Keyphrases
Anomaly Detector
27%
Private Blockchain
27%
False Discovery Rate
27%
Knowledge Discovery
27%
Dartmouth
27%
Artificial Neural Network
27%
Consensus Algorithm
27%
Internet Data Analysis
27%
User Networks
27%
Detection Result
27%
New Detectors
27%
Wireless Data
27%
Network Activity
27%
Network Scenarios
27%
Community Resources
27%
Machine Learning Techniques
27%
Detection Module
27%
Data Community
27%
False Positive Rate
27%
Traffic Behavior
27%
Knowledge Database
27%
Anomaly Detection
27%
Real Network Environment
27%
KDD99
27%
Steel Production
27%
Document Management System
27%
Electronic Identification
27%
Self-sovereign Identity
27%
Electronic Identity
27%
Authentication Mechanism
27%
Identity Authentication
27%
Notary
18%
Blockchain Network
18%
Steel Consumption
13%
Smart Card
13%
Digital Certificate
9%
Government Entities
9%
National Register
9%
Network Database
9%
Public Key
9%
Blockchain System
9%
Registration Tax
9%
Citizen Identity
9%
Basic Health Services
9%
Identity Verification
9%
Network Architecture
9%
Spoofing
9%
User Authentication
9%
Transaction Confirmation
9%
Private Key
9%
Network Entity
9%
Transaction Scale
9%
Proof-of-Work
6%
Distributed Architecture
6%
New Consensus
6%
Blockchain
6%
Hash Function
6%
Proof of Stake
6%
Large Elections
6%
Homomorphic Encryption
6%
Internet Voting
6%
Small Media
6%
Estonian
6%
NETmix
6%
I-voting
6%
Biometry
6%
Iris Recognition Technology
6%
User Transaction
6%
Secure Authentication
6%
Security Model
6%
Document Verification
6%
Security Documents
6%
Block Structure
6%
Computer Science
Blockchain
100%
Consensus Algorithm
32%
Cryptographic Operation
27%
Authentication Mechanism
27%
Network Environment
27%
False Positive Rate
27%
Anomaly Detector
27%
Detection Result
27%
Bibliometric Analysis
27%
Knowledge Database
27%
Network Scenario
27%
Bibliometric Study
27%
Detection Rate
27%
Knowledge Discovery
27%
Anomaly Detection
27%
Network Activity
27%
Machine Learning
27%
Neural Network
27%
Learning System
27%
Biometrics
27%
Authentication
19%
Smart Card
10%
User Authentication
10%
Network Architecture
10%
Identity Management System
9%
Identity Management
9%
Electronic Document
9%
System Identification
9%
Digital Identity
9%
Web of Science
9%
Computer Science
9%
Programming Language
9%
Blind Signature
6%
Homomorphic Encryption
6%
Hash Function
6%
Computational Cost
6%
Great Number
6%
Mobile Technology
6%
Distributed Architecture
6%
Physical Security
5%
Authentication Method
5%
Iris Recognition
5%
Biometric Feature
5%
Security Model
5%
Structured Block
5%
Fingerprint Recognition
5%
Store Information
5%
Network Concept
5%
Public Key Certificate
5%
Validation Process
5%
Spoofing
5%
Network Database
5%
Identity Verification
5%
INIS
production
54%
authentication
49%
architecture
38%
algorithms
36%
internet
34%
biometrics
32%
security
30%
cryptography
27%
operation
27%
management
27%
steels
27%
colombia
16%
reviews
13%
tools
13%
identification systems
13%
energy
13%
design
13%
processing
13%
lectures
13%
economy
13%
computers
13%
programming languages
13%
validation
9%
applications
9%
mining
9%
verification
9%
taxes
9%
health services
9%
economics
9%
machine learning
6%
efficiency
6%
neural networks
6%
data analysis
6%
intrusion
6%
devices
5%
cost
5%
capacity
5%
expansion
5%
information
5%