INIS
data
100%
security
69%
detection
63%
algorithms
59%
performance
59%
information
55%
design
45%
levels
44%
indonesia
42%
implementation
40%
applications
40%
accuracy
39%
internet
39%
classification
37%
values
36%
management
33%
devices
30%
signals
30%
environment
28%
intrusion detection systems
28%
machine learning
27%
risks
26%
cryptography
24%
dynamics
23%
simulation
23%
chaos theory
22%
comparative evaluations
21%
vehicles
20%
architecture
20%
speech
19%
tools
19%
neural networks
18%
evaluation
18%
learning
18%
speed
18%
extraction
16%
spectra
15%
hybrids
15%
images
15%
reviews
14%
power
14%
computer codes
13%
prediction
13%
randomness
13%
resources
13%
tcp
12%
datasets
12%
testing
12%
solutions
12%
random number generators
12%
Keyphrases
Indonesia
44%
Intrusion Detection System
28%
Photoplethysmography
22%
Internet of Things
19%
Performance Analysis
14%
Chaotic Permutation
14%
Feature Extraction
13%
Indonesian
11%
Network Systems
11%
Speech Recognition
11%
Emergency Vehicles
11%
Random number Generator
11%
Blood Glucose
11%
Photoplethysmography Signal
11%
Detection Accuracy
10%
Scheduling Algorithm
10%
Information Security Risk Assessment
10%
Hash Function
9%
Malware
9%
Cybersecurity
9%
Image Encryption
9%
Blood Pressure
9%
Network Intrusion Detection System
9%
Active Networks
8%
Performance Evaluation
8%
Machine Learning
8%
Information Security
8%
Advanced Persistent Threat
8%
Hidden Codes
8%
Binary Executables
8%
Discrete-time Chaos
8%
Scalable Video Coding
8%
Smart Environments
8%
Online Speech Recognition
8%
Hybrid Network
8%
Big Data
8%
Feature Selection
8%
Convolutional Neural Network
7%
World Wide Web
7%
Synthetic Aperture Radar
7%
Attack Detection
7%
Long Range Wide Area Network (LoRaWAN)
7%
Feature Classification
7%
Risk Assessment
7%
Detection Algorithm
7%
Data Security
7%
Visually Impaired
6%
Encryption Algorithm
6%
Combined Method
6%
Cipher Image
6%
Computer Science
Feature Extraction
23%
Intrusion Detection System
23%
Machine Learning
21%
Learning System
21%
Internet-Of-Things
19%
Case Study
17%
Information Security Risk
16%
Convolutional Neural Network
15%
Hash Function
14%
Speech Recognition
14%
Malware
12%
Wide Area Network
12%
Feature Selection
11%
Data Center
11%
Performance Analysis
11%
Emergency Vehicle
11%
Scheduling Algorithm
11%
Information Security
11%
Security Risk Assessment
10%
Cybersecurity
9%
Active Network
9%
Situational Awareness
9%
Information Technology
8%
Detection Accuracy
8%
Smart Environment
8%
image encryption
8%
Blood Glucose Level
8%
Advanced Persistent Threat
8%
Big Data
8%
Security Systems
8%
Deep Learning Method
7%
discrete-time
7%
Early Detection
7%
Random Number Generator
7%
Data Security
7%
Traffic Signal
7%
Performance Evaluation
7%
Video Streaming
7%
Malicious Code
7%
Traffic Analysis
7%
5G Mobile Communication
7%
Data Processing
6%
Authentication
6%
Detection Algorithm
6%
Systems Performance
6%
Ensemble Learning
6%
Cryptographic Hash
6%
Testbed
6%
Voice Communication
6%
Information Systems
6%