Keyphrases
Internet of Things
61%
Blockchain-based
58%
Intrusion Detection System
51%
Internet of Things Devices
39%
Network Traffic Dataset
35%
Location Privacy
32%
Internet of Things Applications
32%
Edge Cloud Computing
32%
Low Altitude
32%
Fog Computing
31%
Blockchain
28%
Feature Selection Methods
27%
Smart Devices
26%
Vehicular Cloud
24%
Performance Improvement
23%
Secure Communication
23%
Aerial Image
22%
Secure Authentication
20%
Object Detection
19%
Low-altitude UAV
19%
Post-quantum
19%
Data Privacy
18%
Authentication Mechanism
17%
Cryptographic Techniques
16%
Chebyshev Polynomials
16%
Resource Prediction
16%
Machine Learning
16%
Internet of Things Networks
16%
Smart City
16%
Resource Utilization
16%
Comparative Analysis
16%
Ethereum
14%
UAV Data
14%
Performance Evaluation
14%
Smart Contract
13%
Deep Learning Methods
13%
Popular
13%
IoT Networks
13%
Post-quantum Cryptography
13%
Daily Life
12%
Object Classification
12%
Fog-based
12%
Location-based Services
12%
NSL-KDD
12%
World Wide Web
12%
Encryption
12%
Internet of Things Environment
12%
Statistical Features
11%
Dummy Location
11%
Transformer
11%
Computer Science
Internet of Things
100%
Blockchain
77%
Network Traffic
51%
Intrusion Detection System
46%
Vehicular Cloud
32%
Deep Learning
32%
Authentication
32%
Internet of Things Device
32%
Location Privacy
31%
Cloud Computing
28%
Fog Computing
28%
Feature Selection
27%
Object Detection
26%
Performance Evaluation
19%
Smart Device
19%
Secure Communication
19%
Data Privacy
19%
Authentication Mechanism
17%
Ethereum
17%
Chebyshev Polynomial
16%
Long Short-Term Memory Network
16%
Data Center
16%
Privacy Preservation
16%
Comparative Analysis
16%
Machine Learning
16%
Smart Contract
14%
Classification Models
13%
Intrusion Detection
12%
Location-Based Service
12%
Smart City
11%
Quantum Cryptography
11%
Mobile Network Operator
10%
Resource Utilisation
9%
Memory Model
9%
Classification Performance
9%
Wireless Sensor Network
9%
False Positive Rate
9%
Extreme Learning Machine
9%
Execution Time
8%
Appearance Cue
8%
Switching Function
8%
Hybrid Encryption
8%
Obfuscation
8%
Multilayer Perceptron
8%
Image Classification
8%
Internet Service Provider
8%
Privacy Technique
8%
Authentication Device
8%
Service Architecture
8%
Driven Framework
8%