Mathematics
Activation Function
6%
Actors
11%
Artificial Neural Network
6%
Attack
57%
Choquet Integral
6%
Clustering
12%
Comparative Study
5%
Computational Intelligence
16%
Data Security
9%
Demonstrate
7%
Dendritic Cells
28%
Denial of Service
28%
Dependability
8%
Distance Measure
6%
Enhancement
7%
Feature Selection
7%
Fingerprinting
34%
Firewall
50%
Fitness Function
6%
Fuzzy C-means Clustering
8%
Fuzzy Inference
8%
Fuzzy Inference System
9%
Fuzzy Logic
6%
Fuzzy Reasoning
12%
Fuzzy Rules
100%
Genetic Algorithm
23%
Hashing
34%
Honeypot
78%
Immunization
7%
Infrastructure
10%
Interaction
8%
Interpolate
53%
Intrusion Detection
20%
Intrusion Detection System
20%
Mahalanobis Distance
7%
Malware
27%
Network Intrusion Detection
10%
Network Security
10%
Observation
6%
Particle Swarm Optimization
7%
Performance Optimization
8%
Principal Component Analysis
6%
Rule Base
46%
Rule-based Systems
7%
Security Analysis
9%
Software Defined Radio
11%
Swarm
15%
Text Categorization
9%
Text Classification
9%
Traffic
14%
Engineering & Materials Science
Anomaly detection
9%
Artificial intelligence
18%
Availability
11%
Big data
14%
Blockchain
32%
Classifiers
7%
Containers
11%
Costs
6%
Crowdsourcing
13%
Data privacy
15%
Dendritic Cells
31%
Denial-of-service attack
22%
Disasters
8%
Education
12%
Fault tolerance
6%
Feature extraction
6%
Fuzzy inference
22%
Fuzzy logic
11%
Fuzzy rules
85%
Gamification
7%
Genetic algorithms
15%
Groupware
7%
HTTP
7%
Immune system
10%
Immunization
7%
Industry
12%
Information services
8%
Intelligent systems
7%
Internet of things
22%
Interpolation
62%
Intrusion detection
35%
Knowledge based systems
6%
Machine learning
14%
Malware
72%
Managers
8%
Network protocols
16%
Network security
16%
Outsourcing
6%
Principal component analysis
13%
Project management
7%
Scalability
7%
Security of data
11%
Servers
6%
Software engineering
19%
Static analysis
7%
Students
10%
System of systems
9%
Teaching
12%
Virtualization
11%
Windows operating system
9%
Business & Economics
Anomaly Detection
5%
Attack
12%
Authentication
6%
Big Data
5%
Comparative Study
5%
Computational Intelligence
14%
Consortium
5%
Dendritic Cells
11%
Dependability
6%
Diamond Model
7%
Electronic Government
5%
Genetic Algorithm
7%
Identity Management
22%
Management System
8%
Markups
5%
Mitigation
6%
Node
5%
Open Source
6%
Particle Swarm Optimization
6%
Performance
5%
Privacy Preserving
14%
Risk Analysis
8%
Security Analysis
7%
Web Services
5%