Keyphrases
Intrusion Detection System
93%
Latent Semantic Analysis
80%
Indonesia
45%
Network Intrusion Detection System
45%
Source Code Plagiarism Detection
43%
Driving Fatigue Detection
40%
Learning Vector Quantization
40%
Heart Rate Variability Analysis
40%
Plagiarism Detection Tools
40%
Big Data
40%
Snort
40%
Security Standards
33%
Detection System
30%
Detection Framework
30%
Malware
27%
Bidirectional Long Short-term Memory (BiLSTM)
27%
Convolutional Neural Network
27%
Big Data Technology
26%
Systems-based
26%
Cross-language
26%
Term Document Matrix
25%
Plagiarism Detector
25%
Ensemble Learning
25%
Wi-Fi
24%
Plagiarism
23%
World Wide Web
21%
Indonesian
21%
Camera Detection
20%
Intrusion Prevention System
20%
Wireless Network Environment
20%
Sign Recognition
20%
Fair Scheduler
20%
Spy Camera
20%
Hadoop Framework
20%
Capacity Scheduler
20%
Selection Mechanism
20%
Node Selection
20%
Network Entity
20%
Linux Kernel
20%
SHA Algorithm
20%
SHA-1
20%
Security Enhancement
20%
Situational Awareness System
20%
AES Algorithm
20%
Code Protection
20%
Plagiarism Detection
20%
Obfuscation Techniques
20%
Actor Model
20%
ECG Data
20%
Assessment Design
20%
Computer Science
Intrusion Detection System
100%
Plagiarism Detection
64%
Vector Quantization
40%
Blockchain
40%
Feature Extraction
40%
Deep Learning
40%
Internet of Things
40%
Performance Model
40%
Ensemble Learning
30%
Security Standard
30%
Long Short-Term Memory Network
30%
Malware
28%
Document Matrix
26%
Data Processing
24%
Security Systems
23%
Big Data Technology
22%
Hadoop Framework
20%
Hadoop
20%
Organizing Map
20%
Capacity Scheduler
20%
Channel State Information
20%
Intrusion Prevention Systems
20%
Network Intrusion Detection System
20%
Intrusion Detection and Prevention
20%
Validated Accuracy
20%
Linux
20%
OpenFlow
20%
O Authentication
20%
Obfuscation Technique
20%
Anomaly-Based Detection
20%
Big Data Technique
20%
Assessment Design
20%
Support Vector Machine
20%
Public Key Infrastructure
20%
Information Security
20%
e-procurement
20%
Processing Approach
20%
Feature Selection
20%
Wireless Networks
20%
security level
20%
Source Codes
20%
Security Framework
20%
Password
20%
Situational Awareness
20%
Response Option
20%
Intrusion Response System
20%
Consensus Mechanism
20%
Static Program Analysis
20%
Executable File
20%
Internet Security
20%