Computer Science
Log Data
100%
Anomaly Detection
89%
Deep Learning Method
58%
Intrusion Detection System
36%
Anomaly-Based Detection
33%
Intrusion Detection
27%
Data Type
24%
Situational Awareness
22%
Learning Approach
21%
Open Source
18%
Detecting Anomaly
18%
Cyberattack
18%
Open Research
18%
Security Domain
18%
Effective Communication
18%
Technical Skill
18%
Technical Knowledge
18%
Security Education
18%
Design Framework
18%
Statistical Property
18%
Testbed
18%
Open Source Intelligence
18%
Intelligence Analysis
18%
Attack Analysis
18%
Natural Language Processing
18%
Information and Communication Technology
18%
Artificial Intelligence
18%
Machine Learning
17%
Learning System
17%
Use Case
15%
System Monitor
15%
Network Traffic
15%
Open Source Tool
15%
Event-Type
14%
Long Short-Term Memory Network
13%
Memory Model
13%
Cyber Attack
13%
Parsing
13%
Neural Network
12%
Attackers
12%
Reproducibility
12%
User Behavior
12%
Federated Learning
10%
False Positive
9%
System Security
9%
Network Packet
9%
Modular Architecture
9%
Machine Learning Technique
6%
Log File Analysis
6%
Model Architecture
6%