Keyphrases
Security Model
80%
Security Policy Model
76%
Service-oriented Architecture
66%
Information Flow Control
50%
Conflict of Interest
40%
Network Traffic
36%
Security Policy
33%
Classical Ciphers
33%
Formal Equivalence
33%
Class-based
33%
Image Hashing
33%
Feature Learning
33%
Hash Function
33%
Cipher
33%
Enterprise Service Bus
33%
XML Signature
33%
Artificially Intelligent
33%
Agent-based Services
33%
Python Library
33%
Bowtie Analysis
33%
Integrated Validation
33%
Bayesian Network
33%
Computer Networks
33%
Flow-Aware Networks
33%
Generative Process
33%
Signature Generation
33%
Copyright
33%
Signature Validation
33%
Validation Algorithm
33%
Authentication Mechanism
33%
Statistical Model
33%
Semantic Entity
33%
Web Requests
33%
Anomaly Detection
33%
Intrusion Detection
33%
Equivalence Class
33%
Network Data
33%
Learning Approaches
33%
Network Entropy
33%
Abrupt Change
33%
Conformance Checking
33%
Information Flow
33%
One-way Authentication
33%
Authentication Devices
33%
Flow Control
33%
Web Application
33%
Online Learning
33%
One-class Support Vector Machine (OCSVM)
33%
Anomaly Detection System
33%
Authentication Token
33%
Computer Science
Security Policy
100%
Security Model
80%
Computer Network
77%
Anomaly Detection
66%
Service Oriented Architecture
66%
Information Flow Control
50%
Network Traffic
44%
Ciphertext
33%
Representation Learning
33%
Cryptanalysis
33%
Policy Conformance
33%
Enterprise Service Bus
33%
Received Message
33%
Generating Process
33%
Authentication Method
33%
Web-Based Application
33%
Intrusion Detection
33%
Flow Control
33%
Support Vector Machine
33%
Equivalence Class
33%
Authentication Device
33%
Authentication Token
33%
Class Interest
33%
Equivalence Relation
33%
Learning Approach
33%
Web Service
33%
Receiving Process
33%
Statistical Model
33%
Electronic Learning
33%
Authentication Information
19%
Business Sector
16%
Detection Rate
16%
Access Control
16%
Training Data
16%
Internet
16%
Malicious Request
16%
Order Variable
16%
Connection Attempt
16%
False Alarm Rate
16%
Modified Version
16%
Brewer and Nash Model
16%
Security Concern
16%
Social Networking (Online)
16%
Security Objective
16%
Binary Relation
16%
Information Object
16%
Social Network
16%
Transfer Learning
11%
Neural Network
11%
Network Intrusion Detection System
11%