Engineering & Materials Science
Data privacy
85%
Malware
84%
Compliance
68%
Privacy by design
64%
Information systems
61%
Modeling languages
57%
Public administration
49%
Requirements engineering
47%
Deep learning
35%
Blockchain
34%
Recommender systems
26%
Neural networks
25%
Information management
24%
Application programs
19%
Industry
19%
Cryptocurrency
18%
Virtual private networks
18%
Botnet
17%
e-government
16%
Security of data
15%
Cyber Physical System
14%
Banking
14%
Supply chains
12%
Health
12%
Convolutional neural networks
12%
Physics
11%
Computer aided design
10%
Risk management
10%
Internet
10%
Detectors
10%
Communication
9%
Recovery
8%
Data storage equipment
7%
Critical infrastructures
7%
Controllers
7%
Classifiers
7%
Health care
6%
Specifications
5%
Multilayer neural networks
5%
Mathematics
Privacy
100%
Malware
66%
Compliance
64%
Modeling Language
44%
Requirements
42%
Technology Acceptance
28%
Requirements Analysis
26%
Evaluation
24%
Service Management
24%
Neural Networks
24%
Trustworthiness
22%
Architecture
21%
Resiliency
20%
Information Systems
19%
Healthcare
19%
Metamodel
18%
Methodology
18%
Banking
16%
Mining
16%
Design
16%
Health
15%
Development Process
14%
Classifier
14%
Concepts
13%
Vision
13%
Electronic Government
13%
Notation
12%
Critical Infrastructure
12%
Business
12%
Requirements Engineering
11%
Learning
11%
Model-based
11%
Mobile Phone
11%
Target
11%
Physics
10%
System Development
10%
Countermeasures
10%
Network Architecture
9%
Modeling
9%
Multilayer Perceptron
9%
Operating Systems
9%
Actors
9%
Software System
9%
Static Analysis
9%
Open Source
8%
Metric
8%
Model
8%
False Positive
8%
Recovery
8%
Resources
8%
Business & Economics
Privacy
58%
Information Systems
41%
Public Administration
35%
Modeling
30%
Language Modeling
26%
Trustworthiness
22%
Data Management
21%
Supply Chain Dynamics
17%
Data Protection
17%
Metamodel
16%
Technology Acceptance
15%
Functionality
15%
Cultural Heritage
14%
Healthcare
14%
Electronic Government
14%
Holistic Approach
13%
Justification
13%
Developer
10%
Management System
10%
Attack
9%
Risk Management
9%
Graph
8%
Usefulness
7%
Privacy Policies
6%
Threat
6%
XML Schema
5%
System Development
5%
Conceptual Model
5%