Business & Economics
Data Extraction
87%
Apps
61%
Vulnerability
50%
Data Access
47%
Vulnerability Analysis
46%
Mobile Devices
41%
Privacy Preserving
38%
Deep Learning
38%
Smartphone
35%
Breach
30%
Isolation
27%
Spectacle
26%
Attack
20%
Developer
19%
Apple
18%
Consent
17%
Crime
17%
Privacy
16%
Data Base
15%
Machine Learning
12%
Control Management
12%
Data Sharing
12%
Access Control
12%
Scenarios
11%
Google
10%
Healthcare
10%
Transaction Data
10%
Wi-Fi
9%
Security Protocols
9%
Role-based Access Control
9%
Functionality
7%
Critical Point
7%
Metadata
7%
Entertainment
6%
Authorization
6%
Imaging
6%
Mobile Applications
6%
Risk Mitigation
6%
Black Box
6%
Accountability
6%
Processing Time
5%
News
5%
Reorganization
5%
Authority
5%
End Users
5%
Integrity
5%
Threat
5%
Engineering & Materials Science
Application programs
100%
Internet of things
69%
Blockchain
64%
Smartphones
58%
Wearable technology
46%
Mobile commerce
41%
Digital forensics
25%
Deep learning
24%
Mobile computing
23%
Crime
19%
Edge computing
17%
Access control
13%
Data Sharing
10%
Health care
9%
Economics
8%
Cameras
7%
Thermostats
7%
Forensic science
7%
Machine learning
6%
Recovery
6%
Metadata
5%
XML
5%
Mathematics
Smart Home
61%
Vulnerability
37%
Isolation
33%
Schema
31%
Updating
30%
Mobile Applications
10%
Apple
8%
Operating Systems
8%
Acquisition
7%
Recommendations
5%
Update
5%
Text
5%
Wi-Fi
5%