Computer Science
Access Control System
13%
Anomaly Detection
85%
Anomaly-Based Detection
37%
Artificial Intelligence
13%
Attack Analysis
13%
clustering approach
13%
Cyber Attack
49%
Data Type
17%
Decision Model
13%
Decision-Making
12%
Deep Learning Method
45%
Deepfakes
13%
Design Framework
13%
Detecting Anomaly
13%
Detection Algorithm
13%
Effective Communication
13%
Event-Type
10%
Industrial Control System
13%
Information and Communication Technology
17%
Intelligence Analysis
26%
Intrusion Detection
47%
Intrusion Detection System
26%
Learning Approach
15%
Learning System
13%
Lifecycle Model
13%
Log Data
100%
Long Short-Term Memory Network
10%
Machine Learning
13%
Natural Language Generation
13%
Natural Language Processing
15%
Network Traffic
11%
Open Research
13%
Open Source
13%
Open Source Intelligence
26%
Open Source Tool
11%
Physical Access Control
13%
Security Analytics
13%
Security Domain
26%
Security Education
13%
Security Posture
13%
Security Solution
20%
Situational Awareness
30%
Speech Detection
13%
Statistical Property
13%
System Monitor
11%
Technical Knowledge
13%
Technical Skill
13%
Testbed
13%
Train Employee
13%
Use Case
18%