Computer Science
Access Control
100%
Case Study
79%
Machine Learning
72%
Active Network
64%
Android
63%
Electronic Medical Record
56%
Network Protocols
51%
Learning System
50%
Attackers
45%
Security Policy
40%
Embedded Device
39%
Web Service
36%
Authentication
35%
Internet-Of-Things
35%
Denial-of-Service
35%
model checker
33%
Access Control Policies
33%
Privacy Challenge
29%
Service Provider
29%
Vector Routing Protocol
26%
White Space
26%
Automaton
26%
Insider Threat
26%
Feature Space
26%
Network Simulation
26%
Quality of Service
26%
Embedded System
26%
Malware
26%
Analysis Technique
24%
Computer Hardware
24%
Information Technology
23%
Audit Log
23%
Security Challenge
22%
Security and Privacy
22%
System Administrator
22%
Abstract Interpretation
21%
digital right management
21%
Ad Hoc On-Demand Distance Vector
21%
Attribute-Based Access Control
21%
Personal Digital Assistant
21%
Wireless Network
21%
Programmable Network
21%
Software Engineering
20%
False Negative
20%
Recognizer
20%
Characteristic Curve
20%
Access Rights
20%
False Positive
20%
Programming Language
19%
Privacy Preserving
19%
Keyphrases
Access Control
66%
Active Networks
61%
Android
59%
Privacy Concerns
56%
Electronic Health Record System
50%
Communication Protocol
48%
World Wide Web
36%
Adversary
35%
Database Access Control
35%
Network Events
35%
Internet of Things
35%
Attacker
33%
Universal Domain
32%
Denotational Semantics
32%
Safety Properties
30%
Embedded Systems
30%
Web Services
30%
Electronic Medical Records
30%
Software Engineering
29%
Access Control Policy
28%
Assisted Living
28%
Access Decision
28%
Malware
27%
Automata
26%
Linear Logic
26%
Attestation
26%
Coercion
26%
White Space
26%
Attribute-based
26%
Security Policy
26%
Formal Analysis
25%
Vulnerability
25%
Type Checking
24%
Abstract Interpretation
24%
Denial-of-service Attack
24%
System Administrator
23%
Electronic Health Records
23%
Routing Protocol
23%
Smart Home
23%
Side Channel
22%
Cartesian Closed Category
21%
Network Simulation
21%
Wireless Networks
21%
Insider Threat
21%
Attribute-based Access Control
21%
Access Log
21%
Poset
21%
Mathematical Foundations
21%
Polymorphism
21%
Formal Methods
21%