Keyphrases
Blockchain-based
42%
Security Properties
38%
Congestion Detection
33%
Congestion Notification
33%
ProVerif Tool
33%
Concept Base
33%
Level System
33%
Traffic Congestion
33%
Malicious Attacks
33%
Area Detectors
33%
Induction Loop
33%
Smart Driving
33%
Traffic Congestion Detection
33%
Security Protocols
33%
Formal Security Verification
33%
V2I Communication
33%
Vehicle-to-infrastructure
33%
V2X Communication
33%
Road Traffic Congestion
33%
Transport Protocol
33%
Security Measures
33%
Traffic Lights
33%
Design Guidelines
33%
Vehicular Social Networks
33%
Large Set
33%
Intrusion Detection System
33%
Warning Signs
33%
Data Protection System
33%
Wireless Sensor Networks
33%
Biometric Monitoring
33%
Self-driving Cars
33%
Traffic Light System
33%
System Architecture
33%
Travel Time
33%
Fraud Detection
33%
Credit Card Fraud Detection
33%
Shapley Additive Explanations
33%
Privacy Data Protection
22%
Privacy Policy
22%
Inception Network
22%
Malware Sample
22%
Sensor Networks
16%
Secure Wireless Communication
16%
Road Congestion Detection
16%
Accountability Framework
16%
Privacy Properties
16%
Fraud Pattern
16%
Model Interpretability
16%
Credit Card Fraud
16%
Adam Optimizer
16%
Computer Science
Blockchain
100%
System Architectures
83%
Intrusion Detection System
80%
Security Properties
72%
Intrusion Detection and Prevention
40%
Traffic Control System
33%
Transport Protocol
33%
Protection Policy
33%
Design Guideline
33%
Warning Message
33%
Data Handling
33%
Intrusion Prevention Systems
33%
Vehicular Social Network
33%
Biometrics
33%
Case Study
33%
Cybersecurity
33%
Data Protection
33%
Level Architecture
33%
Process Algebra
33%
Enhancing Technology
33%
Privacy Property
33%
Malicious Attack
33%
Traveling Time
33%
Security Measure
33%
Security protocols
33%
Type Communication
33%
Wireless Sensor Network
33%
Shapley Additive Explanation
33%
Fraud Detection
33%
Lateral Movement
27%
Operating System
25%
Attackers
20%
Advanced Persistent Threat
17%
Protocol Verification
16%
Formalization
16%
Communication Protocol
16%
Biometric System
16%
Sensor Networks
16%
Personal Data
16%
Malware Sample
16%
Malicious Activity
12%
Cryptographic Operation
11%
Online Information
11%
Content Analysis
11%
Online Privacy
11%
Common Characteristic
11%
Mobile Malware
8%
Based Malware Detection
8%
Malware Family
8%
Potential Solution
6%