Computer Science
Log Data
100%
Anomaly Detection
85%
Deep Learning Method
42%
Anomaly-Based Detection
37%
Intrusion Detection System
26%
Open Source Intelligence
26%
Intelligence Analysis
26%
Intrusion Detection
20%
Data Type
17%
Situational Awareness
16%
Learning Approach
15%
Natural Language Processing
15%
Use Case
14%
Open Source
13%
Detecting Anomaly
13%
Open Research
13%
Statistical Property
13%
Testbed
13%
Attack Analysis
13%
Artificial Intelligence
13%
Access Control System
13%
Physical Access Control
13%
clustering approach
13%
Train Employee
13%
Security Posture
13%
Detection Algorithm
13%
Natural Language Generation
13%
Machine Learning
13%
Learning System
13%
System Monitor
11%
Network Traffic
11%
Open Source Tool
11%
Event-Type
10%
Long Short-Term Memory Network
10%
Memory Model
10%
Cyber Attack
10%
Parsing
10%
Neural Network
8%
Attackers
8%
Reproducibility
8%
User Behavior
8%
Machine Learning Technique
7%
Federated Learning
7%
False Positive
7%
System Security
6%
Network Packet
6%
Modular Architecture
6%
Cyber Physical Systems
6%
System Behavior
6%
Detect Anomaly
6%