Keyphrases
Alarm Filtering
11%
Attacker
13%
Behavioral Authentication
15%
Blockchain
34%
Blockchain Technology
14%
Blockchain-based
45%
Challenge-based
46%
Challenge-based Trust Mechanism
16%
Character Frequency
15%
Collaborative Intrusion Detection
59%
Collaborative Intrusion Detection Networks
74%
Collaborative Intrusion Detection System
22%
Copyright
89%
Email Classification
15%
Exclusive Signature Matching
20%
False Alarm
13%
False Alarm Detection
14%
Federated Learning
13%
Frequency-based Approach
15%
Graphical Password
19%
Graphical Password Scheme
11%
Insider Attack
61%
Internet of Things
37%
Internet of Things Networks
14%
Intrusion Detection
15%
Intrusion Detection System
67%
Intrusion Sensitivity
22%
Malicious Node
38%
Matching Mechanism
11%
Medical Body Area Network
19%
Network Environment
20%
Network Intrusion Detection
13%
Network Intrusion Detection System
35%
Packet Filter
12%
Password Security
13%
Promising Solutions
19%
Real Network Environment
12%
Signature Matching
20%
Signature-based
13%
Smart City
12%
Smartphone
47%
Software-defined Networking
22%
Springer Nature
14%
Switzerland
14%
System Node
16%
Trust Management
16%
Trust-based
20%
Trustworthiness
15%
User Authentication
12%
User Study
18%
Computer Science
Android
22%
Attackers
20%
Authentication
40%
Behavioral Feature
9%
Biggest Challenge
10%
Biometrics
10%
Blockchain
72%
Cloud Computing
9%
Computer Network
8%
Detection Accuracy
8%
Detection Performance
10%
Distributed Network
12%
e-Mail
9%
Experimental Result
53%
Federated Learning
15%
graphical password
20%
Healthcare Industry
9%
Insider Attack
66%
Insider Threat
8%
Internet of Things
52%
Intrusion Detection
100%
Intrusion Detection System
88%
Learning Algorithm
13%
Machine Learning
15%
Mobile Device
19%
Network Architecture
7%
Network Based Intrusion Detection System
12%
Network Environment
45%
Network Intrusion
7%
network intrusion detection
85%
Network Intrusion Detection System
21%
Network Packet
9%
Password
25%
Personal Data
11%
Privacy Preserving
14%
Rapid Development
10%
Security Challenge
7%
Security Mechanism
7%
Semisupervised Learning
14%
Sensitive Informations
14%
Single Character
9%
Smart City
12%
Software Defined Networking
9%
Software-Defined Networking
15%
Spoofing Attack
6%
Supervised Learning
13%
Trust Management
34%
Unauthorized Access
23%
User Authentication
20%
Wireless Sensor Network
10%