Engineering & Materials Science
Logic programming
100%
Security of data
81%
Malware
74%
Statistical Models
38%
Machine learning
37%
Temporal logic
35%
Law enforcement
31%
Websites
29%
Labeled data
26%
Experiments
25%
NP-hard
24%
Violence
23%
Graph theory
23%
Military operations
21%
Seed
21%
Marketing
21%
Mathematical operators
20%
Computer networks
19%
Semantics
19%
Deep neural networks
18%
Uncertainty
17%
Approximation algorithms
17%
Inductive logic programming (ILP)
17%
Industry
16%
Text processing
16%
Open source software
14%
Crime
14%
Lattice theory
14%
Reverse engineering
14%
Electric grounding
13%
Virtual machine
13%
Artificial intelligence
12%
Tensors
12%
Neural networks
12%
Terrorism
12%
Internet
12%
Electric network analysis
11%
Fuzzy logic
11%
Labels
11%
Association rules
10%
Intelligent systems
9%
Data mining
9%
Time series
9%
Labeling
9%
Set theory
9%
Computer systems
9%
Knowledge representation
9%
Cryptocurrency
9%
Classifiers
9%
Pathogens
8%
Mathematics
Belief Revision
27%
Argumentation
25%
Malware
22%
Honeypot
20%
Attack
19%
Framework
19%
Abduction
19%
Probabilistic Logic
19%
Knowledge Base
18%
Virtual Machine
18%
Probabilistic Model
16%
Social Networks
15%
Temporal Logic
15%
Cognitive Models
14%
Fixation
13%
Logic Programs
13%
Postulate
13%
Computer Networks
12%
Graph theory
12%
Mutant
12%
Mobile Ad Hoc Networks
11%
Graphical Representation
11%
Layout
11%
Logic Programming
11%
Experimental Results
10%
Countermeasures
10%
NP-complete problem
9%
Reverse Engineering
8%
Approximation Algorithms
8%
Graph in graph theory
8%
Functional Model
8%
Mining
8%
Fixpoint
7%
Operator
7%
Game Theory
7%
Predict
7%
Architecture
7%
Diffusion Problem
6%
Analytical Methods
6%
Real-world Applications
6%
Line
6%
Logic
6%
Thread
6%
Neural Networks
6%
Game
5%
Uncertain Data
5%
Reasoning
5%
Intelligence
5%
Business & Economics
Attack
29%
Cybersecurity
20%
Vulnerability
17%
Social Influence
15%
Logic Programming
15%
Machine Learning
13%
Human Trafficking
11%
Threat
10%
Law Enforcement
9%
Incidents
9%
Electronic Mail
9%
System Identification
9%
Terror
8%
Warning
8%
Knowledge Representation
8%
Cryptocurrency
7%
Software
7%
Toolkit
7%
Query
7%
Evaluation
6%
NP-complete
6%
Graph
6%
Social Media
6%
Compromise
5%
Experiment
5%
Argumentation
5%
Attribution
5%
Leverage
5%
Heuristics
5%
Peers
5%
Fixed Point
5%
Targeting
5%
Prediction Model
5%