Engineering & Materials Science
Access control
40%
Agglomeration
11%
Application programming interfaces (API)
22%
Application programs
44%
Bayesian networks
6%
Chromium
5%
Communication
22%
Computer hardware
20%
Computer operating systems
28%
Computer systems
8%
Costs
7%
Data privacy
8%
Data storage equipment
67%
Deep learning
5%
Ecosystems
7%
Electronic mail
7%
Embedded systems
26%
Encapsulation
8%
Firmware
7%
Gateways (computer networks)
16%
Hash functions
7%
High level languages
16%
Hooks
5%
HTTP
7%
Information systems
5%
Internet of things
6%
Linux
53%
Macros
6%
Malware
68%
Mobile computing
10%
Monitoring
26%
National security
7%
Open source software
7%
Process control
6%
Program processors
24%
Resource allocation
5%
Sampling
5%
Scheduling
6%
Security of data
7%
Sensors
6%
Servers
9%
Side channel attack
8%
Transparency
6%
UNIX
5%
Virtual machine
100%
Viruses
10%
Visualization
5%
Web browsers
16%
Websites
32%
Mathematics
Access Control
8%
Accessibility
8%
Anomalous
7%
Attack
33%
Decentralized
8%
Design
8%
Electronic Mail
9%
Embedded Systems
10%
Evaluation
23%
Evidence
6%
Filtering
6%
Information Extraction
11%
Intelligence
9%
Isolation
5%
kernel
20%
Libraries
22%
Linux
19%
Malware
11%
Memory Kernel
27%
Mobile Devices
12%
Monitor
21%
Monitoring
6%
Observer
7%
Operating Systems
26%
Performance
21%
Performance Evaluation
8%
Preservation
6%
Probabilistic Methods
8%
Process Control
7%
Profiling
9%
Resources
18%
Spam
11%
Table
6%
Text
6%
Timing
7%
Tracing
8%
Virtual Machine
61%
Virtual Memory
7%
Vulnerability
13%