Computer Science
Advanced Persistent Threat
83%
Adversarial Machine Learning
77%
Aggregation Function
16%
Approximate Algorithm
33%
Attackers
21%
Behavior Analysis
16%
Binary Classification
16%
Botnets
33%
Clustering Algorithm
16%
Collected Data
16%
Comparative Analysis
33%
Computation Cost
33%
Corporate Network
16%
Data Source
22%
Decision Criterion
33%
Decision Process
16%
Decision-Making
25%
Deep Learning Method
19%
Detection Performance
16%
Firewall
21%
Genetic Algorithm
16%
Hashing
16%
Intrusion Detection System
94%
k-Nearest Neighbors Algorithm
66%
Learning System
66%
Machine Learning
66%
Machine Learning Algorithm
22%
Map-Reduce
50%
Modified Version
16%
multi agent
16%
Multi Agent Systems
50%
Network Intrusion Detection System
100%
Network Traffic
16%
ordered weighted averaging
33%
ordered weighted averaging operator
16%
Processing Time
33%
Search Procedure
33%
Signalling System
33%
Situation Awareness
66%
Situational Awareness
33%
spam email
16%
Successful Attack
16%
Systems and Application
33%
Targeted Cyber Attack
16%
Text Clustering
33%
Threat Detection
83%
Training Dataset
16%
Transfer Learning
33%
Typical Example
16%
Visualization Technique
33%