Keyphrases
Android
41%
Android App
15%
Android Devices
16%
Anti-malware
20%
Attack Graph
22%
Attacker
30%
Blockchain
18%
Challenging Tasks
17%
Conceptual Model
15%
Cyber Attack Prediction
20%
Cyber-attacks
30%
Data Controller
16%
Data Protection
15%
Deep Learning
24%
Electronic Government
20%
General Data Protection Regulation
43%
H2020
16%
Healthcare
16%
Healthcare Domain
21%
Malware
27%
Malware Detection
31%
Management Services
20%
Metamodel
20%
Modeling Language
43%
Neural Network
30%
Permission-based
20%
Privacy Concerns
47%
Privacy Level Agreement
23%
Privacy Management
28%
Privacy Protection
15%
Privacy Requirements
48%
Privacy Security
22%
Privacy Technology
20%
Privacy-by-design
35%
Product Recommendation
20%
Public Administration
38%
Recommender Systems
15%
Regulation Compliance
44%
Requirements Engineering
15%
Scope Management
20%
Secure Tropos
33%
Security Analysis
20%
Security Privacy
23%
Security Requirements
35%
Software System
15%
Technology Acceptance
20%
Trust Relationship
42%
Trustworthiness
30%
Trustworthy Information Systems
30%
Visual Privacy
19%
Computer Science
Android
69%
Android Malware
22%
Attackers
20%
Back End
10%
Blockchain
23%
Case Study
41%
Communication Goal
10%
Compliance Regulation
10%
Conceptual Model
10%
Convolutional Neural Network
10%
Critical Information
10%
Cyber Attack
32%
Data Controller
15%
Data Management
10%
Data Protection
10%
Deep Learning Method
31%
Development Process
20%
e-government
20%
General Data Protection Regulation
46%
Industrial Case
10%
Information Storage
10%
Information System
100%
Laws and Regulation
14%
Learning Approach
10%
Learning System
12%
Machine Learning
12%
Malware
42%
Malware Detection
51%
modeling language
43%
Neural Network
30%
Personal Data
10%
Personal Information
10%
Privacy Concern
15%
Privacy Policies
15%
Privacy Protection
15%
Privacy Requirement
44%
Recommender Systems
13%
Requirement Engineering
28%
Response Modeling
10%
Risk Management
18%
Security and Privacy
31%
Security Incident Response
10%
Security Requirements
42%
Service Management
20%
Software Systems
15%
Supply Chain
17%
Tropos Methodology
17%
Trust Relationship
49%
User Communication
10%
User Perspective
10%