Engineering & Materials Science
Application programs
19%
Banking
14%
Blockchain
34%
Botnet
17%
Classifiers
7%
Communication
9%
Compliance
68%
Computer aided design
10%
Controllers
7%
Convolutional neural networks
12%
Critical infrastructures
7%
Cryptocurrency
18%
Cyber Physical System
14%
Data privacy
85%
Data storage equipment
7%
Deep learning
35%
Detectors
10%
e-government
16%
Health
12%
Health care
6%
Industry
19%
Information management
24%
Information systems
61%
Internet
10%
Malware
84%
Modeling languages
57%
Multilayer neural networks
5%
Neural networks
25%
Physics
11%
Privacy by design
64%
Public administration
49%
Recommender systems
26%
Recovery
8%
Requirements engineering
47%
Risk management
10%
Security of data
15%
Specifications
5%
Supply chains
12%
Virtual private networks
18%
Mathematics
Actors
9%
Architecture
21%
Banking
16%
Business
12%
Classifier
14%
Compliance
64%
Concepts
13%
Countermeasures
10%
Critical Infrastructure
12%
Design
16%
Development Process
14%
Electronic Government
13%
Evaluation
24%
False Positive
8%
Health
15%
Healthcare
19%
Information Systems
19%
Learning
11%
Malware
66%
Metamodel
18%
Methodology
18%
Metric
8%
Mining
16%
Mobile Phone
11%
Model
8%
Model-based
11%
Modeling
9%
Modeling Language
44%
Multilayer Perceptron
9%
Network Architecture
9%
Neural Networks
24%
Notation
12%
Open Source
8%
Operating Systems
9%
Physics
10%
Privacy
100%
Recovery
8%
Requirements
42%
Requirements Analysis
26%
Requirements Engineering
11%
Resiliency
20%
Resources
8%
Service Management
24%
Software System
9%
Static Analysis
9%
System Development
10%
Target
11%
Technology Acceptance
28%
Trustworthiness
22%
Vision
13%
Business & Economics
Attack
9%
Conceptual Model
5%
Cultural Heritage
14%
Data Management
21%
Data Protection
17%
Developer
10%
Electronic Government
14%
Functionality
15%
Graph
8%
Healthcare
14%
Holistic Approach
13%
Information Systems
41%
Justification
13%
Language Modeling
26%
Management System
10%
Metamodel
16%
Modeling
30%
Privacy
58%
Privacy Policies
6%
Public Administration
35%
Risk Management
9%
Supply Chain Dynamics
17%
System Development
5%
Technology Acceptance
15%
Threat
6%
Trustworthiness
22%
Usefulness
7%
XML Schema
5%