Computer Science
Authentication
100%
Digital Forensics
80%
Mobile Device
67%
Information Security
58%
User Authentication
52%
Mobile Application
44%
Biometrics
44%
Biometric Authentication
41%
Personal Information
39%
Multimedia
35%
Big Data
35%
Explainable Artificial Intelligence
35%
Security Assurance
35%
Information Assurance
35%
Cybersecurity
35%
Data Protection
32%
Biometric Data
32%
Artificial Intelligence
31%
Digital Investigation
29%
Data Classification
27%
Experimental Result
27%
Privacy Requirement
24%
Practical Implication
23%
Password
22%
Digital Evidence
22%
Network Traffic
22%
Data Confidentiality
22%
Digital Object
21%
Data Privacy
21%
Interoperability
20%
Cloud Computing
19%
Activity Recognition
17%
Mobile Device
17%
Biometric Feature
17%
Feature Vector
17%
Live Migration
17%
Data Center
17%
Distributed Approach
17%
Energy Optimization
17%
Conceptual Model
17%
Organizational Information
17%
Federated Authentication
17%
Personal Knowledge
17%
Single Application
17%
Data Characterization
17%
Analytic Hierarchy Process
17%
Assessment Model
17%
Scoring System
17%
Application Data
17%
Security Package
17%
Engineering
End-Users
35%
System Technology
35%
System Development
35%
Generative Model
29%
Industrial Internet
17%
Deep Learning
17%
Recovered Image
17%
Internet of Things
17%
System Response
17%
Risk Level
17%
Control System
17%
Limitations
17%
Risk Index
17%
Risk Matrix
17%
Big Data
17%
Rule-Based System
17%
Medium Plane
17%
Predictive Maintenance
17%
Data User
17%
Multimedia Content
17%
Mobile Phone
17%
Search Space
17%
Quality Index
17%
Gait Recognition
17%
Feature Extraction
17%
Artificial Intelligence
17%
Experimental Result
11%
Complex Approach
8%
Intermediate Node
8%
Public Safety
8%
Plane Element
8%
Computation Time
8%
Good Result
8%
Proof-of-Concept
5%
Internals
5%
Data Handler
5%
Seniors
5%
Parameter Space
5%
Image Source
5%
Nonconvergence
5%
Grid Search
5%
Optimization Method
5%
Captured Signal
5%
Body Sensor
5%