Computer Science
ad-hoc network
26%
Anonymization
25%
Artificial Intelligence
49%
Association Rules
52%
Associative Classification
27%
Authentication
21%
Blockchain
70%
Business Environment
24%
Case Study
81%
classification approach
27%
Cognitive Radio
27%
Control Action
26%
Data Mining
34%
Data Stream
46%
Decision-Making
34%
Detection Method
25%
Detection Rate
24%
Electronic Banking
37%
Ethereum
26%
Experimental Result
39%
Extended Reality
27%
Feature Extraction
48%
Feature Selection
48%
Fog Computing
27%
Fuzzy Mathematics
33%
Genetic Algorithm
100%
Greedy Heuristic
27%
Healthcare Service
24%
Heuristic Search
32%
Internet-Of-Things
84%
Intrusion Detection
67%
Intrusion Detection System
36%
Machine Learning
28%
Machine Learning Technique
28%
mobile ad-hoc network
68%
multi agent
37%
Neural Network
29%
Optimization Algorithm
24%
Phishing Detection
26%
Phishing Website
31%
Received Signal Strength
23%
Reputation System
27%
Routing Protocol
24%
Scheduling Problem
45%
Service Model
27%
Smart Contract
37%
Stochastic Optimization
27%
Supply Chain
23%
Traffic Control
27%
Wireless Sensor Network
40%
Keyphrases
Ad Hoc Networks
26%
Anonymization
26%
Anonymized
30%
Antenna
40%
Artificial Intelligence
21%
Associative Classification
27%
Blockchain
42%
Blockchain-based
38%
Business Game
31%
Classification Approach
27%
Computational Fluid Dynamics
34%
Control Actions
29%
Cooperative Coevolution
21%
CPW-fed
26%
Data Mining Techniques
23%
Detection System
33%
Electronic Banking
46%
Energy Optimization
21%
Feature Selection
23%
Fog Computing
27%
Fuzzy Logic
27%
Genetic Algorithm
94%
Greedy Heuristic
21%
Heuristic Search
24%
Internet of Things
33%
Intrusion Detection
49%
Intrusion Detection System
58%
Logistics Scheduling
29%
Machine Learning Techniques
31%
Mobile Ad Hoc Network (MANET)
86%
Multi-agent Systems
22%
Multiple Supports
23%
Pelton Turbine Bucket
27%
Performance Improvement
30%
Phishing Detection
23%
Phishing Websites
32%
Popular
22%
Prediction Accuracy
26%
Relief Logistics
33%
Road Traffic Control
22%
Route Planning
24%
Scheduling Problem
28%
Secure Authentication
32%
Smart Contract
39%
Snort
24%
Software-defined Networking
27%
Staff Scheduling
31%
Trust Model
57%
Trustworthiness
33%
Wireless Sensor Networks
47%