Language
7%
Learning Model
21%
Machine Learning
29%
Open Source
10%
Phishing
35%
Privacy
10%
Privacy Preserving
11%
Profiling
10%
Query
9%
Readability
20%
Semantic Similarity
7%
Software
5%
Textual Analysis
8%
Transfer Learning
12%
Violations
7%
Vocabulary
5%
Web Search
11%
Mathematics
Attack
38%
Augmentation
9%
Clustering
7%
Condensation
9%
Feature Vector
5%
Firewall
14%
Graph in graph theory
5%
Intrusion Detection
8%
Machine Learning
6%
Network Intrusion Detection
16%
Prefix
9%
Privacy
10%
Software
15%
Software System
11%
Testing
5%
Trace
6%