Engineering & Materials Science
Cryptography
76%
Side channel attack
63%
Internet
57%
Anomaly detection
48%
Servers
44%
Public key cryptography
38%
Availability
36%
Access control
34%
Topology
31%
SCADA systems
31%
Radio frequency identification (RFID)
29%
Finite automata
27%
Network protocols
23%
Smart cards
21%
Electronic voting
20%
Electric power systems
20%
Intrusion detection
19%
Computer hardware
18%
Bluetooth
18%
Linux
18%
Programmable logic controllers
18%
Sampling
17%
Data storage equipment
16%
Clocks
15%
Communication
15%
Hash functions
14%
Asynchronous transfer mode
13%
Photonics
13%
Trees (mathematics)
13%
Wi-Fi
13%
Tracers
12%
Smartphones
12%
Dynamic programming
11%
Graphics processing unit
11%
Control systems
10%
Critical infrastructures
10%
Specifications
10%
Probability distributions
10%
Approximation algorithms
9%
IEEE Standards
9%
Polynomials
9%
Reverse engineering
9%
Intranets
9%
Set theory
9%
Cheeses
9%
Random access storage
9%
Industry
8%
Flow control
8%
Program processors
8%
Channel state information
8%
Mathematics
Quorum
100%
Attack
70%
Side Channel Attacks
36%
Availability
33%
Anomaly Detection
30%
Cipher
21%
Broadcast Encryption
21%
Programmable Logic Controller
20%
Statecharts
20%
ATM Networks
20%
Human-machine Interface
19%
Rank Estimation
18%
Deterministic Finite Automata
18%
Trace
18%
Cache
17%
Radio Frequency Identification
17%
Leakage
16%
Algorithmic Complexity
16%
Degree Distribution
15%
Server
15%
Cryptanalysis
14%
Layout
13%
Intrusion Detection System
13%
Topology
13%
Hardware
13%
Access Control
13%
Smart Card
12%
Advanced Encryption Standard
12%
Modeling
12%
Channel State Information
11%
Privacy
11%
Model
11%
Side-channel Analysis
11%
Wi-Fi
11%
Data Complexity
11%
Intrusion Detection
10%
Avionics
10%
Bluetooth
10%
Tables
10%
Channel Estimation
10%
Optimal Solution
10%
Time Complexity
10%
False Alarm Rate
10%
Graphics Processing Unit
9%
Correlation Attack
9%
Traffic
9%
Countermeasures
9%
Photonics
9%
Deception
9%
Password
9%