Computer Science
Online Social Networks
100%
Privacy Preserving
71%
Virtual Community
63%
Data Mining
63%
Web Application
60%
Social Network
60%
Efficient Algorithm
57%
Machine Learning
49%
Access Control Policies
47%
Resource Allocation
45%
Object-Oriented Database
45%
Map-Reduce
45%
Reputation System
44%
Structured Query Language
43%
Association Rules
43%
Malware
43%
Big Data
40%
Structured Data
40%
Reputation Information
40%
System Calls
38%
Security Model
37%
Domain Name System
36%
Distributed Databases
36%
Privacy Concern
32%
Malicious Domain
31%
Expert System
29%
Experimental Result
28%
Decision Trees
27%
Constraint Network
27%
Workflow System
27%
Intrusion Detection System
27%
And-States
27%
Relational Database
27%
Database Systems
27%
Filesystems
27%
Data Integrity
27%
Data Model
25%
Collected Data
25%
Privacy Control
25%
Security and Privacy
25%
Computer Aided Design
24%
Allocation Problem
24%
Query Execution
24%
Role-Based Access Control
23%
Privacy Preservation
23%
Database Management System
23%
Security Policy
23%
Data-Value
22%
Concurrency Control
22%
Subgraph Isomorphism
22%
Keyphrases
Online Social Networks
96%
Virtual Community
60%
Social Networks
59%
Privacy-preserving
53%
Trust-based
53%
Web Application
50%
Database Management Systems
45%
Resource Allocation
45%
Object-oriented Database
45%
Cloud Data Lake
45%
Trust Model
43%
Privacy Concerns
42%
Reputation Model
41%
Graph Structure
40%
Big Data
40%
Information Flow
37%
Information Sharing
37%
Reputation System
37%
MapReduce
36%
Domain Name System
36%
Prolog
36%
Similitude Model
35%
Control Strategy
33%
Resource Allocation Problem
31%
Malicious Domains
31%
Machine Learning
31%
Intrusion Detection System
30%
Role-based Access Control
30%
Association Rules
29%
Data Mining Techniques
29%
Security Model
28%
Malware
28%
Privacy Control
28%
Cross-community
28%
Community Reputation
28%
Partitioned Database
27%
Association Rule Mining
27%
Learning Rule
27%
Graph Pattern
27%
Vertically Partitioned Data
27%
Encrypted Database
27%
Cloud Database
27%
Web Database
27%
Wrapper
27%
Network Applications
27%
State-based
27%
Distributed Databases
27%
System Call
26%
Heuristic Algorithms
25%
Camouflage Algorithm
25%