Computer Science
Log Data
100%
Anomaly Detection
83%
Intrusion Detection
54%
Deep Learning Method
49%
Anomaly-Based Detection
43%
Intrusion Detection System
30%
Open Source Intelligence
30%
Intelligence Analysis
30%
Use Case
21%
Cyber Attack
21%
Data Type
20%
Situational Awareness
19%
Learning Approach
17%
Natural Language Processing
17%
Open Source
15%
Detecting Anomaly
15%
Open Research
15%
Statistical Property
15%
Testbed
15%
Attack Analysis
15%
Artificial Intelligence
15%
Security Analytics
15%
Decision Model
15%
Access Control System
15%
Physical Access Control
15%
Security Solution
15%
clustering approach
15%
Machine Learning
15%
Learning System
15%
System Monitor
12%
Network Traffic
12%
Open Source Tool
12%
Event-Type
12%
Long Short-Term Memory Network
11%
Memory Model
11%
Parsing
11%
Neural Network
10%
Attackers
10%
Data Security
10%
Reproducibility
10%
User Behavior
10%
Decision-Making
10%
Machine Learning Technique
8%
Attack Technique
8%
Federated Learning
8%
False Positive
8%
System Security
7%
Network Packet
7%
Modular Architecture
7%
Cyber Physical Systems
7%