Computer Science
Wireless Sensor Network
100%
Malware
82%
Open Source Software
61%
Experimental Result
60%
Access Control
56%
False Positive
49%
Botnets
49%
Attackers
48%
Detection Mechanism
47%
IEEE 802.11
42%
Internet-Of-Things
41%
Network Traffic
40%
Energy Efficient
39%
Distributed Denial of Service Attack
38%
Integrity Verification
38%
Anomaly Detection
38%
Denial-of-Service
36%
Password
34%
Ubiquitous Environment
34%
Source Codes
34%
Sensor Networks
33%
Anti-Spoofing
30%
Access Control Policies
30%
Software Vulnerability
30%
Proposed Mechanism
29%
Quality of Service
27%
Internet Topology
26%
Detection Method
26%
Key Management Scheme
26%
Ubiquitous Computing
26%
Network Topology
25%
Botnet Detection
25%
Security Vulnerability
24%
Intrusion Detection
23%
task-scheduling
23%
Fault Tolerant
23%
Voice over Internet Protocol (VoIP)
23%
Security Requirements
22%
Software Component
21%
Flow Information
21%
Key Management
21%
Firewall
20%
Allocation Method
20%
Filesystems
20%
Local Area Network
20%
Authentication
20%
Denial-of-Service Attack
20%
Android
20%
Attack Traffic
19%
Fuzzing
19%
Keyphrases
Vulnerability
97%
Wireless Sensor Networks
89%
Malware
56%
Botnet
52%
Distributed Denial of Service (DDoS)
49%
Code Clone
43%
World Wide Web
40%
Worm
39%
Ubiquitous Environment
38%
Access Control
37%
Vulnerable Code
35%
Attacker
34%
Video Files
32%
Integrity Verification
31%
DNS Traffic
31%
Botnet Detection
31%
Anti-spoofing
30%
Entropy Analysis
30%
Vulnerability Detection
29%
Security Issues
28%
Ubiquitous Computing
28%
Load Balancing
27%
Network Topology
26%
Detection Method
26%
Video Event Data Recorder
25%
Energy Efficient
24%
Software Vulnerability
24%
Scalable Approaches
24%
Software Components
24%
Internet Worm
23%
Group Activity
23%
Signature Matching
23%
DDoS Attack
23%
Security Patch
23%
Process Allocation
23%
Frame Aggregation
23%
Task Scheduling
23%
Fault-tolerant
23%
Packing Algorithm
23%
Dynamic Key Management
23%
Voice over Internet Protocol (VoIP)
23%
Video Content
23%
User Activity
22%
Attestation
22%
Source Code
22%
Access Control Model
21%
Anomaly Detection
21%
Detection Mechanism
21%
Key Management Scheme
21%
Network Attacks
21%