Engineering & Materials Science
Internet of things
100%
Access control
54%
Authentication
54%
Biometrics
50%
Mobile agents
50%
Planning
44%
Computer hardware
40%
Machine learning
32%
Security of data
31%
Industrial internet of things (IIoT)
30%
Digital forensics
29%
Crime
26%
Autonomous vehicles
26%
Image fusion
25%
Convolutional neural networks
24%
Inspection
24%
Sensor networks
23%
Artificial intelligence
22%
Defects
21%
Industry
20%
Substitution reactions
19%
Astrocytes
18%
Side channel attack
18%
Wireless sensor networks
18%
Polynomials
17%
Powders
17%
Electroluminescence
17%
Field programmable gate arrays (FPGA)
16%
Law enforcement
15%
Computer systems
15%
Support vector machines
14%
Control systems
14%
Pallets
14%
Statistical methods
13%
Lasers
13%
SCADA systems
13%
Text processing
13%
Data acquisition
13%
Photovoltaic cells
13%
Learning algorithms
13%
Clustering algorithms
13%
Data visualization
12%
Health
12%
Wearable technology
12%
Cyber Physical System
12%
Knowledge based systems
12%
Malware
12%
Association rules
11%
Monitoring
11%
Solar cells
11%
Fuzzy sets
11%
Fuzzy inference
11%
Genomics
11%
Anomaly detection
11%
DNA
11%
Computer networks
11%
Scanning
11%
Intrusion detection
11%
Computer vision
11%
Hardware security
11%
Partial differential equations
10%
Cloud computing
10%
Scalability
10%
Motion planning
10%
Expert systems
10%
Elasticity
10%
Information management
10%
Semantics
9%
Eye tracking
9%
Compliance
9%
Fuzzy logic
9%
Poles
9%
Creep
9%
Data mining
9%
Neurons
8%
Tuning
8%
Costs
8%
Neural networks
8%
Boundary conditions
8%
Taxonomies
8%
Drug Development
7%
Labeling
7%
Sensors
7%
Application programs
6%
Virology
6%
Sensor nodes
6%
Personnel
6%
Throughput
6%
Network protocols
6%
Blockchain
6%
Global warming
6%
Secure communication
6%
Linear equations
5%
Controllers
5%
Energy utilization
5%
Bandwidth
5%
Electric fuses
5%
Data privacy
5%
Electric network analysis
5%
Polymerase chain reaction
5%
Mathematics
Internet of Things
51%
Mobile Agent
34%
Electroluminescence
23%
Chebyshev Polynomials
22%
Metrology
21%
Defect Detection
20%
Laurent Series
19%
Information Management
19%
Chebyshev
18%
Solar Cells
18%
Computer Security
18%
Energy Efficient
17%
Access Control
17%
Security Model
17%
Security Analysis
17%
Anomaly Detection
17%
Wireless Sensor Networks
16%
Empirical Analysis
15%
Transactions
15%
Intelligence
14%
Tangles
13%
Pseudospectral Method
13%
Spline Approximation
13%
Multilayer
13%
Biometrics
13%
Hardware
13%
Computer Vision
13%
Learning Algorithm
12%
Inspection
12%
Machine Learning
12%
Energy Consumption
11%
Health
11%
Planning
11%
Density Function
10%
Natural Language
10%
Text
10%
Elasticity
9%
Software
9%
Knot
9%
Control System
9%
Authentication
9%
Knowledge
9%
Sensor
9%
Eigenvalue Problem
9%
Authorization
9%
Cloud Computing
9%
Semantics
9%
Similarity
9%
Global Warming
9%
Review
9%
Coefficient
9%
Demonstrate
8%
Field Programmable Gate Array
8%
Secure Communication
8%
Architecture
8%
Network Architecture
8%
Cell
8%
Approximation
8%
Sensor Networks
7%
Silicon
7%
Latency
7%
Test Set
7%
Outlier
7%
Throughput
7%
Estimator
6%
Least Squares
6%
Term
6%
Safety
6%
Manufacturing
6%
Linear Elasticity
6%
Image Processing
6%
Spline
6%
Business
5%
Mobile Technology
5%
Prior Knowledge
5%
Agent Technology
5%
Scalability
5%
Demand
5%
Trends
5%
Safety-critical Systems
5%
Neural Networks
5%
Function Minimization
5%
Model
5%
Standards
5%
Placement
5%
Estimate
5%
Nonlinear Least Squares Problem
5%
Chebyshev Series
5%
Scenarios
5%
Business & Economics
Connected Vehicles
40%
Autonomous Vehicles
34%
Named Entity Recognition
20%
Information Extraction
16%
Data Visualization
15%
Process Model
15%
Thematic Analysis
14%
Attack
13%
Cybersecurity
13%
Controller
12%
Law Enforcement
12%
Paradigm
11%
Visualization
11%
Mitigation
11%
Hardware
10%
Manufacturing
10%
Privacy
9%
News
9%
Threat
8%
Manufacturing Sector
7%
Vulnerability
6%
Transport Policy
6%
Web Mining
5%
Camouflage
5%
Starvation
5%
Decision Heuristics
5%
Transport Planning
5%
Internet of Things
5%