Computer Science
Abstract Interpretation
26%
Access Control
100%
Access Control Policies
33%
Access Rights
20%
Active Network
64%
Ad Hoc On-Demand Distance Vector
21%
Analysis Technique
24%
Android
80%
Attackers
45%
Attribute-Based Access Control
21%
Audit Log
23%
Authentication
35%
Automaton
26%
Case Study
79%
Characteristic Curve
20%
Denial of Service Attack
35%
digital right management
21%
Distributed Systems
20%
Electronic Medical Record
56%
Embedded Device
39%
Embedded Systems
26%
False Negative
20%
False Positive
20%
Feature Space
26%
Information Technology
23%
Insider Threat
26%
Internet of Things
35%
Machine Learning
74%
Malware
26%
Mobile Device
19%
model checker
33%
Network Protocols
51%
Network Simulation
26%
Personal Digital Assistant
21%
Policy Language
24%
Privacy Challenge
29%
Privacy Preserving
19%
Programmable Network
21%
Provider Service
18%
Quality of Service
26%
Recognizer
20%
Security and Privacy
22%
Security Challenge
22%
Security Policy
40%
Software Engineering
24%
System Administrator
22%
Vector Routing Protocol
26%
Web Service
36%
White Space
26%
Wireless Networks
21%
Keyphrases
Abstract Interpretation
24%
Access Control
66%
Access Control Policy
28%
Access Decision
28%
Access Log
21%
Active Networks
61%
Adversary
35%
Android
59%
Assisted Living
28%
Attacker
33%
Attestation
26%
Attribute-based
26%
Attribute-based Access Control
21%
Automata
26%
Cartesian Closed Category
21%
Coercion
26%
Communication Protocol
48%
Database Access Control
35%
Denial-of-service Attack
24%
Denotational Semantics
32%
Electronic Health Record System
50%
Electronic Health Records
23%
Electronic Medical Records
30%
Embedded Systems
30%
Formal Analysis
25%
Formal Methods
21%
Insider Threat
21%
Internet of Things
35%
Linear Logic
26%
Malware
27%
Mathematical Foundations
21%
Network Events
35%
Network Simulation
21%
Polymorphism
21%
Poset
21%
Privacy Concerns
56%
Routing Protocol
23%
Safety Properties
30%
Security Policy
26%
Side Channel
22%
Smart Home
23%
Software Engineering
29%
System Administrator
23%
Type Checking
24%
Universal Domain
32%
Vulnerability
25%
Web Services
30%
White Space
26%
Wireless Networks
21%
World Wide Web
36%