Computer Science
Abstraction Layer
22%
Advanced Persistent Threat
77%
Adversarial Machine Learning
51%
Botnets
33%
Comparative Analysis
22%
Connected System
22%
Coordinate Transformation
22%
Cyber Attack
26%
Cybersecurity
51%
Decision Criterion
22%
Decision-Making
68%
Demonstration System
22%
Disaster Relief
22%
Domain Knowledge
29%
Expert System
22%
Force Protection
22%
Host Environment
22%
Image Interpretation
22%
Information System
35%
Intrusion Detection System
89%
Knowledge Discovery
22%
Learning System
51%
Machine Learning
51%
Map-Reduce
33%
Maximum Entropy
22%
Modern Technology
22%
Multi Agent Systems
55%
multi sensor
44%
multisensor data fusion
22%
Network Intrusion Detection System
66%
ordered weighted averaging operator
33%
Points of Interest
22%
Potential Threat
22%
Relief Operation
22%
Risk Management
29%
Scene Analysis
22%
Security Operations Centers
29%
Security Purpose
22%
Situation Awareness
71%
Situational Awareness
51%
Technical Issue
22%
Testbed
22%
Testing Environment
22%
Threat Detection
100%
Transfer Learning
22%
Virtual Environments
26%
Visual Analytics
22%
Visualization Technique
26%
World Coordinate
22%
Zombie Army
22%
Engineering
Action Space
22%
Aerial Image
7%
Aerial Photograph
22%
Analog Data
11%
Analysis Problem
11%
Anomaly Detection
11%
Artificial Neural Network
11%
Based Expert System
22%
Classical Method
11%
Constrained Problem
7%
Coordinate Transformation
22%
Cyber Security
22%
Detection Task
22%
Disaster Relief Operation
22%
Domain Knowledge
22%
Feedback Loop
22%
Forward-Looking Infrared
11%
Fuzzy Expert System
22%
Fuzzy Rules
22%
Human Life
7%
Image Analysis
11%
Image Interpretation
22%
Improvised Explosive Device
11%
Knowledge Base
22%
Knowledge Engineer
11%
Knowledge Source
14%
Limiting Factor
22%
Machine Learning Method
22%
Multisensor System
11%
Observability
22%
Optical Sensors
11%
Preprocessor
22%
Real Situation
11%
Reinforcement Learning
22%
Research Project
22%
Road
22%
Road Surface
22%
Sensor System
11%
Situational Awareness
11%
Target Recognition
11%
Term Memory
11%