Keyphrases
Acute Sepsis
41%
Aegean
83%
Aviation Security
83%
Cellular Recovery
41%
Client Selection
83%
Clinical Sepsis
83%
Cloud Data Security
41%
Data Consolidation
66%
Data Security in Cloud
83%
Differential Correlation
83%
Dual Structure
62%
Dynamic Authentication
83%
Embedding Capacity
27%
Feistel Structure
41%
Fuzzy Commitment Scheme
55%
Ground Sensors
83%
Impossible Differential
83%
Impossible Differential Cryptanalysis
41%
Integral Cryptanalysis
41%
Integral Distinguisher
83%
Intelligent Sensors
83%
Internet of Things Architecture
27%
Intrusion Datasets
83%
Invariant Subspace Attack
83%
KDD99
55%
Keccak
83%
Lightweight Algorithm
83%
Meaningful Shadow Images
55%
Meaningful Shadows
83%
Meningococcal Sepsis
83%
Message Verification
83%
Multiparty Authentication
33%
Number of pixels Change Rate
83%
Pediatric Critical Care Units
41%
Pediatric Logistic Organ Dysfunction
83%
PRINTcipher
83%
Security in Cloud Computing
83%
Sensor-cloud
83%
Sepsis Prediction
83%
Sepsis Prognosis
41%
Sepsis Survival
41%
Shadow Image
83%
Shared Image
27%
SIMON
83%
SPARX
83%
Technology Architecture
27%
Unified Average Changing Intensity
55%
WEKA Tool
55%
Zero-correlation Linear Cryptanalysis
83%
Zero-correlation Linear Hull
41%
Computer Science
Architecture Function
16%
Biometric Template Protection
27%
Broadcast Message
83%
Broadcast Receiver
20%
Channel Analysis
83%
Classification Algorithm
11%
Client Server
16%
Cloud Computing Model
10%
Cloud Computing System
10%
Cloud Data Security
27%
Corporate Security Policy
13%
Data Consolidation
66%
Decision Trees
11%
Detection Rate
11%
Distributed Learning
16%
Embedding Capacity
55%
Encryption Process
8%
Evaluation Phase
11%
False Positive
11%
Feature Selection
23%
Federated Learning
83%
Genetic Science
13%
Healthcare Ecosystem
83%
IEEE 802.11
11%
Information Security System
10%
Internet of Things
100%
Intrusion Detection
47%
Intrusion Detection System
83%
Learning Framework
28%
Logistic Regression
11%
Machine Learning
40%
Machine Learning Technique
83%
Malicious Client
16%
Matching Algorithm
16%
Modulo Addition
27%
Multilateration
20%
Multiparty Authentication
33%
Multiple Client
16%
Number of Pixel Change Rate and Unified Average Changing Intensity
55%
Performance Model
11%
Practical Solution
11%
Privacy Preserving
16%
Random Selection
16%
Security Culture
13%
Smart City
33%
Smart Device
16%
Technology Architecture
10%
Threat Landscape
11%
Training Model
16%
Wi-Fi
83%