Computer Science
Attack
100%
Models
48%
Malware
35%
Application
33%
User
30%
Encryption
27%
Use Case
26%
Service
23%
Data Sharing
23%
Block Cipher
21%
side-channel
21%
Android
20%
Authentication
19%
Complexity
18%
Signature Scheme
17%
Procedures
17%
Design
17%
Attackers
16%
Classes
15%
State Machine
15%
Transitions
15%
Programs
15%
Formal Specification
15%
e-government
14%
Hardware
14%
Domains
14%
Integrity Protection
14%
Phishing
13%
Control Flow
13%
Hardware Implementation
13%
Formal Verification
13%
Simulation
13%
Ciphertext
13%
Instantiation
12%
Liveness
11%
Normal Operation
11%
Context Switching
11%
Arbitrary Number
11%
Experimental Result
11%
Reactive System
11%
Symbolic Execution
11%
Hardware Design
11%
Authorization
11%
Common Practice
11%
Model Checking
11%
group signature
11%
Android Security
11%
Message Authentication
11%
Business Application
11%
Personal Identification Number
11%
Distributed Algorithm
11%
prefetching
11%
Hardware Accelerator
11%
Fully Homomorphic Encryption
11%
Page Table
11%
Assistant System
11%
Physical Attack
11%
Phish
11%
Radio Frequency Identification
11%
Content Delivery Network
11%
forgery attack
11%
Integrity Verification
11%
Hardening
11%
Domain Name System
11%
Publication Scheme
11%
Policy Language
11%
Expressive Power
11%
Encapsulation
11%
Decryption
11%
Industrial Internet of Things
11%
Finite-State Machine
11%
Attribute-Based Encryption
11%
homomorphic-encryption
11%
Cloud Storage
11%
Public Cloud
11%
Mutual Information
11%
General Framework
11%
Information Leakage
11%
Exist Algorithm
11%
Constrained Device
11%
Policy Enforcement
11%
Attack Analysis
11%
Classical Computer
11%
Large State Space
11%
Security Evaluation
11%
Workflows
11%
Federated Cloud
11%
Control
11%
Credentials
11%
Identity Provider
11%
Access Pattern
11%
Random Function
11%
Standards
11%
Explainable Artificial Intelligence
11%
Testing
11%
Markov Decision Process
11%
Substitution-Permutation Network
11%
Metadata
11%
Artificial Intelligence
11%
Random Permutation
11%