Computer Science
Wireless Sensor Network
95%
Quantum Cryptography
75%
Experimental Result
71%
Wireless Network
64%
multi agent
64%
Support Vector Machine
49%
IEEE 802.11
39%
Support Vector
38%
Data Description
38%
Internal Attack
38%
Elliptic Curve
38%
Cloud Computing
38%
Wi-Fi
36%
Neural Network
34%
Vector Quantization
30%
Feature Extraction
29%
Evolutionary Algorithm
27%
Key Distribution
27%
Detection Rate
26%
Convolutional Neural Network
26%
Computer Interface
25%
Key Generation
25%
Cryptographic Key
25%
Wireless Communication
24%
Data Communication
24%
Data Mining
24%
Biometrics
21%
Multi Agent System
21%
Research Result
21%
Case Study
21%
spam email
21%
Network Security
20%
Intrusion Detection
20%
Generation System
17%
Data Mining Technique
17%
Authentication
17%
Extreme Learning Machine
16%
Data Type
16%
Agent-Oriented
16%
Pattern Recognition
16%
multi-agent
16%
Feature Selection
16%
Information Technology
16%
IT Infrastructure
15%
noise signal
15%
Artificial Intelligence
15%
Big Data
14%
Security Systems
14%
Scalar Multiplication
14%
Constraint Satisfaction Problem
14%
Keyphrases
Wireless Sensor Networks
100%
Quantum Key Distribution
61%
Wireless Networks
57%
Elliptic Curve Cryptography
46%
Internal Attacks
43%
Wireless Security
43%
Quantum Cryptography
36%
Cloud Computing
35%
Support Vector Machine
35%
Wi-Fi Networks
34%
Electroencephalography
32%
Multi-agent
30%
Data Mining Techniques
28%
Key Distribution
27%
Evolutionary Algorithms
26%
Convolutional Neural Network
25%
Cryptographic Key Generation
25%
Saudi Arabia
25%
Multi-agent Approach
25%
XML Data
25%
Wireless Communication
23%
Fiji
22%
Multi-agent Based
22%
XML
21%
Wi-Fi
21%
Mobile Value-added Services
21%
CPU Utilization
21%
Multi-Sphere Support Vector Data Description
21%
Scalar multiplication
20%
Classification Accuracy
19%
Support Vector Data Description
19%
Micro-enterprises
19%
Intrusion Detection
19%
Multi-agent Systems
18%
Adversary
18%
Calculation Time
18%
Popular
18%
Generation System
17%
Feature Weighting
17%
World Wide Web
17%
Vector Quantization
17%
Secure Communication
17%
IEEE 802.11 Standard
17%
Constraint Handling
17%
XML Documents
17%
EHealth Services
16%
Data Perturbation
16%
File Fragments
16%
Stress Conditions
16%
Negative Selection
16%