Keyphrases
Automatic Model
16%
Business Model
18%
Cloud Computing
43%
Cloud Resources
16%
Computing Infrastructure
20%
Connected World
16%
Cybersecurity
33%
Deception
50%
Digital Cell
16%
Digital Forensic Investigation
33%
Digital Forensics
100%
Distributed Systems
25%
E-inclusion
16%
Home Appliances
16%
Identity Theft
33%
Inclusion Strategies
16%
Independent Existence
16%
Indian Institute of Technology
16%
Information Environment
52%
Information Security
41%
Information Superiority
33%
Informational Environment
25%
Internet of Things
52%
Knowledge Base
26%
Knowledge Grid
16%
Learning Data Analytics
16%
Maneuver Warfare
16%
Modern Information
31%
National Institute of Standards
16%
Network Anomaly
16%
Network Threats
16%
Personal Information
18%
Proactive Solution
16%
Processing Power
18%
Risk Assessment Methods
31%
Scientific Rigor
16%
Security Aspects
16%
Security Device
30%
Self-division
16%
Semi-automatic
20%
Smart Security
33%
Structural Units
16%
Threat Agent
91%
Threat Assessment
22%
Trust-based Approach
16%
Virtual Machine
33%
Vulnerability
49%
Vulnerability Exploitation
16%
Wireless Network Attacks
16%
World Wide Web
42%
Computer Science
Android Application
16%
Antivirus
16%
Assessment Model
20%
Attackers
18%
Big Data Analytics
16%
Business Models
18%
Cloud Computing
54%
Complex Process
16%
Computer Network Operations
16%
Computing Infrastructure
33%
Cryptographic Asset
16%
Cultural Approach
16%
Defensive System
16%
Digital Forensic Examiner
16%
Digital Forensics
91%
Digital Forensics Investigation
25%
Distributed Systems
25%
Forensic Artifact
16%
Hard Disk
16%
Identity Theft
33%
Incentive Mechanism
16%
Information Environment
54%
Information Security
83%
Information Security Threat
16%
Information System
16%
Internet-Of-Things
80%
Learning System
16%
Machine Learning
16%
Multi Agent Systems
16%
Processing Power
26%
Professional Life
16%
Reactive Routing
16%
Related Product
16%
Security Aspect
16%
Security Attack
16%
Security Concern
16%
Security Device
33%
Security Evaluation
16%
Security Model
20%
Security Policy
41%
Semantic Metadata
16%
Sensitive Informations
16%
Sensor Networks
18%
Structural Unit
16%
Technical Capability
33%
Technical Solution
33%
Threat Assessment
58%
Virtualized Environment
16%
Vulnerability Scanner
16%
Wireless Sensor Network
33%