Keyphrases
Acute Sepsis
41%
Aegean
83%
Aviation Security
83%
Cellular Recovery
41%
Client Selection
83%
Clinical Sepsis
83%
Cloud Data Security
41%
Cryptanalysis
83%
Data Consolidation
66%
Data Security in Cloud
83%
Differential Correlation
83%
Dual Structure
62%
Dynamic Authentication
83%
Feistel Structure
41%
Fuzzy Commitment Scheme
55%
Ground Sensors
83%
Hamming Weight Leakage
83%
Home Security
83%
Impossible Differential
83%
Impossible Differential Cryptanalysis
41%
Integral Distinguisher
83%
Intelligent Home
83%
Intelligent Sensors
83%
Intrusion Datasets
83%
Invariant Subspace Attack
83%
KDD99
55%
Keccak
83%
Lightweight Algorithm
83%
Meaningful Shadow Images
55%
Meaningful Shadows
83%
Meningococcal Sepsis
83%
Message Verification
83%
Number of pixels Change Rate
83%
Pediatric Critical Care Units
41%
Pediatric Logistic Organ Dysfunction
83%
PRINTcipher
83%
Profiling Attacks
83%
Security in Cloud Computing
83%
Sensor-cloud
83%
Sepsis Prediction
83%
Sepsis Prognosis
41%
Sepsis Survival
41%
Shadow Image
83%
Side-channel Analysis
83%
SIMON
83%
SPARX
83%
Unified Average Changing Intensity
55%
WEKA Tool
55%
Zero-correlation Linear Cryptanalysis
83%
Zero-correlation Linear Hull
41%
Computer Science
Architecture Function
16%
Attack Analysis
33%
Automation System
83%
Biometric Template Protection
27%
Broadcast Message
83%
Broadcast Receiver
20%
Class Imbalance
33%
Cloud Data Security
27%
Data Augmentation
33%
Data Complexity
27%
Data Consolidation
66%
Deep Learning Method
83%
Distributed Learning
16%
Effective Management
16%
Embedded System
83%
Embedding Capacity
55%
Feature Selection
23%
Federated Learning
83%
Hamming Weight
33%
Healthcare Ecosystem
83%
Hill-Climbing Method
20%
Home Automation
83%
Home Environment
83%
Internet of Things
100%
Internet-Of-Things
83%
Intrusion Detection
47%
Intrusion Detection System
83%
Learning Framework
28%
Learning System
83%
Logistic Regression
25%
Machine Learning
83%
Machine Learning
40%
Machine Learning Technique
83%
Malicious Client
16%
Memristor
83%
Multilateration
20%
Multiparty Authentication
33%
Multiple Client
16%
Number of Pixel Change Rate and Unified Average Changing Intensity
55%
Personal Computer
83%
Process Variation
27%
Random Selection
16%
Side Channel Attack
27%
side-channel
83%
Smart City
33%
Smart Device
16%
Time Complexity
27%
Time Monitoring
83%
Training Model
16%
Wi-Fi
83%