Engineering & Materials Science
Malware
100%
Topology
68%
Intrusion detection
68%
Electric network analysis
65%
Security of data
64%
Monitoring
62%
Machine learning
51%
Deep learning
49%
Search engines
44%
Acoustic waves
38%
Internet
36%
Feedback
35%
Classifiers
34%
Communication
33%
Smartphones
33%
Computer worms
31%
Electroencephalography
29%
Speech analysis
28%
Set theory
27%
Costs
26%
Internet of things
25%
Law enforcement
25%
Complex networks
25%
Computer viruses
25%
Application programs
25%
Experiments
24%
Industry
23%
Automation
23%
Planning
22%
Data mining
19%
Personal computers
19%
Personnel
17%
Telemetering
16%
Graph theory
15%
Display devices
15%
Visualization
15%
Neural networks
14%
Headphones
14%
Cryptocurrency
14%
Polynomial regression
14%
Vaccines
14%
Taxonomies
13%
Pattern matching
13%
Internet service providers
13%
Moderators
13%
Labeling
13%
Brain computer interface
13%
Graph algorithms
12%
Cost benefit analysis
12%
Text processing
12%
Mathematics
Centrality
87%
Attack
83%
Betweenness
66%
Network Intrusion Detection
43%
Intrusion Detection System
43%
Social Media
39%
Traffic
33%
Monitoring
32%
Vulnerability
29%
Electroencephalogram (EEG)
27%
Law Enforcement
26%
Intrusion Detection
25%
Architecture
25%
Classifier
24%
Social Networks
24%
Placement
23%
Machine Learning
22%
Honeypot
21%
Brain-computer Interface
21%
Malware
21%
Communication Networks
20%
Critical Infrastructure
19%
Social Network Analysis
19%
Leader Election
19%
Training
19%
VoIP
19%
Vertex of a graph
19%
Wi-Fi
18%
Internet of Things
18%
Network Analysis
18%
Prediction
17%
Peer to Peer
17%
Graph in graph theory
17%
Neural Networks
16%
Internet Traffic
16%
Electroencephalography
16%
Optimise
16%
Data Communication
16%
Privacy Preserving
16%
Decision Support Systems
16%
Infrastructure
15%
Shortest Path Tree
15%
Information Security
15%
Brain
15%
Obfuscation
15%
Nanotechnology
15%
Leadership
15%
Hot Spot
15%
Analytic Hierarchy Process
15%
Communication
15%