Keyphrases
Copyright
89%
Collaborative Intrusion Detection Networks
74%
Intrusion Detection System
67%
Insider Attack
61%
Collaborative Intrusion Detection
59%
Smartphone
47%
Challenge-based
46%
Blockchain-based
45%
Malicious Node
38%
Internet of Things
37%
Network Intrusion Detection System
35%
Blockchain
34%
Collaborative Intrusion Detection System
22%
Intrusion Sensitivity
22%
Software-defined Networking
22%
Network Environment
20%
Signature Matching
20%
Trust-based
20%
Exclusive Signature Matching
20%
Graphical Password
19%
Promising Solutions
19%
Medical Body Area Network
19%
User Study
18%
System Node
16%
Challenge-based Trust Mechanism
16%
Trust Management
16%
Trustworthiness
15%
Intrusion Detection
15%
Frequency-based Approach
15%
Character Frequency
15%
Email Classification
15%
Behavioral Authentication
15%
Blockchain Technology
14%
Internet of Things Networks
14%
Switzerland
14%
Springer Nature
14%
False Alarm Detection
14%
False Alarm
13%
Signature-based
13%
Federated Learning
13%
Network Intrusion Detection
13%
Password Security
13%
Attacker
13%
User Authentication
12%
Smart City
12%
Real Network Environment
12%
Packet Filter
12%
Alarm Filtering
11%
Matching Mechanism
11%
Graphical Password Scheme
11%
Computer Science
Intrusion Detection
100%
Intrusion Detection System
88%
network intrusion detection
85%
Blockchain
72%
Insider Attack
66%
Experimental Result
53%
Internet of Things
52%
Network Environment
45%
Authentication
40%
Trust Management
34%
Password
25%
Unauthorized Access
23%
Android
22%
Network Intrusion Detection System
21%
User Authentication
20%
graphical password
20%
Attackers
20%
Mobile Device
19%
Federated Learning
15%
Machine Learning
15%
Software-Defined Networking
15%
Privacy Preserving
14%
Sensitive Informations
14%
Semisupervised Learning
14%
Learning Algorithm
13%
Supervised Learning
13%
Smart City
12%
Distributed Network
12%
Network Based Intrusion Detection System
12%
Personal Data
11%
Biggest Challenge
10%
Rapid Development
10%
Wireless Sensor Network
10%
Biometrics
10%
Detection Performance
10%
Healthcare Industry
9%
Behavioral Feature
9%
Single Character
9%
Software Defined Networking
9%
Network Packet
9%
e-Mail
9%
Cloud Computing
9%
Computer Network
8%
Detection Accuracy
8%
Insider Threat
8%
Security Challenge
7%
Security Mechanism
7%
Network Architecture
7%
Network Intrusion
7%
Spoofing Attack
6%