Engineering & Materials Science
Malware
100%
Security of data
78%
Network protocols
65%
Virtual machine
56%
Firmware
55%
Machine learning
53%
Students
49%
Banking
41%
Control systems
39%
Cellular telephones
35%
Commercial off-the-shelf
35%
Application programs
32%
Time measurement
30%
Prisons
28%
Computer hardware
28%
Java programming language
26%
Costs
25%
Stringers
24%
Authentication
24%
Hardware security
23%
Internet of things
22%
Scanning
22%
Relay protection
22%
Online systems
22%
Critical infrastructures
22%
Level control
20%
Entropy
20%
Model checking
19%
Sales
17%
Smartphones
17%
Data storage equipment
16%
Computer systems
16%
Testing
15%
Rails
15%
Education
15%
Gamification
12%
Specifications
11%
Set theory
11%
Bluetooth
9%
Static analysis
9%
Communication
9%
Interfaces (computer)
8%
Access control
8%
Scheduling
8%
Water treatment
7%
Monitoring
7%
Personnel
6%
Automation
6%
Risk management
6%
Classifiers
6%
Mathematics
Malware
70%
Leakage
47%
Storytelling
35%
Virtual Machine
34%
Java
24%
Vulnerability
24%
Integrity
24%
Relay
24%
Narrative
22%
Mutual Information
20%
Machine Learning
20%
Market
18%
Learning
16%
Control System
16%
Choose
16%
Proximity
14%
Scanning
13%
Banks
13%
Calculate
12%
Data Integrity
11%
Resources
10%
False Alarm
10%
Framework
9%
Estimate
9%
Output
8%
Language
8%
Entropy
8%
Range of data
8%
Information Flow
8%
Virus
7%
Misclassification
7%
Contamination
7%
Banking
7%
Countermeasures
7%
Error-correcting Codes
7%
Confidence interval
6%
Demonstrate
6%
Incentives
6%
Evidence
6%
Prioritization
6%
Limiting
5%
Transactions
5%
Engagement
5%
Quantitative Evaluation
5%
Scanner
5%
Semantics
5%
Markov chain
5%
Business & Economics
Apps
61%
Attack
53%
Message Authentication
34%
Traffic Management System
32%
Vulnerability
30%
Authentication
28%
Security Analysis
26%
Wi-Fi
25%
Service Selection
25%
Machine Learning
24%
Learning Methods
22%
Communication Media
22%
Bankers
22%
Online Services
21%
Rail
19%
Train
17%
Storage Service
14%
Posted Offer
14%
Communication
14%
Banking
13%
Shared Resources
12%
Black Box
12%
Modeling
10%
Assets
10%
Reverse Engineering
10%
Service-oriented
9%
Auctions
7%
Patient Safety
6%
Resources
5%