Engineering & Materials Science
Anomaly detection
58%
Application programming interfaces (API)
9%
Authentication
9%
Autonomous vehicles
15%
Banking
12%
Botnet
36%
Case based reasoning
25%
Communication
16%
Controllers
24%
Convolutional neural networks
11%
Crime
25%
Cyber Physical System
24%
Data mining
8%
Deep learning
17%
Degradation
7%
Denial-of-service attack
8%
Digital forensics
17%
Distributed parameter control systems
13%
Economics
10%
Ecosystems
8%
Electric network analysis
27%
Electronic mail
14%
Ethernet
13%
Experiments
7%
Gold
47%
Industry
45%
Internet
20%
Internet of things
9%
Internet service providers
15%
Intrusion detection
100%
Labeling
10%
Learning algorithms
9%
Machine learning
27%
Malware
80%
Mobile computing
12%
Network protocols
14%
Profitability
19%
Recurrent neural networks
17%
Reinforcement
14%
Reverse engineering
9%
Routers
9%
Security of data
30%
Servers
25%
Smart power grids
10%
Spamming
10%
Time series
14%
Unmanned aerial vehicles (UAV)
10%
Visualization
9%
Wavelet transforms
11%
Websites
18%
Mathematics
Accidents
7%
Anomaly
7%
Anomaly Detection
27%
Attack
33%
Cloud Computing
9%
Clustering
5%
Contagion
7%
Controller
10%
Decision Support Systems
8%
Denial of Service
11%
Diagnostics
5%
Driver
7%
Electronic Mail
10%
Game
14%
Heuristics
5%
Infection
5%
Infrastructure
10%
Internet of Things
9%
Intrusion Detection
14%
Intrusion Detection System
17%
Labeling
5%
Learning
8%
Malware
18%
Model
7%
Person
5%
Profiling
9%
Real-time
6%
Recurrent Neural Networks
13%
Reverse Engineering
9%
Self-similarity
6%
Server
5%
Smart Grid
10%
Social Network Analysis
8%
Spam
12%
Traffic
12%
Unmanned Aerial Vehicle
9%
Virtual Community
11%
Vision
8%
Vulnerability
14%