Engineering & Materials Science
Cryptography
69%
Query processing
52%
Outsourcing
48%
Cloud computing
47%
Network protocols
39%
Earth sciences
37%
Smart power grids
28%
Wireless sensor networks
27%
Data Sharing
26%
Information management
26%
Big data
26%
Students
26%
Data mining
25%
Agglomeration
23%
Power control
21%
Servers
20%
Communication
19%
Competitive intelligence
18%
Education
17%
Digital forensics
15%
Edge computing
14%
Costs
14%
Location based services
13%
K-means clustering
13%
Malware
12%
Industry
12%
Association rules
12%
Mathematical transformations
12%
Vector spaces
12%
Learning systems
12%
Deep neural networks
11%
Outages
10%
Data Analytics
10%
Data as a service (DaaS)
10%
Computer simulation
10%
Authentication
10%
Hash functions
9%
Decomposition
8%
Security of data
8%
Sensors
8%
Recovery
7%
Cluster computing
7%
Information analysis
7%
National security
7%
Data privacy
7%
Water
6%
Scalability
6%
Ecosystems
6%
Sensor nodes
6%
Curricula
6%
Mathematics
Privacy Preserving
100%
Privacy
29%
Framework
24%
Attack
24%
Location-based Services
24%
Digital Forensics
24%
Smart Grid
22%
Association Rule Mining
21%
Interactive Simulation
21%
Authenticated Key Exchange
20%
Outsourcing
20%
N-gram
19%
Student Learning
19%
Query Evaluation
19%
Frequent Itemsets
19%
Server
18%
Password
18%
Learning Systems
18%
Query
16%
Confidentiality
16%
Authentication
16%
K-nearest Neighbor
15%
Diffie-Hellman
15%
Homomorphic Encryption
15%
Mining
14%
Social Networks
14%
Hyperelliptic Curves
14%
Education
13%
Recommendations
12%
Data Mining
12%
Shortest path
12%
Teaching
12%
Demonstrate
12%
Demand
11%
Recovery
11%
Web-based System
11%
Neural Networks
11%
Learning
10%
Cloud Computing
9%
Prediction
9%
Engagement
9%
User Interface
9%
Query Processing
8%
Review
8%
Knowledge
8%
Government
7%
System Reliability
7%
Accessibility
7%
Computing
7%
Performance
6%
Business & Economics
Privacy Preserving
49%
Software Metrics
20%
Wireless Sensor Networks
18%
Data Mining
17%
Data Aggregation
17%
Association Rule Mining
17%
Attack
16%
Shortest Path
16%
Data Base
15%
Confidentiality
14%
Neural Networks
14%
Filter
12%
Big Data
11%
Graph
11%
Vulnerability
10%
Association Rules
10%
Outsourcing
9%
Prediction
9%
Sensor
9%
Coefficients
8%
Outsourcing of IS
8%
User Participation
7%
Authentication
7%
Node
7%
Developer
7%
Privacy Concerns
6%
Secure multi-party Computation
6%
Encryption
6%
Social Networks
6%
Hash Function
6%
Privacy
6%
Apriori Algorithm
6%
Guarantee
5%
Government Regulation
5%
Similarity Measure
5%
Privacy Policies
5%
Data Analytics
5%