Engineering & Materials Science
Intrusion detection
100%
Malware
78%
Anomaly detection
62%
Gold
46%
Industry
46%
Botnet
38%
Security of data
29%
Electric network analysis
29%
Case based reasoning
27%
Crime
26%
Controllers
25%
Servers
24%
Machine learning
24%
Internet
20%
Profitability
19%
Cyber Physical System
19%
Websites
19%
Digital forensics
18%
Communication
17%
Deep learning
17%
Autonomous vehicles
16%
Internet service providers
16%
Electronic mail
15%
Network protocols
14%
Reinforcement
13%
Banking
13%
Mobile computing
12%
Recurrent neural networks
12%
Labeling
11%
Smart power grids
11%
Spamming
10%
Economics
10%
Unmanned aerial vehicles (UAV)
10%
Authentication
10%
Convolutional neural networks
10%
Learning algorithms
10%
Reverse engineering
10%
Visualization
10%
Routers
9%
Internet of things
9%
Data mining
9%
Denial-of-service attack
9%
Ethernet
8%
Application programming interfaces (API)
8%
Degradation
7%
Service industry
7%
Availability
7%
Smartphones
7%
Spreaders
7%
Silk
7%
Mathematics
Attack
35%
Anomaly Detection
28%
Malware
19%
Intrusion Detection System
18%
Game
15%
Vulnerability
15%
Intrusion Detection
15%
Recurrent Neural Networks
14%
Spam
13%
Traffic
13%
Virtual Community
12%
Denial of Service
11%
Infrastructure
11%
Electronic Mail
11%
Controller
10%
Smart Grid
10%
Unmanned Aerial Vehicle
10%
Internet of Things
10%
Profiling
10%
Reverse Engineering
10%
Cloud Computing
9%
Learning
9%
Decision Support Systems
8%
Social Network Analysis
8%
Vision
8%
Contagion
8%
Accidents
8%
Anomaly
7%
Model
7%
Driver
7%
Self-similarity
6%
Real-time
6%
Server
6%
Person
5%
Diagnostics
5%
Infection
5%
Labeling
5%
Clustering
5%
Heuristics
5%
Classify
5%