Engineering & Materials Science
Ant colony optimization
20%
Application programming interfaces (API)
14%
Application programs
20%
Availability
17%
Big data
42%
Black-box testing
60%
Broadcasting
16%
Coloring
18%
Computational efficiency
15%
Computer programming languages
31%
Computer software reusability
20%
Convolutional neural networks
14%
Costs
23%
Crime
18%
Cryptography
25%
Data privacy
16%
Defects
23%
Denial-of-service attack
39%
Dynamic analysis
15%
Education
13%
Electronic commerce
18%
Electronic document identification systems
28%
Engineers
21%
Engines
20%
Experiments
29%
Explosions
17%
Fish
17%
Graphical user interfaces
15%
Heuristic algorithms
15%
Hybrid systems
15%
Image watermarking
19%
Industry
20%
Information technology
13%
Machine learning
14%
Malware
17%
Modulation
19%
Multi agent systems
14%
Multicasting
19%
Object oriented programming
35%
Open Data
38%
Personal computers
15%
Recommender systems
15%
Scheduling
15%
Seed
16%
Software quality
75%
Software testing
77%
Static analysis
13%
Statistical methods
20%
Testing
100%
Watermarking
35%
Mathematics
Ant Colony System
12%
Attack
85%
Auctions
7%
Authenticated Encryption
26%
Certificate
19%
Confidentiality
26%
Configuration
24%
Corpus
21%
Crash
22%
Cryptosystem
8%
Delegation
8%
Demonstrate
9%
Denial of Service
59%
Digital Signature
8%
Electronic Commerce
24%
Fault
16%
Flow Control
7%
Framework
25%
Honeypot
11%
Image Watermarking
33%
Influence
12%
Java
21%
Lower bound
10%
Machine Learning
19%
Mining
19%
Modulation
23%
Multimedia
11%
Object-oriented
10%
Optimization Algorithm
16%
Overflow
13%
Programming
17%
Programming Languages
7%
Provable Security
25%
Proxy Signature
44%
Quality of Service
24%
Random Oracle Model
20%
Recommendation System
27%
Requirements
14%
Signature
20%
Signature Scheme
19%
Signcryption
54%
Software
26%
Software Components
27%
Software Quality
35%
Software Reuse
16%
Statistical Analysis
7%
Traffic
13%
Vision
20%
Watermark
54%
Watermarking
32%
Social Sciences
authenticity
7%
certification
13%
communication
8%
Confidentiality
31%
costs
17%
denial of services
48%
dispute
6%
electronic commerce
20%
integrity
6%
Internet
5%
learning
5%
neural network
18%
performance
5%
programming
27%
programming language
7%
recipient
13%
scheduling
8%
software
38%
threat
6%
traffic
8%
traffic volume
8%
vulnerability
16%
vulnerable class
8%