Computer Science
Prediction Model
100%
Vulnerability Assessment
75%
Business Process
50%
Software Metric
50%
Intrusion Detection System
50%
Defect Prediction
50%
Software Defect
50%
Neural Network
50%
Support Vector Machine
50%
Cyber Attack
50%
component-based software
50%
Zachman Framework
50%
Cloud Computing
50%
Colored Petri Net
50%
Face Recognition
50%
Network Security
50%
collaborative design
50%
Cyberattack
50%
Cuckoo Search
26%
Defensive Measure
25%
Map-Reduce
25%
Support Function
25%
Experimental Result
25%
Keras
25%
Vulnerability Detection
20%
Detection Method
20%
Subnet
20%
Business Process Model
20%
Private Cloud
16%
Security Assessment
12%
Prediction Value
12%
Information Security Risk
12%
maximum-likelihood
12%
Likelihood Estimation
12%
Access Control Matrix
12%
Intrusion Detection
10%
Activity Diagram
10%
Convergence Speed
10%
Network Design
10%
Detection Algorithm
10%
Rough Set
10%
Process Data
10%
Malicious Attack
10%
Security Surveillance
10%
Net Application
10%
Network Packet
10%
Network Intrusion
10%
Rough Set Theory
10%
Description Logics
10%
Base Classifier
8%
Engineering
Radar Signal
66%
Hierarchical Clustering
62%
Target Area
58%
Energy Engineering
58%
Fractal Dimension
50%
Cloud Computing
50%
Wave Number
50%
Fourier Transform
50%
Single Link
50%
Component Analysis
50%
Principal Components
50%
Cloud Engineering
50%
Ground Penetrating Radar Systems
50%
Rule Base
50%
Assessment Method
50%
Defects
50%
System of Systems
50%
Experimental Result
45%
Operating Characteristic
37%
Clustering Algorithm
29%
Support Function
25%
Scan Signal
25%
Face Image
16%
Constrains
16%
Synthetic Aperture
16%
Main Component
16%
Show Value
16%
Test Result
16%
Similarities
12%
Maximum Likelihood Estimation
12%
Intrusion Detection System
12%
System Risk
12%
Priori Knowledge
8%