Engineering & Materials Science
Testing
100%
Software testing
84%
Software quality
78%
Black-box testing
49%
Big data
46%
Denial-of-service attack
43%
Open Data
42%
Object oriented programming
39%
Watermarking
38%
Computer programming languages
34%
Experiments
32%
Electronic document identification systems
31%
Cryptography
28%
Costs
26%
Defects
25%
Engineers
23%
Statistical methods
22%
Ant colony optimization
22%
Computer software reusability
22%
Industry
22%
Application programs
21%
Engines
21%
Image watermarking
21%
Multicasting
21%
Modulation
20%
Crime
20%
Coloring
20%
Electronic commerce
19%
Availability
19%
Explosions
19%
Fish
18%
Malware
18%
Seed
17%
Data privacy
17%
Broadcasting
17%
Graphical user interfaces
17%
Recommender systems
17%
Heuristic algorithms
16%
Hybrid systems
16%
Personal computers
16%
Computational efficiency
16%
Scheduling
16%
Multi agent systems
16%
Machine learning
15%
Convolutional neural networks
15%
Information technology
15%
Static analysis
14%
Education
14%
Mobile computing
14%
Brain
14%
Mathematics
Attack
92%
Denial of Service
64%
Watermark
59%
Signcryption
59%
Proxy Signature
48%
Software Quality
38%
Image Watermarking
36%
Watermarking
35%
Recommendation System
30%
Software Components
29%
Confidentiality
29%
Software
29%
Authenticated Encryption
28%
Provable Security
27%
Framework
27%
Configuration
26%
Electronic Commerce
26%
Quality of Service
26%
Modulation
25%
Crash
24%
Java
23%
Corpus
22%
Signature
22%
Random Oracle Model
22%
Vision
21%
Signature Scheme
21%
Mining
21%
Machine Learning
21%
Certificate
21%
Programming
18%
Optimization Algorithm
18%
Fault
17%
Software Reuse
17%
Requirements
15%
Overflow
14%
Traffic
14%
Influence
14%
Ant Colony System
13%
Multimedia
12%
Honeypot
12%
Object-oriented
11%
Lower bound
11%
Demonstrate
10%
Delegation
9%
Cryptosystem
9%
Digital Signature
8%
Programming Languages
8%
Statistical Analysis
8%
Flow Control
7%
Auctions
7%
Social Sciences
denial of services
52%
software
42%
Confidentiality
34%
programming
30%
electronic commerce
22%
neural network
20%
costs
19%
vulnerability
17%
recipient
14%
certification
14%
traffic
9%
vulnerable class
9%
scheduling
9%
communication
9%
traffic volume
8%
authenticity
8%
programming language
7%
integrity
7%
dispute
6%
threat
6%
performance
6%
Internet
6%
learning
5%
engineer
5%
time
5%
experiment
5%