Keyphrases
Android
54%
Android App
19%
Android Botnet
17%
Android Devices
19%
Android Malware
12%
Android Malware Detection
26%
Anti-malware
17%
Attack Graph
19%
Attacker
26%
Blockchain
15%
Case-based Reasoning
17%
Chat Generative Pre-trained Transformer (ChatGPT)
17%
Code Generation
26%
Collaborative Filtering
63%
Collaborative Filtering Method
20%
Collaborative Recommendation
13%
Convolutional Neural Network
17%
Cyber Attack Prediction
17%
Cyber-attacks
28%
Deep Learning
37%
Deep Learning Methods
20%
Electronic Commerce
17%
Evaluation Metrics
20%
Experiment Reproducibility
17%
Explicit Relationship
17%
Information Overload
14%
Large Language Models
19%
Machine Learning
39%
Malware
38%
Malware Detection
42%
Mobile Botnet Detection
17%
Mobile Recommender Systems
17%
Natural Language Processing
28%
Neural Network
36%
New Dataset
11%
Online Environment
24%
Permission-based
20%
Personalized Recommendation
23%
Privacy Concerns
17%
Product Recommendation
27%
Recommendation Evaluation
13%
Recommendation Method
41%
Recommender Systems
68%
Social Engineering Attacks
17%
System Algorithm
13%
Twitter
17%
Twitter User
13%
User Modeling
17%
User Privacy
13%
Virtual Private Network
17%
Computer Science
Android
60%
Android Malware
27%
Artificial Intelligence
11%
Attackers
17%
Automated Decision
8%
Blockchain
19%
Botnet Detection
17%
Botnets
10%
Case-Based Reasoning
17%
ChatGPT
17%
Code Generation
26%
Collaborative Filtering
62%
collaborative filtering algorithm
29%
collaborative recommendation
17%
Convolutional Neural Network
18%
Crypto Currency
8%
Cyber Attack
28%
Decision-Making
17%
Deep Learning Method
44%
Evaluation Metric
13%
Large Language Model
19%
Learning Approach
17%
Learning System
41%
Machine Learning
41%
Machine Learning Algorithm
10%
Malware
43%
Malware Detection
53%
Matrix Factorization
8%
Mean Absolute Error
8%
Mobile Environment
10%
Natural Language Processing
30%
Neural Network
36%
Online Environment
29%
Privacy Concern
13%
Privacy Preserving
26%
Random Perturbation
8%
Recommendation Algorithm
13%
Recommender Systems
100%
Reproducibility
17%
Risk Management
11%
Service Recommendation
8%
Social Engineering Attack
17%
Social Network
10%
Supply Chain
14%
System Evaluation
8%
User Experience
14%
User Modeling
17%
User Privacy
13%
Virtual Private Network
17%
Vulnerable People
8%