Keyphrases
Analytic Hierarchy Process
100%
Obfuscation
96%
Embedded Operating System
78%
Process-based
72%
Industrial Internet of Things (IIoT)
72%
Control Flow Obfuscation
60%
Authentication Protocol
58%
Subscriber
55%
Risk Estimation
53%
Capability-Based Access Control (CapBAC)
48%
Secure Authentication
48%
Virtualization
48%
Key Distribution Scheme
48%
Risk Assessment Methods
48%
Universal Mobile Telecommunication System
48%
Risk Assessment
48%
Control System
48%
Virtual Machine
47%
Authentication Key Agreement Protocol
43%
Obfuscation Techniques
42%
Engineering Education System
36%
Cloud System
36%
Risk Assessment System
36%
Internet of Things
35%
Control Flow
35%
Channel Protection
33%
Pay TV
32%
Systems Engineering
32%
Machine Learning Models
32%
Process Control System
31%
Cloud Security
30%
Token
30%
IoT Cloud
30%
Virtualization Technology
29%
Computing Power
29%
Mobile Networks
27%
Authentication Server
27%
Access Control Model
26%
Physical Machine
26%
Bandwidth Utilization
25%
Vulnerability
24%
Secure Access Control
24%
Dual-autoencoder
24%
Key Delegation
24%
Authenticated Key Agreement
24%
Key Agreement Scheme
24%
Critical Environments
24%
Optimized Link State Routing
24%
Merchants
24%
Electronic Payment
24%
Computer Science
Analytic Hierarchy Process
100%
Embedded Operating System
78%
Assessment Model
77%
Obfuscation
77%
Authentication
72%
Control Flow
72%
Industrial Internet of Things
72%
Internet-Of-Things
62%
System Risk Assessment
60%
Virtual Machine
59%
Authentication Protocol
58%
Key Distribution
56%
Authentication Key
48%
Virtualizations
48%
Telecommunication System
48%
Assessment Method
48%
Virtualization Technology
39%
Engineering Education
36%
cloud system
36%
Mobile Network
32%
Control Engineer
32%
Testbed
32%
Wireless Network
32%
Cloud Security
30%
Access Control Policies
29%
Computing Power
29%
Real Time Performance
29%
Denial-of-Service
27%
Cloud Computing
27%
Reverse Engineering
25%
Network Address
24%
Electronic Content
24%
Electronic Payment
24%
Active Learning
24%
Control Parameter
24%
Cognitive Scientist
24%
Industrial Designer
24%
handover delay
24%
Intelligent Robots
24%
Security protocols
24%
Firefox
24%
Request Message
24%
Engineering Student
24%
Time Constraint
24%
Augmented Reality
24%
Computer Scientist
24%
Computer Control
24%
Intrusion Detection System
24%
Analytical Hierarchy Process
24%
Software Architecture
24%