Computer Science
Wireless Sensor Network
100%
Logical Topology
38%
Internet-Of-Things
37%
Blockchain
36%
Cybersecurity
29%
Block Cipher
28%
Security and Privacy
26%
Adversarial Machine Learning
25%
Sensor Networks
25%
Privacy Preserving
25%
Sensor Node
25%
Key Management Scheme
24%
Network Intrusion Detection System
21%
Authentication
19%
Swarm Intelligence
18%
Data Generation
18%
Resource Constraint
16%
Machine Learning
15%
Data Collector
15%
Feature Extraction
15%
key pre-distribution
14%
Learning System
12%
Communication Overhead
12%
Fully Homomorphic Encryption
12%
Code Injection Attack
12%
Gathering Data
12%
Feature Selection
12%
Healthcare Data
12%
Internet of Things Device
10%
Cloud Computing
10%
Federated Learning
10%
Security Attack
10%
Biggest Challenge
10%
Random Key Predistribution
10%
Candidate Key
10%
Symmetric Cryptography
10%
Healthcare Professional
10%
database
10%
Detection Accuracy
9%
Data Integrity
9%
Adversarial Example
9%
Conventional Method
9%
Intrusion Detection System
9%
Energy Consumption
8%
Application Protocol
8%
Anomaly Detection
8%
Encryption Technique
8%
Authorized Personnel
8%
Homomorphic Encryption
8%
authentication scheme
7%
Keyphrases
Wireless Sensor Networks
88%
Logical Topology
38%
Key Management Scheme
32%
Lightweight Block Cipher
32%
Sensor Node
26%
Blockchain
24%
Electronic Health Record System
24%
Key Predistribution
23%
Network Intrusion Detection System
21%
Network Lifetime
21%
Adversarial Attack
19%
Personally Controlled Electronic Health Record (PCEHR)
19%
Chain Oriented Sensor Networks
18%
Privacy-preserving
18%
Resource Constraints
17%
Cybersecurity
16%
Partial Key
16%
Security Privacy
14%
Voronoi Diagram
14%
Secure Communication
13%
Blockchain Technology
13%
Data Integrity
13%
Wireless Security
13%
Fully Homomorphic Encryption
12%
Swarm Intelligence
12%
T-way Testing
12%
Test Case Generation
12%
Cluster-based Wireless Sensor Network
12%
Code Injection Attack
12%
Mobile Data Collector
12%
Construction Scheme
12%
E-HR
12%
Incremental Learning
12%
Spatial Crowdsourcing
12%
Permissioned Blockchain
12%
Time-adaptive
12%
Cryptographic Techniques
10%
Federated Learning
10%
Sensor Networks
10%
Large-scaled
10%
Multichain
10%
Encryption
10%
Low Communication Overhead
10%
High Resilience
10%
Session Key
10%
Symmetric Cryptography
10%
Security Attacks
10%
Popular
10%
Detection Accuracy
9%
Internet of Things Devices
9%