Mathematics
Fuzzy Rules
100%
Honeypot
78%
Attack
57%
Interpolate
53%
Firewall
50%
Rule Base
46%
Fingerprinting
34%
Hashing
34%
Dendritic Cells
28%
Denial of Service
28%
Malware
27%
Genetic Algorithm
23%
Intrusion Detection
20%
Intrusion Detection System
20%
Computational Intelligence
16%
Swarm
15%
Traffic
14%
Fuzzy Reasoning
12%
Clustering
12%
Software Defined Radio
11%
Actors
11%
Network Security
10%
Network Intrusion Detection
10%
Infrastructure
10%
Text Categorization
9%
Fuzzy Inference System
9%
Text Classification
9%
Security Analysis
9%
Data Security
9%
Fuzzy C-means Clustering
8%
Performance Optimization
8%
Fuzzy Inference
8%
Interaction
8%
Dependability
8%
Demonstrate
7%
Particle Swarm Optimization
7%
Immunization
7%
Rule-based Systems
7%
Enhancement
7%
Mahalanobis Distance
7%
Feature Selection
7%
Fitness Function
6%
Observation
6%
Artificial Neural Network
6%
Fuzzy Logic
6%
Choquet Integral
6%
Activation Function
6%
Distance Measure
6%
Principal Component Analysis
6%
Comparative Study
5%
Engineering & Materials Science
Fuzzy rules
85%
Malware
72%
Interpolation
62%
Intrusion detection
35%
Blockchain
32%
Dendritic Cells
31%
Internet of things
22%
Denial-of-service attack
22%
Fuzzy inference
22%
Software engineering
19%
Artificial intelligence
18%
Network security
16%
Genetic algorithms
15%
Big data
14%
Data privacy
14%
Crowdsourcing
13%
Principal component analysis
13%
Network protocols
12%
Industry
12%
Machine learning
12%
Education
12%
Teaching
12%
Containers
11%
Availability
11%
Virtualization
11%
Security of data
11%
Students
10%
Immune system
10%
System of systems
9%
Anomaly detection
9%
Windows operating system
9%
Information services
8%
Managers
8%
Disasters
8%
Immunization
7%
Static analysis
7%
Intelligent systems
7%
Groupware
7%
HTTP
7%
Classifiers
7%
Project management
7%
Scalability
7%
Gamification
7%
Fault tolerance
6%
Outsourcing
6%
Fuzzy logic
6%
Feature extraction
6%
Knowledge based systems
6%
Personnel
6%
Cryptography
6%
Business & Economics
Identity Management
22%
Computational Intelligence
14%
Privacy Preserving
14%
Attack
12%
Dendritic Cells
11%
Risk Analysis
8%
Management System
8%
Genetic Algorithm
7%
Security Analysis
7%
Diamond Model
7%
Authentication
6%
Dependability
6%
Particle Swarm Optimization
6%
Open Source
6%
Mitigation
6%
Web Services
5%
Node
5%
Electronic Government
5%
Markups
5%
Consortium
5%
Comparative Study
5%
Anomaly Detection
5%
Performance
5%
Big Data
5%