Sort by
Keyphrases
Android
46%
Android Devices
15%
Android Malware Detection
20%
Anti-malware
20%
Attack Graph
21%
Attacker
29%
Blockchain
18%
Challenging Tasks
17%
Code Generation
20%
Cyber Attack Prediction
20%
Cyber-attacks
32%
Data Controller
15%
Data Protection
15%
Deep Learning
24%
Electronic Government
20%
General Data Protection Regulation
42%
H2020
15%
Healthcare
15%
Healthcare Domain
21%
Machine Learning
20%
Malware
30%
Malware Detection
37%
Management Services
20%
Metamodel
20%
Modeling Language
42%
Neural Network
30%
Permission-based
20%
Privacy Concerns
46%
Privacy Level Agreement
23%
Privacy Management
27%
Privacy Protection
15%
Privacy Requirements
47%
Privacy Security
22%
Privacy Technology
20%
Privacy-by-design
35%
Product Recommendation
20%
Public Administration
37%
Recommender Systems
15%
Regulation Compliance
43%
Requirements Engineering
15%
Scope Management
20%
Secure Tropos
32%
Security Analysis
20%
Security Privacy
23%
Security Requirements
35%
Technology Acceptance
20%
Trust Relationship
41%
Trustworthiness
30%
Trustworthy Information Systems
30%
Visual Privacy
19%
Computer Science
Android
44%
Android Malware
21%
Attackers
19%
Back End
10%
Blockchain
22%
Case Study
40%
ChatGPT
10%
Code Generation
20%
Communication Goal
10%
Compliance Regulation
10%
Conceptual Model
10%
Convolutional Neural Network
10%
Critical Information
10%
Cyber Attack
32%
Data Controller
14%
Data Management
10%
Data Protection
11%
Deep Learning Method
30%
Development Process
20%
e-government
20%
General Data Protection Regulation
55%
Industrial Case
10%
Information Systems
100%
Large Language Model
12%
Laws and Regulation
14%
Learning System
22%
Machine Learning
22%
Malware
40%
Malware Detection
50%
modeling language
42%
Neural Network
20%
Personal Information
10%
Privacy Concern
15%
Privacy Policies
15%
Privacy Protection
15%
Privacy Requirement
43%
Recommender Systems
13%
Requirement Engineering
27%
Response Modeling
10%
Risk Management
18%
Security and Privacy
30%
Security Incident Response
10%
Security Requirements
41%
Service Management
20%
Software Systems
15%
Supply Chain
16%
Tropos Methodology
16%
Trust Relationship
48%
User Communication
10%
User Perspective
10%