Keyphrases
Cyber-attacks
81%
Cyber-physical Power System
51%
Power Grid
32%
Advanced Persistent Threat
25%
Cyber-physical
24%
Digital Substation
22%
Operational Technology
22%
Cyber Threats
21%
Indonesia
21%
Cascading Failure
21%
Cybersecurity
17%
Time-series Change
17%
Statistical Shape Analysis
17%
World Wide Web
17%
Anomaly Detection
17%
IEC 61850
16%
Time Series Data
16%
Attack Location
15%
Hybrid Deep Learning
15%
Convolutional Long Short-term Memory (ConvLSTM)
15%
Graph Convolutional Network
15%
Ukraine
14%
Blackout
13%
GDP per Capita
12%
NdnSIM
12%
Zeta Method
12%
Measuring Quality
12%
Power System Protection
12%
Named Data Networking
12%
Low-cost Camera
12%
Forwarding Strategy
12%
Iris Recognition
12%
Camera-based
12%
Attack Graph
12%
Power System Automation
12%
Graph Model
12%
Protection Analysis
12%
Active Attack
12%
Graph Neural Network
12%
Time Series Classification
12%
Power System Topology
12%
Provinces in Indonesia
12%
Impact Analysis
12%
Generative Models
12%
Fertility Education
12%
Android Runtime
12%
Dalvik
12%
Fertility Rate
12%
Neural Network
12%
Graph-based Deep Learning
12%
Computer Science
Cyber Attack
100%
Statistical Shape Analysis
25%
Long Short-Term Memory Network
25%
Advanced Persistent Threat
25%
Deep Learning Method
25%
Cascading Failure
20%
Anomaly Detection
19%
Time Series Data
17%
Communication Network
15%
Deep Learning Model
15%
Intrusion Detection System
15%
Iris Recognition
12%
User Application
12%
Information Networking
12%
Internet Architecture
12%
Voice over Internet Protocol (VoIP)
12%
Multimedia Streaming
12%
Delivery Protocol
12%
Application Data
12%
Generation Internet
12%
Official Website
12%
Graph Neural Network
12%
Internet Protocol
12%
Performance Comparison
12%
Android
12%
Interoperability
12%
Cyber Forensics
12%
Security Operations Centers
12%
Generative Model
12%
Deployment Level
12%
Quality of Service
12%
Context Information
12%
Stability Analysis
12%
Threat Detection
12%
Kill Chain
12%
Detection Method
12%
Systems Stability
12%
Testbed
12%
Convolutional Neural Network
12%
Network Technology
12%
Mobile Device
12%
Information Technology
12%
Anomaly-Based Detection
12%
Impact Analysis
12%
Protection Analysis
12%
Automation System
12%
Network Traffic
10%
Cyber Kill Chain
9%
Situational Awareness
8%
Cyber Physical Systems
8%