Computer Science
Anonymity
19%
Anonymity Network
10%
Anonymous Credential
59%
Application Requirement
19%
Benign Application
6%
Cache Organization
7%
Client-Side Attack
10%
Code Injection Attack
5%
Code Reuse
5%
Communication Bandwidth
8%
Communication Overhead
11%
Computing Infrastructure
11%
Constant Cache
6%
covert channel
17%
Defense Mechanism
10%
Detection Mechanism
13%
Enabled Security
19%
Enhancing Technology
11%
Equivalence Class
17%
Exploitation Technique
6%
Gigabit Ethernet
29%
Hardware Performance
6%
Hardware Support
5%
Hijacking Attack
5%
Hypervisor
5%
Knowledge Proof
8%
Memory Access
5%
Memory Allocator
6%
Memory Location
6%
Memory Management
13%
Mobile Device
59%
Mobile Platform
100%
Modern Operating System
5%
Multiple Device
19%
Multiprocessor System
11%
Network Condition
10%
Performance Counter
6%
Personal Computer
19%
Personal Detail
10%
Physical Address
5%
Physical Memory
13%
Political Interest
10%
Prefetch
59%
Prefetch Instruction
5%
Privacy Algorithm
19%
Privacy Preservation
19%
Privacy Preserving
19%
Privacy Threat
10%
Restrictive Environment
5%
Routers
10%
Security and Privacy
19%
Security Application
19%
Security Component
19%
Security Model
8%
Software Vulnerability
6%
Systems and Application
29%
Traffic Analysis
10%
Training Phase
10%
Unprivileged User
5%
Usage Statistic
59%
Virtual Address
5%
Virtual Machine
5%
Wireless Sensor Node
29%