Computer Science
Internet-Of-Things
100%
Data Center
70%
Smart Grid
56%
Energy Consumption
51%
Authentication
51%
Anomaly Detection
49%
Software-Defined Network
46%
Elliptic Curve
45%
Blockchain
45%
Mutual Authentication
45%
Authentication Protocol
42%
Cloud Computing
35%
Privacy Preserving
35%
Quality of Service
34%
Federated machine learning
34%
Software-Defined Networking
34%
Artificial Intelligence
33%
Edge Computing
30%
Deep Reinforcement Learning
29%
Deep Learning Method
28%
Authentication Mechanism
28%
Intrusion Detection System
28%
authentication scheme
28%
Service-Level Agreement
26%
Intelligent Transportation System
26%
Network Slicing
25%
Learning Approach
24%
Industrial Internet of Things
23%
Anonymity
22%
Big Data
22%
Machine Learning
21%
Energy Efficient
21%
Security and Privacy
21%
Energy Efficiency
20%
Learning System
18%
Network Function
18%
Computer Hardware
17%
Support Vector Machine
17%
Virtual Network
16%
Vehicular Network
16%
Anomaly-Based Detection
16%
Data Processing
15%
Cloud Environment
15%
Security Feature
15%
Network Function Virtualization
15%
provably secure
15%
Internet of Vehicles
15%
Load Balancing
14%
Optimization Problem
14%
Multiobjective
14%
Keyphrases
Software-defined Networking
69%
Electric Vehicle
65%
Smart Grid
62%
Internet of Things
57%
Anomaly Detection
50%
Cloud Data Center
43%
Lightweight Authentication
43%
Authentication Mechanism
41%
Elliptic Curve Cryptography
37%
Secure Authentication
36%
Edge Computing
34%
Frequency Support
33%
Mutual Authentication
30%
Detection Scheme
30%
Energy Consumption
28%
Authentication Protocol
28%
Vehicular Ad Hoc Networks
27%
Intelligent Transportation Systems
26%
Federated Learning
26%
Blockchain-based
26%
Quality of Service
26%
Edge Cloud
24%
Industrial Internet of Things (IIoT)
24%
Network Function Virtualization
23%
Blockchain
23%
Intrusion Detection System
23%
Security Issues
22%
Privacy-preserving Authentication
22%
Hierarchical Control
22%
Renewable Energy
21%
Key Agreement Protocol
20%
UAV
20%
Mobile Edge Computing
20%
Edge-cloud Interplay
20%
Cloud Computing
19%
Security Privacy
18%
Computation Overhead
18%
Deep Learning
17%
Service Level Agreement
17%
Job Scheduling
16%
Authentication Scheme
16%
Wireless Networks
16%
Cloud Environment
15%
Provable Security
15%
Multi-objective Optimization Problem
15%
Existing State
15%
Attack Vectors
15%
Network Applications
15%
Privacy Concerns
14%
As-a-service
14%