Computer Science
Log Data
100%
Anomaly Detection
94%
Deep Learning
44%
Anomaly-Based Detection
37%
Intrusion Detection
34%
Data Type
29%
Use Case
24%
Detecting Anomaly
22%
Access Control System
22%
Physical Access Control
22%
Cyberattack
22%
Open Research
22%
Security Domain
22%
Effective Communication
22%
Technical Skill
22%
Technical Knowledge
22%
Security Education
22%
Design Framework
22%
Statistical Property
22%
Information and Communication Technologies
22%
Intrusion Detection System
22%
Testbed
22%
Open Source Intelligence
22%
Intelligence Analysis
22%
Attack Analysis
22%
Open Source
19%
Machine Learning
18%
System Monitor
18%
Network Traffic
18%
Event-Type
17%
Neural Network
14%
Machine Learning Technique
12%
Cyber Physical Systems
11%
System Security
11%
Open Source Tool
11%
Network Packet
11%
Cyber Attack
11%
Parsing
11%
Modular Architecture
11%
Detect Anomaly
10%
Long Short-Term Memory Network
7%
Memory Model
7%
Log File Analysis
7%
Model Architecture
7%
Arbitrary Number
7%
Event Occurrence
7%
Data Preprocessing
7%
Reproducibility
7%
Detection Performance
7%
Automatic Generation
7%