Keyphrases
Anomaly Detector
16%
Private Blockchain
16%
False Discovery Rate
16%
Knowledge Discovery
16%
Dartmouth
16%
Artificial Neural Network
16%
Consensus Algorithm
16%
Internet Data Analysis
16%
User Networks
16%
Detection Result
16%
New Detectors
16%
Attack Detection
16%
Wireless Data
16%
Network Activity
16%
Content-based
16%
Network Intrusion Detection
16%
Network Scenarios
16%
Community Resources
16%
Machine Learning Techniques
16%
Detection Module
16%
Data Community
16%
False Positive Rate
16%
Traffic Behavior
16%
Knowledge Database
16%
Anomaly Detection
16%
Real Network Environment
16%
KDD99
16%
Baxter Robot
16%
Human-Robot Scaffolding
16%
Cognitive Architecture
16%
Metacognitive Support
16%
Learning Tools
16%
Emotional Support
16%
Service Adaptation
16%
DARPA
16%
Digital TV
16%
Information Services
16%
Plum
16%
Multi-class
16%
Agent-based Control
16%
Robotic Agents
16%
Smart Events
16%
Self-sovereign Identity
16%
Participation Practices
16%
Creative Practice
16%
Steel Production
16%
Document Management System
16%
Protection Technology
16%
Network Solution
16%
Dynamical Method
16%
Electronic Identification
16%
Electronic Identity
16%
Authentication Mechanism
16%
Agent Migration
16%
Learning Procedure
16%
Network Security Attacks
16%
Security Network
16%
Secure Architecture
16%
Artificial Immune System
16%
Dynamical Performance
16%
Proactive Solution
16%
Identity Authentication
16%
COVID-19 Pandemic
16%
Punk Scene
16%
Political Practice
16%
Notary
10%
Blockchain Network
10%
Spleen
8%
Anomaly Detection System
8%
Bio-inspired Methods
8%
KDD Dataset
8%
Genetic Method
8%
Network Intrusion Detection System
8%
Attack Tools
8%
Attack Analysis
8%
Activation Level
8%
Modular Architecture
8%
Internal Security
8%
Event Correlation
8%
Steel Consumption
8%
Scaffolder
8%
Smart Card
8%
Construction Influence
5%
Simple Tools
5%
Cognitive Conditions
5%
Bruner
5%
Zone of Proximal Development
5%
Expected Outcomes
5%
Education Robots
5%
Artificial Systems
5%
Schema Construction
5%
Mediation Process
5%
Process Networks
5%
Television Network
5%
Distributed Systems
5%
Telecommunication Systems
5%
TV Adaptation
5%
Digital Certificate
5%
Government Entities
5%
National Register
5%
INIS
architecture
100%
security
44%
tools
43%
data
40%
robots
37%
learning
35%
humans
32%
production
32%
operation
29%
control
29%
authentication
29%
applications
26%
validation
26%
algorithms
21%
colombia
20%
intrusion
20%
internet
20%
information
19%
biometrics
19%
intrusion detection systems
18%
design
18%
performance
18%
detection
16%
computer codes
16%
covid-19
16%
cryptography
16%
solutions
16%
plums
16%
probability
16%
seas
16%
transformations
16%
management
16%
populations
16%
steels
16%
migration
16%
coronaries
16%
levels
16%
protection
13%
economics
10%
optimization
10%
neural networks
8%
hybrids
8%
defense
8%
processing
8%
lectures
8%
economy
8%
computers
8%
reviews
8%
identification systems
8%
energy
8%
programming languages
8%
resources
8%
spleen
5%
interactions
5%
market
5%
host
5%
correlations
5%
peaks
5%
psychology
5%
taxes
5%
health services
5%
closures
5%
reactivation
5%
control systems
5%
government policies
5%
java
5%
mining
5%
verification
5%
network analysis
5%
economic impact
5%
environment
5%
Computer Science
Blockchain
58%
Robotics
48%
Robot
32%
Attack Analysis
32%
Anomaly Detection
32%
Neural Network
32%
Consensus Algorithm
19%
Cryptographic Operation
16%
Artificial Immune Systems
16%
Network Security
16%
Authentication Mechanism
16%
Cognitive Architecture
16%
Machine Learning Technique
16%
Network Environment
16%
False Positive Rate
16%
network intrusion detection
16%
Detection Method
16%
Activation Level
16%
multi agent
16%
Communication Event
16%
Modular Architecture
16%
Detection Result
16%
Bibliometric Analysis
16%
Knowledge Database
16%
Bibliometric Study
16%
Detection Rate
16%
Knowledge Discovery
16%
Java Language
16%
Network Intrusion Detection System
16%
Anomaly Detector
16%
Intrusion Detection System
16%
Selection System
16%
Network Scenario
16%
Network Activity
16%
Machine Learning
16%
Information Service
16%
Computer Hardware
16%
Learning System
16%
Social Network
16%
Convolutional Neural Network
16%
Biometrics
16%
Network Architecture
14%
Learning Process
13%
Authentication
11%
Security Attack
8%
Inspired Method
8%
Computer Network
8%
Malicious Attack
8%
Operational Characteristic
8%
Contingency Table
8%
Federation System
8%
Multi Agent Systems
8%
Likelihood Ratio
8%
Research Project
8%
Smart Card
6%
User Authentication
6%
Parallelism
5%
Control Function
5%
Identity Management System
5%
Identity Management
5%
Electronic Document
5%
System Identification
5%
Digital Identity
5%
Convolutional Layer
5%
Visual Impairment
5%
Distributed Network
5%
Regularization
5%
Web of Science
5%
Critical System
5%
Autonomous Agent
5%
Watermarking
5%
Gradient-Weighted Class Activation Mapping
5%
Selection Process
5%
Training Phase
5%
Data Augmentation
5%
Classification Accuracy
5%
Computer Vision
5%
Computer Science
5%
Vision Systems
5%
Process Network
5%
Distributed System
5%
Telecommunication System
5%
Service to User
5%
Adaptation Process
5%
Application Type
5%
Programming Language
5%
System Architecture
5%
Learning Experiences
5%