Keyphrases
Attack Tree
80%
Care Provision
77%
Kronecker
71%
Medical Records
71%
Cyber-attacks
71%
Data Sharing
68%
Stochastic Automata Networks
53%
Virtual Humans
53%
Software Teams
53%
Data Sharing Platform
53%
Blockchain
50%
Data Lake
50%
Relaxation System
48%
Patient-centered
47%
Healthcare System Design
44%
Breathing Relaxation
43%
Distributed Projects
42%
Cyberattack Analysis
42%
Privacy-preserving
41%
Ensemble Clustering
41%
Health Systems
41%
Vulnerability
41%
Medical Data
41%
Human Breathing
40%
Federated Learning
39%
COVID-19 Pandemic
38%
Cybersecurity
36%
Vector Descriptor
35%
Cyber Threat Intelligence
35%
Analytic Hierarchy Process
35%
Coaching
35%
Privacy Notice
35%
Performance Evaluation
35%
Patient-centric Healthcare
35%
Health Platform
35%
Access Rules
35%
Healthcare
31%
Prediction Accuracy
31%
Privacy Concerns
30%
Security Threats
27%
Machine Learning
27%
Autoregressive Integrated Moving Average (ARIMA)
26%
Toolchain
26%
Design Decisions
26%
Resilient
26%
Patient-centric Systems
26%
Analytical Modeling
26%
Performance Index
25%
Performance Analysis
23%
Fuzzy Logic
23%
Access Control
23%
Tensor Algebra
23%
User Interface
23%
Adversarial Attack
23%
Multiple Clustering
23%
Increased Productivity
23%
Efficiency Improvement
23%
Wearable Devices
23%
Personalized Care
23%
Performance Prediction
22%
Authentication Mechanism
22%
Markovian Model
22%
Web-based
21%
Breathing Exercises
21%
Virtual Coach
21%
Smart Buildings
21%
Smart Environments
21%
Teamwork
21%
Obfuscation
20%
World Wide Web
20%
Europe
20%
Levels of Support
20%
Comparative Analysis
20%
Distributed Machine Learning
19%
User Authentication
17%
OpenMP
17%
Processive
17%
Follow-the-Sun
17%
Concept System
17%
Business Relationships
17%
Modeling Perspectives
17%
Flexible Application
17%
Invasion Detection
17%
Global Software Development Teams
17%
Team Expertise
17%
High Performance
17%
Chatbot
17%
Stochastic Performance
17%
Financial Forecasting
17%
Artificial Social Agents
17%
Security Aspects
17%
Improved Detection
17%
Similarity Matching
17%
Human-agent Interaction
17%
Intrusion Detection System
17%
Single User
17%
Network on chip
17%
Parallel Algorithm
17%
Gated Recurrent Unit Model
17%
Artificial Bee Colony
17%
Computer Science
Blockchain
100%
Data Sharing
95%
Software Development
80%
Development Team
71%
Cyberattack
71%
Automaton
65%
Case Study
65%
Privacy Preserving
59%
Cybersecurity
57%
Learning System
56%
Machine Learning
56%
Virtual Humans
53%
Performance Evaluation
53%
Medical Record
47%
General Data Protection Regulation
41%
Artificial Intelligence
39%
Data Privacy
36%
Cyber Threat Intelligence
35%
Federated Learning
35%
Analytic Hierarchy Process
35%
Autonomous System
35%
Software Development Tool
35%
Energy Saving
35%
Global Software Development
35%
Adversarial Machine Learning
35%
Information Retrieval
32%
Healthcare Data
31%
Data Source
29%
Virtual Reality
29%
Personal Data
29%
Decision-Making
27%
Working Team
26%
Security and Privacy
25%
Access Control
23%
Data Retrieval
23%
Healthcare Provider
23%
Performance Analysis
23%
Network Based Intrusion Detection System
23%
Information Security
23%
Wearable Device
23%
Tool Chain
23%
Internet-Of-Things
22%
Continuous Time
22%
Human Interaction
22%
Large State Space
22%
Markov Chain
22%
Smart Environment
21%
Data Partitioning
20%
User Interfaces
20%
Experimental Result
20%
Distributed Machine Learning
19%
Comparative Analysis
19%
Virtual Community
17%
Enterprise Resource Planning
17%
Simulation Model
17%
Enhance Understanding
17%
Networks on Chips
17%
Special Interest
17%
Undesired Behavior
17%
Numerical Analysis
17%
Display Information
17%
Numerical Methods
17%
Development Environment
17%
User Authentication
17%
Chatbot
17%
Functional Requirement
17%
Chat
17%
Intrusion Detection System
17%
Security Aspect
17%
Parallel Algorithms
17%
Personal Information
17%
Data Management
17%
Participatory Design
17%
Process Improvement
17%
Modeling and Simulation
17%
Fuzzy Mathematics
17%
Explainable Artificial Intelligence
17%
Quality of Service
17%
Analytical Model
17%
Architectural Design
17%
Privacy Challenge
17%
Model of Computation
17%
Transition System
17%
Evaluation Metric
17%
Similarity Graph
17%
Simulation Study
17%
Mixed Reality
17%
Structured Model
17%
Stochastic Petri Net
17%
Software Engineering
17%
Solving Algorithm
17%
Sparse Solution
17%
Potential Benefit
17%
Inference Model
17%
Software Project
17%
Wireless Networks
17%
Internet Topology
17%
clustering approach
17%
Business Models
17%
Internet of Medical Things
17%