Keyphrases
Internet of Things
56%
Smart City
56%
Machine Learning
55%
Blockchain
54%
Cybersecurity
52%
Artificial Intelligence
49%
Cyberstalking
43%
Digital Forensics
39%
Authorship Attribution
34%
Industrial Control Systems
34%
Forensic
34%
Incident Response
34%
COVID-19 Pandemic
33%
Systematic Literature Review
29%
Data Sharing
28%
Ethics
27%
Social Media
27%
Blockchain Technology
26%
Supply Chain Security
25%
Vehicular Ad Hoc Networks
25%
Password Security
25%
Protection Motivation
25%
Cybersecurity Protection
25%
Motivated Behavior
25%
Secret Key Generation
25%
Turbo Codes
25%
Digital Twin
25%
COVID-19
25%
Supply Chain
23%
Security Threats
23%
Cyber Threats
23%
Anonymity
22%
Idiolect
22%
Machine Learning Models
22%
Cyber-attacks
22%
Law Enforcement
21%
Cryptocurrency
21%
Human Behavior
19%
Distributed Ledger Technology
18%
Anomaly Detection
18%
Machine Learning Algorithms
18%
Supply Chain Management
17%
Detection Method
17%
Disability
17%
Internet of Healthcare Things (IoHT)
17%
Home Network
17%
Connected Vehicles
17%
Support Vector Machine
17%
Electronic Regulation
17%
Smart Ledger
17%
Ledger Technology
17%
Cyber
17%
Password Space
17%
Digital Forensic Investigation
17%
Blockchain-based
17%
Grid-connected
17%
Higher Education Institutions
17%
Cyber-physical Systems
17%
System Design
17%
Artificial Intelligence Machine Learning
17%
Threat Modeling
17%
Law
17%
Security Issues
16%
Security Privacy
16%
Key Performance Indicators
16%
Threat Detection
15%
Cyberphysical Systems
15%
Chain of Custody
15%
Social Media Use
15%
Remote Work
15%
Data Protection
15%
Forensic Investigation
15%
Browser
15%
Smart Contract
15%
Internet Use
15%
Forensic Linguistics
15%
Nonreciprocity
14%
Digital Evidence
14%
World Wide Web
14%
Multi-author
14%
Role of Emotions
14%
Detection Scheme
14%
Discourse Type
14%
Cybersecurity Risk
14%
Resilience
13%
Key Generation
13%
Attack Detection
13%
Oman
12%
Social Networking
12%
Distributed Ledger
12%
Management Knowledge
12%
Royal
12%
Digital Communication
12%
Attack Surface
12%
Circular Economy
12%
Europe
12%
Authentication Mechanism
12%
Forensic Linguist
12%
Cyber Resilience
12%
Natural World
12%
Computer Science
Internet-Of-Things
100%
Learning System
72%
Machine Learning
72%
Supply Chain
69%
Artificial Intelligence
63%
Blockchain
63%
Cybersecurity
59%
Smart City
56%
Case Study
53%
Cyberstalking
43%
Incident Response
37%
Industrial Control System
34%
Key Generation
34%
Digital Forensics
29%
Decision-Making
27%
Data Sharing
27%
Anonymity
25%
Password
25%
vehicular ad-hoc network
25%
Digital Forensics Investigation
25%
Digital Twin
25%
Anomaly Detection
24%
Data Processing
23%
Cyber Attack
21%
Support Vector Machine
21%
Data Protection
20%
Privacy Preserving
18%
Threat Detection
18%
Performance Metric
18%
Internet of Medical Things
17%
Malware
17%
Education Institution
17%
Attackers
17%
Threat Intelligence
17%
Cyber Adversary
17%
Cyber Physical Systems
17%
Modeling Threat
17%
Convolutional Neural Network
17%
Decision Tree
17%
Machine Learning Algorithm
16%
Cyber Resilience
15%
Forensics Investigation
15%
Security Challenge
15%
e-Mail
14%
Indexing Technique
14%
Service Provider
14%
Attack Surface
14%
Chain of Custody
14%
Digital Evidence
13%
Theoretical Framework
13%
Security and Privacy
13%
Random Decision Forest
13%
Entry Point
12%
Cyber Threat Intelligence
12%
Response Methodology
12%
Generation Rate
12%
Enhance Security
12%
Daily Activity
12%
Distributed Ledger
11%
Authentication
11%
Big Data
11%
Monitoring Solution
11%
Research Question
11%
Learning Experiences
11%
Physical Layer Security
11%
Technology System
11%
Anomalous Behavior
10%
Smart Contract
10%
Cybercrime
10%
Pattern Recognition
10%
Layered Security
10%
Cryptocurrency
10%
Text Classification
10%
Potential Threat
10%
mobile service
10%
Detection Accuracy
10%
Qualitative Data
10%
Digital Twin Technology
10%
Comparative Analysis
10%
Individual Level
9%
Behavioral Intention
9%
Neural Network
9%
Use Case
9%
Data Confidentiality
8%
Gaining Access
8%
Academic Practice
8%
Distinctiveness
8%
Consistency Method
8%
Data Ownership
8%
Office Environment
8%
Anonymization
8%
Key Management
8%
Working Practice
8%
Signature Verification
8%
Browsing Habit
8%
Cloud Infrastructure
8%
Blended Learning
8%
Facebook
8%
Business Application
8%
Regulatory Challenge
8%