Engineering & Materials Science
Malware
100%
Virtualization
74%
Virtual machine
61%
Linux
60%
Servers
57%
Reverse engineering
55%
Data storage equipment
53%
Windows operating system
45%
Trusted computing
44%
Communication
29%
Electronic mail
26%
Security of data
26%
Network security
26%
Virtual reality
22%
Internet
21%
Authentication
20%
Aircraft communication
20%
Computer crime
19%
Cryptography
18%
Computer workstations
18%
Monitoring
18%
Industry
16%
Computer hardware
16%
Software packages
15%
Digital storage
15%
Memory architecture
15%
Side channel attack
14%
Air traffic control
14%
Dynamic mechanical analysis
14%
Packet networks
14%
Graph theory
13%
Program processors
12%
Control towers
12%
Websites
12%
Computer systems
11%
Joining
11%
Flow control
11%
Application programming interfaces (API)
11%
Testing
10%
Data structures
10%
Communication systems
9%
Inspection
9%
Systems analysis
9%
Machine learning
8%
Aircraft
8%
Switches
8%
System buses
8%
Internet of things
8%
Costs
8%
Airports
8%
Mathematics
Attack
45%
Malware
41%
Software
29%
Operating Systems
29%
Trusted Computing
25%
Honeypot
25%
Virtual Machine
22%
Language Modeling
22%
Air Traffic Control
21%
Virtualization
21%
Cooperative Behavior
20%
Side Channel Attacks
19%
Reverse Engineering
18%
Streaming
16%
Acquisition
15%
Air Traffic Management
15%
Optimization Model
15%
Hyperparameters
15%
Aircraft
15%
Communication Systems
15%
Altruism
14%
Timing
14%
Resources
12%
Server
12%
Spanning tree
12%
Hardware
11%
Communication
11%
Learning
11%
Pentagon
9%
Language Model
9%
Countermeasures
9%
Optimization
9%
Branch
9%
kernel
8%
Vulnerability
8%
Model
7%
Firewall
7%
Module
7%
Programming Model
7%
Search Algorithm
6%
Software Package
6%
Machine Learning
6%
Fitness
6%
Information Flow
6%
Aviation
6%
Jamming
6%
Monitoring
6%
Real-world Applications
6%
Cost Function
6%
Scheduler
5%
Business & Economics
Kernel
28%
Online Privacy
17%
Cybersecurity
16%
Linux
16%
Microsoft
16%
Authentication
14%
Developer
14%
Leakage
13%
Attack
11%
Freedom of Speech
10%
Software
9%
World Wide Web
9%
Arms Race
8%
Illegal Copy
7%
Hardware
6%
Alternatives
6%
Performance Measurement
6%
Module
6%
Encryption
6%
Digital Content
5%
Anonymity
5%
Performance
5%
Piracy
5%
Predictability
5%