Keyphrases
Alarm Filtering
11%
Attacker
12%
Behavioral Authentication
14%
Blockchain
33%
Blockchain Technology
14%
Blockchain-based
44%
Challenge-based
45%
Challenge-based Trust Mechanism
16%
Character Frequency
15%
Collaborative Intrusion Detection
57%
Collaborative Intrusion Detection Networks
72%
Collaborative Intrusion Detection System
21%
Copyright
86%
Email Classification
15%
Exclusive Signature Matching
19%
False Alarm
13%
False Alarm Detection
13%
Federated Learning
12%
Frequency-based Approach
15%
Graphical Password
19%
Graphical Password Scheme
10%
Insider Attack
59%
Internet of Things
36%
Internet of Things Networks
14%
Intrusion Detection
18%
Intrusion Detection System
65%
Intrusion Sensitivity
21%
Malicious Node
37%
Matching Mechanism
11%
Medical Body Area Network
18%
Network Environment
19%
Network Intrusion Detection
12%
Network Intrusion Detection System
34%
Packet Filter
11%
Password Security
12%
Promising Solutions
19%
Real Network Environment
11%
Signature Matching
19%
Signature-based
13%
Smart City
12%
Smartphone
46%
Software-defined Networking
21%
Springer Nature
14%
Switzerland
14%
System Node
16%
Trust Management
18%
Trust-based
19%
Trustworthiness
15%
User Authentication
12%
User Study
17%
Computer Science
Android
21%
Attackers
19%
Authentication
38%
Behavioral Feature
9%
Biggest Challenge
10%
Biometrics
9%
Blockchain
73%
Cloud Computing
8%
Computer Network
8%
Cyber Criminal
8%
Detection Accuracy
8%
Detection Performance
9%
Distributed Network
12%
e-Mail
8%
Experimental Result
51%
Federated Learning
12%
graphical password
19%
Healthcare Industry
9%
Insider Attack
64%
Insider Threat
7%
Internet of Things
51%
Intrusion Detection
100%
Intrusion Detection System
86%
Learning Algorithm
13%
Machine Learning
15%
Mobile Device
19%
Network Architecture
7%
Network Based Intrusion Detection System
12%
Network Environment
44%
network intrusion detection
82%
Network Intrusion Detection System
21%
Network Packet
9%
Password
24%
Personal Data
11%
Privacy Leakage
7%
Privacy Preserving
14%
Rapid Development
10%
Security Challenge
7%
Security Mechanism
7%
Semisupervised Learning
13%
Sensitive Informations
14%
Single Character
9%
Smart City
12%
Software Defined Networking
9%
Software-Defined Networking
14%
Supervised Learning
13%
Trust Management
36%
Unauthorized Access
23%
User Authentication
20%
Wireless Sensor Network
9%