Computer Science
Genetic Algorithm
100%
Blockchain
98%
Case Study
85%
Internet-Of-Things
84%
Artificial Intelligence
70%
mobile ad-hoc network
68%
Intrusion Detection
67%
Scheduling Problem
54%
Association Rules
52%
Feature Selection
48%
Feature Extraction
48%
Smart Contract
48%
Data Stream
46%
Supply Chain
41%
Wireless Sensor Network
40%
Experimental Result
39%
multi agent
37%
Electronic Banking
37%
Intrusion Detection System
36%
Data Mining
34%
Decision-Making
34%
Fuzzy Mathematics
33%
Heuristic Search
32%
Phishing Website
31%
Large Language Model
29%
Neural Network
29%
Machine Learning Technique
28%
Ethereum
28%
Machine Learning
28%
Reputation System
27%
Greedy Heuristic
27%
Associative Classification
27%
classification approach
27%
Cognitive Radio
27%
Fog Computing
27%
Extended Reality
27%
Traffic Control
27%
Stochastic Optimization
27%
Service Model
27%
ad-hoc network
26%
Phishing Detection
26%
Control Action
26%
Anonymization
25%
Detection Method
25%
Routing Protocol
24%
Business Environment
24%
Detection Rate
24%
Healthcare Service
24%
Optimization Algorithm
24%
Received Signal Strength
23%
Keyphrases
Genetic Algorithm
94%
Mobile Ad Hoc Network (MANET)
86%
Blockchain
65%
Intrusion Detection System
58%
Trust Model
57%
Blockchain-based
57%
Smart Contract
51%
Intrusion Detection
49%
Wireless Sensor Networks
47%
Electronic Banking
46%
Antenna
40%
Scheduling Problem
37%
Computational Fluid Dynamics
34%
Detection System
33%
Trustworthiness
33%
Internet of Things
33%
Relief Logistics
33%
Secure Authentication
32%
Supply Chain
32%
Phishing Websites
32%
Machine Learning Techniques
31%
Business Game
31%
Staff Scheduling
31%
Anonymized
30%
Performance Improvement
30%
Logistics Scheduling
29%
Control Actions
29%
Classification Approach
27%
Associative Classification
27%
Fog Computing
27%
Pelton Turbine Bucket
27%
Software-defined Networking
27%
Small to Medium Size Enterprises
27%
Fuzzy Logic
27%
CPW-fed
26%
Ad Hoc Networks
26%
Artificial Intelligence
26%
Anonymization
26%
Prediction Accuracy
26%
Heuristic Search
24%
Snort
24%
Route Planning
24%
Feature Selection
23%
Phishing Detection
23%
Multiple Supports
23%
Data Mining Techniques
23%
Popular
22%
Road Traffic Control
22%
Multi-agent Systems
22%
Fraud
21%