Engineering & Materials Science
Access control
8%
Application programs
32%
Authentication
24%
Automation
6%
Banking
41%
Bluetooth
9%
Cellular telephones
35%
Classifiers
6%
Commercial off-the-shelf
35%
Communication
9%
Computer hardware
28%
Computer systems
16%
Control systems
39%
Costs
25%
Critical infrastructures
22%
Data storage equipment
16%
Education
15%
Entropy
20%
Firmware
55%
Gamification
12%
Hardware security
23%
Interfaces (computer)
8%
Internet of things
22%
Java programming language
26%
Level control
20%
Machine learning
53%
Malware
100%
Model checking
19%
Monitoring
7%
Network protocols
65%
Online systems
22%
Personnel
6%
Prisons
28%
Rails
15%
Relay protection
22%
Risk management
6%
Sales
17%
Scanning
22%
Scheduling
8%
Security of data
78%
Set theory
11%
Smartphones
17%
Specifications
11%
Static analysis
9%
Stringers
24%
Students
49%
Testing
15%
Time measurement
30%
Virtual machine
56%
Water treatment
7%
Mathematics
Banking
7%
Banks
13%
Calculate
12%
Choose
16%
Confidence interval
6%
Contamination
7%
Control System
16%
Countermeasures
7%
Data Integrity
11%
Demonstrate
6%
Engagement
5%
Entropy
8%
Error-correcting Codes
7%
Estimate
9%
Evidence
6%
False Alarm
10%
Framework
9%
Incentives
6%
Information Flow
8%
Integrity
24%
Java
24%
Language
8%
Leakage
47%
Learning
16%
Limiting
5%
Machine Learning
20%
Malware
70%
Market
18%
Markov chain
5%
Misclassification
7%
Mutual Information
20%
Narrative
22%
Output
8%
Prioritization
6%
Proximity
14%
Quantitative Evaluation
5%
Range of data
8%
Relay
24%
Resources
10%
Scanner
5%
Scanning
13%
Semantics
5%
Storytelling
35%
Transactions
5%
Virtual Machine
34%
Virus
7%
Vulnerability
24%
Business & Economics
Apps
61%
Assets
10%
Attack
53%
Auctions
7%
Authentication
28%
Bankers
22%
Banking
13%
Black Box
12%
Communication
14%
Communication Media
22%
Learning Methods
22%
Machine Learning
24%
Message Authentication
34%
Modeling
10%
Online Services
21%
Patient Safety
6%
Posted Offer
14%
Rail
19%
Resources
5%
Reverse Engineering
10%
Security Analysis
26%
Service Selection
25%
Service-oriented
9%
Shared Resources
12%
Storage Service
14%
Traffic Management System
32%
Train
17%
Vulnerability
30%
Wi-Fi
25%