Computer Science
Anomaly Detection
49%
Anomaly-Based Detection
16%
Anonymity
22%
Artificial Intelligence
33%
Authentication
51%
Authentication Mechanism
28%
Authentication Protocol
42%
authentication scheme
28%
Big Data
22%
Blockchain
45%
Cloud Computing
35%
Cloud Environment
15%
Computer Hardware
17%
Data Center
70%
Data Processing
15%
Deep Learning Method
28%
Deep Reinforcement Learning
29%
Edge Computing
30%
Elliptic Curve
45%
Energy Consumption
51%
Energy Efficiency
20%
Energy Efficient
21%
Federated machine learning
34%
Industrial Internet of Things
23%
Intelligent Transportation System
26%
Internet of Vehicles
15%
Internet-Of-Things
100%
Intrusion Detection System
28%
Learning Approach
24%
Learning System
18%
Load Balancing
14%
Machine Learning
21%
Multiobjective
14%
Mutual Authentication
45%
Network Function
18%
Network Function Virtualization
15%
Network Slicing
25%
Optimization Problem
14%
Privacy Preserving
35%
provably secure
15%
Quality of Service
34%
Security and Privacy
21%
Security Feature
15%
Service-Level Agreement
26%
Smart Grid
56%
Software-Defined Network
46%
Software-Defined Networking
34%
Support Vector Machine
17%
Vehicular Network
16%
Virtual Network
16%
Keyphrases
Anomaly Detection
50%
As-a-service
14%
Attack Vectors
15%
Authentication Mechanism
41%
Authentication Protocol
28%
Authentication Scheme
16%
Blockchain
23%
Blockchain-based
26%
Cloud Computing
19%
Cloud Data Center
43%
Cloud Environment
15%
Computation Overhead
18%
Deep Learning
17%
Detection Scheme
30%
Edge Cloud
24%
Edge Computing
34%
Edge-cloud Interplay
20%
Electric Vehicle
65%
Elliptic Curve Cryptography
37%
Energy Consumption
28%
Existing State
15%
Federated Learning
26%
Frequency Support
33%
Hierarchical Control
22%
Industrial Internet of Things (IIoT)
24%
Intelligent Transportation Systems
26%
Internet of Things
57%
Intrusion Detection System
23%
Job Scheduling
16%
Key Agreement Protocol
20%
Lightweight Authentication
43%
Mobile Edge Computing
20%
Multi-objective Optimization Problem
15%
Mutual Authentication
30%
Network Applications
15%
Network Function Virtualization
23%
Privacy Concerns
14%
Privacy-preserving Authentication
22%
Provable Security
15%
Quality of Service
26%
Renewable Energy
21%
Secure Authentication
36%
Security Issues
22%
Security Privacy
18%
Service Level Agreement
17%
Smart Grid
62%
Software-defined Networking
69%
UAV
20%
Vehicular Ad Hoc Networks
27%
Wireless Networks
16%