Computer Science
Confidential Data
100%
Cyber Physical Systems
100%
Driven Software
66%
Certification
66%
Common Criterion
66%
Secure Communication
66%
Communication Protocol
66%
Software Design
66%
Process Architecture
66%
Protection
66%
Security Vulnerability
66%
Untrusted Environment
33%
Encryption
33%
Integrated Circuits
33%
User
33%
Man-in-the-Middle Attack
33%
software product line engineering
33%
Asymmetric Cryptography
33%
Modern Software
33%
Security Mechanism
26%
Software Product Line
22%
Software Product
22%
Generic Architecture
22%
Process Management
22%
Component Based Development
22%
Development Effort
16%
Certification Process
13%
Engineering
Evaluator
13%
Systematic Approach
13%
Product Certification
13%
Configuration Verification
11%