Engineering & Materials Science
Malware
100%
Internet
90%
Denial-of-service attack
88%
Botnet
86%
Access control
82%
Wireless sensor networks
76%
Network protocols
69%
Scheduling
63%
Open source software
53%
Anomaly detection
52%
Authentication
46%
Data storage equipment
39%
Ubiquitous computing
36%
Routers
35%
Servers
35%
Internet of things
33%
Topology
32%
Intrusion detection
30%
Sensor networks
29%
Communication
29%
Inspection
27%
Experiments
26%
Entropy
26%
Smartphones
25%
Wireless local area networks (WLAN)
24%
Digital forensics
24%
Local area networks
22%
Agglomeration
22%
Cryptography
21%
Scalability
20%
Data privacy
20%
Visualization
20%
Resource allocation
20%
Energy utilization
20%
Voltage scaling
19%
Smart meters
19%
Semantics
18%
Smart power grids
18%
Software quality
18%
Fault tolerance
17%
Costs
17%
Wi-Fi
17%
Jamming
17%
Network security
17%
Quality of service
15%
Factorization
15%
Biometrics
15%
Monitoring
15%
Power spectral density
15%
Screening
14%
Mathematics
Attack
62%
Wireless Sensor Networks
51%
Traffic
41%
Vulnerability
41%
DDoS
26%
Resiliency
25%
Task Scheduling
25%
Multimedia
23%
Worm
23%
Network Topology
20%
Fault-tolerant
20%
Human
17%
Fingerprint Recognition
17%
Received Signal Strength
16%
Resources
16%
Monitoring
16%
Randomness
16%
Digital Forensics
16%
Intrusion Detection
15%
Cross-layer
15%
IEEE 802.11
15%
Filtering
15%
Clone
15%
Multi-hop Wireless Networks
15%
Trust Management
15%
Trust Model
15%
Denial of Service
15%
VoIP
14%
Password
14%
Software Quality
14%
Network Planning
14%
Key Management
14%
Software Verification
13%
Multicomputers
13%
Cloud Computing
13%
Network Security
13%
Energy Efficient
12%
Buffer Overflow
12%
Access Control
12%
Load Distribution
12%
Anomaly
12%
Evaluation
12%
Automation
12%
Open Source Software
12%
Unfair
12%
Execution Time
12%
Flash
12%
Tracing
11%
Electronic Mail
11%
Signature
11%