Computer Science
Attack
100%
Access Control Policies
100%
Theoretic Analysis
100%
Robot
100%
Voice over Internet Protocol (VoIP)
100%
side-channel
100%
Information Flow Model
50%
Access Control
50%
Models
50%
Nonrepudiation
50%
Interference
50%
Information Flow
50%
Ethereum
50%
Networks
40%
Attackers
40%
Denial of Service Attack
40%
Authorization Framework
25%
Ensure Confidentiality
25%
Resilient Architecture
25%
Root of Trust
25%
Service
20%
Real World
20%
Autonomous Vehicles
20%
Fundamental Question
20%
Vulnerabilities
20%
Strategic Option
20%
Sensor
20%
Experimental Result
20%
Statistical Feature
20%
Location Information
20%
False Positive Rate
20%
Channels
20%
Social Sciences
Analysis
100%
Vehicles
100%
Service Industries
60%
Urban Areas
40%
Graphs
20%
Connected Vehicle
20%
Vulnerability
20%
Autonomous Vehicles
20%
Remote Sensing
20%
Conflict
20%
Costs
20%
Infrastructure
20%