Engineering & Materials Science
Access control
98%
Feature extraction
74%
Cryptography
58%
Software defined networking
55%
Experiments
53%
Cloud computing
49%
Communication
47%
Students
41%
Labels
39%
Websites
37%
Mobile cloud computing
36%
Machine learning
34%
Data mining
32%
Security of data
30%
Mobile computing
30%
Recommender systems
30%
Malware
27%
Anomaly detection
27%
Social sciences
26%
Electronic mail
24%
Authentication
22%
Industry
21%
Data Sharing
21%
Disasters
21%
Quality of service
21%
Network security
20%
Internet
20%
Sentiment analysis
20%
Application programs
20%
Labeled data
19%
Scalability
19%
Data privacy
18%
Network protocols
18%
Ecosystems
18%
Intrusion detection
18%
Health
18%
Monitoring
17%
Blogs
17%
Costs
17%
Virtual machine
17%
Servers
16%
Electric network analysis
16%
Semantics
16%
Internet of things
16%
Availability
16%
Marketing
15%
Big data
15%
Intelligent systems
15%
Education
15%
Application programming interfaces (API)
14%
Spamming
13%
Search engines
13%
Outsourcing
13%
Virtualization
13%
Supervised learning
12%
Secure communication
12%
Service oriented architecture (SOA)
12%
Mobile ad hoc networks
12%
Computer networks
12%
Web services
11%
Dynamical systems
11%
Social computing
11%
Neural networks
11%
Testing
11%
Learning algorithms
11%
Visualization
10%
Sociology
10%
Risk assessment
10%
Learning systems
10%
Computer systems
10%
Digital forensics
10%
Topology
10%
Chemical analysis
9%
Feedback
9%
Controllers
9%
Decision making
9%
Specifications
9%
Information retrieval
8%
Uncertainty
8%
Critical infrastructures
8%
Botnet
8%
Network routing
8%
Detectors
8%
Crowdsourcing
8%
Resource allocation
8%
Labeling
8%
World Wide Web
7%
Reinforcement learning
7%
Transfer learning
7%
Large dataset
7%
Artificial intelligence
7%
Data storage equipment
7%
Sensor networks
7%
Problem-Based Learning
7%
Smartphones
7%
Teaching
7%
Genes
7%
Spreaders
7%
Factorization
7%
Deep learning
7%
Mathematics
Social Media
100%
Feature Selection
33%
Framework
29%
Attack
20%
Social Networks
19%
Learning
19%
Policy
14%
Attribute
14%
Model
14%
Access Control
14%
Orchestration
13%
Performance
12%
Integrity
11%
Human
11%
Authorization
11%
Text
11%
Prediction
10%
Strategy
10%
Trustworthiness
10%
Experiment
9%
Mining
9%
Work Flow
9%
Quality of Service
9%
Machine Learning
9%
Evaluation
8%
Privacy
8%
Blogs
8%
Encryption
7%
Intelligent Tutoring Systems
7%
Networking
7%
Demonstrate
7%
Broadcast Encryption
7%
Decentralized
7%
Community
7%
Revocation
7%
Software
7%
Collaboration
7%
Emotion
7%
Leverage
7%
Teaching
6%
Active Learning
6%
Data Mining
6%
Data Sharing
6%
Experimental Results
6%
Moving Target
6%
Usability
6%
Predict
6%
Lens
6%
Intrusion Detection System
6%
Similarity
6%
Target
6%
Sensor Networks
6%
Evaluate
5%
Propagation
5%
Collective Behavior
5%
Graph in graph theory
5%
Interaction
5%
Communication
5%
Crisis
5%
Mobile Computing
5%
Vote
5%
User Preferences
5%
Text Classification
5%
Anonymity
5%
Mobile Devices
5%
Modeling
5%
Neural Networks
5%
Recommender Systems
5%
Actors
5%
Trust Management
5%
Role-based Access Control
5%
Scalability
5%
Sensor
5%
Recommendations
5%
Resources
5%
Business & Economics
Feature Selection
24%
Social Media
19%
News
14%
Machine Learning
13%
Node
10%
Social Networks
10%
Graph
9%
Data Mining
9%
Attack
8%
Prediction
7%
Data Access
6%
Neural Networks
6%
Phishing
6%
Recommender Systems
6%
Reinforcement Learning
6%
Access Control
6%
Repository
5%
Clustering
5%
Cloud Services
5%
Policy Management
5%