Engineering & Materials Science
Intrusion detection
100%
Malware
80%
Anomaly detection
58%
Gold
47%
Industry
45%
Botnet
36%
Security of data
30%
Electric network analysis
27%
Machine learning
27%
Case based reasoning
25%
Servers
25%
Crime
25%
Controllers
24%
Cyber Physical System
24%
Internet
20%
Profitability
19%
Websites
18%
Digital forensics
17%
Deep learning
17%
Recurrent neural networks
17%
Communication
16%
Autonomous vehicles
15%
Internet service providers
15%
Electronic mail
14%
Time series
14%
Network protocols
14%
Reinforcement
14%
Ethernet
13%
Distributed parameter control systems
13%
Banking
12%
Mobile computing
12%
Wavelet transforms
11%
Convolutional neural networks
11%
Labeling
10%
Smart power grids
10%
Spamming
10%
Economics
10%
Unmanned aerial vehicles (UAV)
10%
Application programming interfaces (API)
9%
Authentication
9%
Learning algorithms
9%
Reverse engineering
9%
Internet of things
9%
Visualization
9%
Routers
9%
Data mining
8%
Denial-of-service attack
8%
Ecosystems
8%
Experiments
7%
Degradation
7%
Mathematics
Attack
33%
Anomaly Detection
27%
Malware
18%
Intrusion Detection System
17%
Game
14%
Vulnerability
14%
Intrusion Detection
14%
Recurrent Neural Networks
13%
Spam
12%
Traffic
12%
Virtual Community
11%
Denial of Service
11%
Infrastructure
10%
Electronic Mail
10%
Controller
10%
Smart Grid
10%
Unmanned Aerial Vehicle
9%
Internet of Things
9%
Profiling
9%
Reverse Engineering
9%
Cloud Computing
9%
Learning
8%
Decision Support Systems
8%
Social Network Analysis
8%
Vision
8%
Contagion
7%
Accidents
7%
Anomaly
7%
Model
7%
Driver
7%
Self-similarity
6%
Real-time
6%
Server
5%
Person
5%
Diagnostics
5%
Infection
5%
Labeling
5%
Clustering
5%
Heuristics
5%