Mathematics
Authentication
100%
Tracking System
71%
CAN Bus
57%
Biometrics
53%
Complex Networks
51%
Traffic Jam
51%
Monitoring
44%
Attack
44%
Neural Networks
41%
Vulnerability
35%
Radio Frequency Identification
26%
Scanner
21%
Fingerprint
21%
Cross-entropy
20%
Graph in graph theory
20%
Sports
19%
Framework
18%
Artificial Intelligence
17%
Computer Vision
17%
Safety
16%
Traffic
16%
Machine Learning
16%
Straight
15%
Confidence
15%
High Accuracy
15%
Trends
14%
Security Analysis
13%
Growing Networks
13%
Model
12%
Data Flow
11%
Cover
10%
Health
9%
Performance
8%
Output
6%
Evaluation
6%
Password
6%
Path
5%
Strategy
5%
Rupture
5%
Government
5%
Imperfections
5%
Engineering & Materials Science
Edge computing
53%
Immune system
53%
Data Analytics
48%
Authentication
47%
Biometrics
43%
Convolutional neural networks
39%
Health
32%
Machine learning
28%
Artificial intelligence
26%
Monitoring
24%
Sports
22%
T-cells
21%
Deep neural networks
21%
Computer vision
18%
Entropy
18%
Biological systems
16%
Malware
15%
Anomaly detection
15%
Marketing
14%
Spamming
13%
Websites
12%
Students
12%
Time delay
12%
Industry
10%
Unsupervised learning
9%
Regain
7%
Wireless networks
5%
Quality of service
5%
Radio frequency identification (RFID)
5%
Energy utilization
5%
Business & Economics
Authentication
71%
Security Issues
57%
Biometrics
56%
Complex Networks
50%
Bus
46%
Graph
41%
Attack
32%
Monitoring
32%
Vulnerability
16%
Vulnerability Assessment
14%
Security Analysis
12%
Data Flow
11%
Evaluation Criteria
9%
Radio Frequency Identification
9%
Node
8%
Scanner
7%
Entry and Exit
6%
Health
5%
Safety
5%