Engineering & Materials Science
Blockchain
100%
Internet of things
84%
Authentication
74%
Communication
67%
Access control
65%
Cryptography
61%
Data privacy
58%
Big data
56%
Network security
55%
Internet
42%
Cloud computing
41%
Intrusion detection
38%
Crowdsourcing
35%
Machine learning
35%
Network protocols
34%
Data fusion
34%
Mobile ad hoc networks
32%
Heterogeneous networks
28%
Taxation
26%
Edge computing
25%
Security of data
25%
Wireless networks
25%
Game theory
23%
Data storage equipment
23%
Servers
23%
Data communication systems
20%
Data Analytics
20%
Mobile computing
19%
Scalability
19%
Economics
19%
Software defined networking
19%
Traffic control
19%
Secure communication
18%
Malware
18%
Recommender systems
18%
Tensors
17%
Trusted computing
17%
Radio access networks
16%
Industry
16%
Costs
15%
Base stations
15%
Experiments
15%
Synchronization
14%
Anomaly detection
14%
Industrial internet of things (IIoT)
14%
Transfer learning
13%
Virtual machine
13%
Data mining
13%
Application programs
12%
Singular value decomposition
11%
Mathematics
Social Networking
49%
Privacy Preserving
32%
Authentication
28%
Privacy
23%
Network Security
21%
Encryption
19%
Recommender Systems
19%
Internet of Things
18%
Communication
17%
Tax
16%
Machine Learning
16%
Mining
14%
Trust Management
14%
Privacy Preservation
14%
Revocation
13%
Access Control
13%
Reputation System
13%
Interference
13%
Trusted Computing
12%
Next Generation Network
11%
Evaluation
11%
Mobile Applications
11%
Precoding
10%
Attack
10%
Mobile Ad Hoc Networks
10%
Recommendations
10%
Governance
10%
Software
10%
Virtualization
10%
Rule Learning
10%
Index System
9%
Countermeasures
9%
Data Communication
9%
Caching
9%
Tunnel
8%
Transactions
8%
Performance Evaluation
8%
Cellular Networks
8%
Social Systems
8%
Communication Cost
8%
Alignment
8%
Homomorphic Encryption
8%
K-means
8%
Homomorphic
7%
Vulnerability
7%
Resource Allocation
7%
Query
7%
Robot
7%
Healthcare
7%
Learning
7%
Business & Economics
Encryption
32%
Privacy Preserving
26%
Cloud Services
18%
Big Data
17%
Social Networking
17%
Authentication
15%
Cloud Computing
15%
Privacy
14%
Trust Management
14%
Tax Evasion
13%
Service Provider
11%
Node
10%
Mobile Ad Hoc Networks
9%
Top-k
9%
Plagiarism
9%
Cellular Networks
9%
Transfer Learning
8%
Policy Networks
8%
Wireless Networks
7%
Internet of Things
7%
K-means
7%
Integrity
6%
Query
6%
Software
6%
Countermeasures
5%
Thread
5%
Networking
5%
Communication
5%
Auditing
5%