Computer Science
Malware
100%
Experimental Result
40%
Blockchain
30%
Malware Detection
24%
Active Learning
24%
Attribute-Based Encryption
24%
Adversarial Machine Learning
24%
Access Control System
24%
Based Malware Detection
24%
Defect Prediction
24%
Transfer Learning
24%
Access Control
21%
Random Decision Forest
16%
Permission Role
16%
Cloud Storage
16%
Semisupervised Learning
16%
role-based access control model
16%
Artificial Intelligence
15%
Association Analysis
15%
Feature Selection
15%
User Data
15%
Attackers
13%
Ensemble Learning
12%
Matching Algorithm
12%
Categorization System
12%
Control-Flow Graph
12%
Robot
12%
Representation Function
12%
Intermediate Representation
12%
Ontology
12%
Role-Based Access Control
12%
Architecture Framework
12%
Security Detection
12%
Malicious Code Analysis
12%
Target Environment
12%
Practical Significance
12%
Structural Property
12%
Android Malware
12%
System Calls
12%
Complex Network Theory
12%
segmentation algorithm
12%
Enhanced Security
12%
Social Networking (Online)
12%
Time Performance
12%
Classification Method
12%
Internet Security
12%
Machine Learning
12%
Wireless Sensor Network
12%
Online Analysis
12%
Enterprise Architecture
12%
Engineering
Robot
24%
Control System
24%
Obtains
13%
Feature Extraction
12%
Signal-to-Noise Ratio
12%
Detail Image
12%
Final Result
12%
Color Coding
12%
Illustrates
12%
Dimensional System
12%
Region of Interest
12%
Wireless Sensor Network
12%
Gaussian White Noise
12%
Peak Signal
12%
Pixel Level
12%
Instrument Calibration
12%
Edge Information
12%
Support Vector Machine
12%
Sea Clutter
12%
Structural Property
12%
Attribute-Based Encryption
12%
Data User
12%
Control System Design
12%
Structural Similarity
12%
Complex Networks
12%
Similarity Index
12%
Remaining Life
12%
Corner Reflector
12%
Additive Noise
12%
Metrics
9%
Tasks
7%
Simplifies
7%
Control Scheme
7%
Phase Difference
7%
Degree of Freedom
7%
Control Procedure
7%
Control Algorithm
7%
Filtration
6%
Circuit Theory
6%