Computer Science
Address Translation
16%
Associativity
12%
Branch Instruction
25%
Cache Hierarchy
12%
Cloud Infrastructure
25%
Compressed Data
16%
Controlled Data
16%
Data at Rest
25%
Data Deduplication
50%
Data in Use
25%
Data Placement
50%
Detection Mechanism
25%
Discovered Vulnerability
25%
Dynamic Analysis
16%
Edge Computing
50%
Execution Environments
100%
Execution Pipeline
12%
False Positive Rate
25%
Incorrect Conclusion
25%
Information Disclosure
14%
Initialized Data
25%
Internal Component
12%
Interpreter
25%
Isolated System
7%
Kernel Address Space
25%
Local Area Network
16%
Local Memory Access
7%
Memcached
14%
Microarchitecture
50%
Mode Emulation
16%
Password Manager
50%
Persistent Memory
50%
Postgresql
16%
prefetching
50%
Principle of Least Privilege
25%
Process Context
16%
Processor Module
8%
Reliability Concern
8%
Replacement Policy
12%
Server Software
7%
Software Vulnerability
25%
Systematic Analysis
100%
Target System
25%
WebAssembly
16%