Keyphrases
Intrusion Detection System
94%
Latent Semantic Analysis
66%
Software-defined Networking
38%
Indonesia
37%
Network Intrusion Detection System
37%
Source Code Plagiarism Detection
36%
Model Performance
35%
Detection System
33%
Driving Fatigue Detection
33%
Learning Vector Quantization
33%
Heart Rate Variability Analysis
33%
Plagiarism Detection Tools
33%
Big Data
33%
Snort
33%
Consensus Algorithm
33%
Internet of Things
33%
Exfiltration
33%
Security Standards
27%
Detection Framework
25%
Blockchain
25%
Support Vector Machine
25%
Malware
23%
Bidirectional Long Short-term Memory (BiLSTM)
23%
Convolutional Neural Network
23%
Big Data Technology
22%
Systems-based
22%
Cross-language
22%
Term Document Matrix
20%
Plagiarism Detector
20%
Ensemble Learning
20%
Time Management
20%
Management Concepts
20%
Wi-Fi
20%
Resampling
20%
Plagiarism
19%
Blockchain Consensus
19%
Proof-of-Work
19%
Reputation-based
19%
Cybersecurity
19%
Artificial Intelligence
18%
World Wide Web
18%
Indonesian
18%
Camera Detection
16%
Intrusion Prevention System
16%
Wireless Network Environment
16%
Sign Recognition
16%
Fair Scheduler
16%
Spy Camera
16%
Hadoop Framework
16%
Capacity Scheduler
16%
Computer Science
Intrusion Detection System
100%
Plagiarism Detection
53%
Performance Model
44%
Software-Defined Network
38%
Feature Extraction
35%
Vector Quantization
33%
Blockchain
33%
Network Intrusion Detection System
33%
Internet-Of-Things
33%
Big Data
33%
Deep Learning Method
33%
Cybersecurity
33%
Security Standard
25%
Bidirectional Long Short-Term Memory Network
25%
Support Vector Machine
25%
Malware
24%
Data Processing
24%
Big Data Technology
23%
Document Matrix
22%
Ensemble Learning
20%
Response Option
20%
Time Management
20%
Security Systems
19%
Hadoop Framework
16%
Hadoop
16%
Organizing Map
16%
Capacity Scheduler
16%
Channel State Information
16%
OpenFlow
16%
Obfuscation Technique
16%
Anomaly-Based Detection
16%
Big Data Technique
16%
Assessment Design
16%
Public Key Infrastructure
16%
Information Security
16%
e-procurement
16%
Processing Approach
16%
security level
16%
Security Framework
16%
Situational Awareness
16%
Intrusion Response System
16%
Consensus Mechanism
16%
Static Program Analysis
16%
Executable File
16%
Internet Security
16%
Wireless Network
16%
Advanced Encryption Standard
16%
Component Analysis
16%
Principal Components
16%
Performance Analysis
16%