Computer Science
Real Time Systems
100%
Model Checking
91%
Formal Verification
87%
Security protocols
82%
Schedulability Analysis
69%
Shared Resource
63%
Smart Card
61%
Statecharts
59%
Radio Frequency Identification
45%
authentication scheme
40%
Secure Communication
38%
Authentication
35%
Security Analysis
35%
Software-Defined Networking
35%
Process Algebra
34%
Mutual Authentication
34%
Formal Specification
33%
formal modeling
30%
Equivalence Checking
30%
Trading System
30%
Electronic Payment
30%
Firewall Application
30%
Replacement Policy
30%
Internet Protocol Television
30%
Network Interface Card
30%
Case Study
29%
Key Exchange Protocol
25%
Performance Evaluation
22%
Wireless Networks
22%
Real-Time Operating System
22%
Specification Language
22%
User Authentication
20%
Software Systems
19%
Authentication Protocol
18%
Superscalar Processor
18%
Embedded Software
18%
Man-in-the-Middle Attack
17%
Experimental Result
17%
Embedded Systems
16%
Behavior Model
16%
Security Problem
15%
Recognition System
15%
Satellite Communication Network
15%
Face Recognition
15%
Vulnerability Window
15%
Integrity Monitoring
15%
Smart Contract
15%
Robot
15%
Performance Impact
15%
Cryptanalysis
15%
Keyphrases
Security Protocols
50%
Smart Card
45%
Schedulability Analysis
33%
Identity Authentication
30%
Internet TV
30%
Static Analysis Tools
30%
Security Analysis
30%
Trading System
30%
Television Broadcasting
30%
Real-time Systems
30%
Secure Communication
22%
Electronic Payment System
22%
Integer Overflow
20%
Conformational Phases
20%
UPPAAL
20%
Schedulability
19%
Superscalar Processor
18%
Secure Key Exchange
18%
Instruction Level
18%
Specification Analysis
17%
CASPER
17%
Timing Properties
16%
Proton Irradiation
15%
Weakness Detection
15%
RFID System
15%
State Machine Diagram
15%
Medical Device Safety
15%
Radio Frequency Identification
15%
Hierarchical Systems
15%
OpenFlow Network
15%
Static Equivalence
15%
Forwarding Behavior
15%
Gigabit Network
15%
Bottleneck Analysis
15%
Formal Verification Approaches
15%
Smart Contract
15%
Iron-sulfur Cluster
15%
Performance Evaluation Model
15%
Cryptographic Protocols
15%
Algebraic Model
15%
Secrecy Analysis
15%
Resource Supply
15%
Algebraic Framework
15%
Impact Performance
15%
Military Robots
15%
Statechart Specification
15%
Privacy Analysis
15%
Open Networks
15%
Resource Demand
15%
SDN Firewall
15%