Computer Science
Social Network
100%
Attackers
65%
Betweenness Centrality
58%
Malware
40%
Online Social Networks
37%
Deep Learning
35%
Machine Learning
33%
Centrality Measure
32%
Heuristic Search
30%
Network Intrusion Detection System
30%
Web Search Engine
26%
Social Media
25%
Speed-up
24%
Security Awareness
22%
Experimental Result
21%
Malware Detection
21%
Threat Intelligence
21%
Search Algorithm
20%
Information Security
20%
Link Prediction
20%
Betweenness
18%
Network Intelligence
18%
Intelligence Collection
18%
Election Algorithm
18%
Cybersecurity
17%
Network Topology
16%
Logical Attack
16%
Collected Data
15%
Targeted Organization
15%
Online Activity
15%
Pattern Matching
15%
Mobile Application
15%
Network Traffic
15%
Social Network
15%
Machine Learning Technique
14%
Honeypots
14%
Planning Graph
14%
Personal Computer
13%
Distributed Network
13%
Open Source
13%
Complex Networks
13%
Intrusion Detection System
13%
Cyber Attack
13%
Historical Data
12%
Speech Generation
12%
Network Algorithm
12%
Topological Feature
12%
Dynamic Environment
12%
Structural Feature
12%
Search Engine
12%
Keyphrases
Social Networks
81%
Attacker
59%
Betweenness Centrality
36%
Online Social Networks
32%
Malware
32%
Attack Graph
31%
Vulnerability
31%
Heuristic Search
26%
Centrality Measures
25%
Social Robots
24%
Crawling
24%
Security Awareness
24%
Large-scale Networks
23%
Network Intrusion Detection System
23%
Deep Learning
21%
Link Prediction
20%
Web Search Engines
19%
Threat Intelligence
19%
Group Betweenness Centrality
19%
Centrality Algorithm
18%
Forenames
18%
Surnames
18%
Intelligence Collection
18%
Network Intelligence
18%
Orienting Network
18%
Popular
17%
Phonetic Encoding
17%
Online Social Media
16%
Adversary
16%
Interorganizational Networks
15%
COVID-19
15%
Computationally Efficient
15%
Intrusion Detection
15%
Network Topology
15%
Search Algorithm
14%
Hypothesis Generation
14%
Machine Learning Techniques
14%
Malware Detection
14%
Logical Attack Graph
13%
Network Change
13%
Leader Algorithm
13%
Fake News
13%
Attack Strategy
13%
Heuristic Function
13%
Maximization Problem
13%
Planning Graph
13%
Cyber-attacks
13%
Intrusion Detection System
13%
Personal Computer
12%
Distributed Network
12%