Computer Science
Attackers
69%
Betweenness
20%
Betweenness Centrality
62%
Centrality Measure
34%
Collected Data
16%
Complex Networks
14%
Cyber Attack
14%
Cybersecurity
18%
Deep Learning
38%
Distributed Network
14%
Dynamic Environment
13%
Election Algorithm
19%
Experimental Result
22%
Heuristic Search
32%
Historical Data
13%
Honeypots
15%
Information Security
21%
Intelligence Collection
19%
Intrusion Detection System
14%
Link Prediction
21%
Logical Attack
17%
Machine Learning
36%
Machine Learning Technique
15%
Malware
42%
Malware Detection
22%
Mobile Application
16%
Network Algorithm
13%
Network Intelligence
19%
Network Intrusion Detection System
32%
Network Topology
17%
Network Traffic
16%
Online Activity
16%
Online Social Networks
39%
Open Source
14%
Pattern Matching
16%
Personal Computer
14%
Planning Graph
15%
Search Algorithm
22%
Search Engine
13%
Security Awareness
24%
Social Media
26%
Social Network
100%
Social Network
22%
Speech Generation
13%
Speed-up
26%
Structural Feature
13%
Targeted Organization
16%
Threat Intelligence
22%
Topological Feature
13%
Web Search Engine
28%
Keyphrases
Adversary
17%
Attack Graph
33%
Attack Strategy
14%
Attacker
63%
Betweenness Centrality
39%
Centrality Algorithm
19%
Centrality Measures
27%
Computationally Efficient
16%
COVID-19
16%
Crawling
26%
Cyber-attacks
13%
Deep Learning
22%
Distributed Network
13%
Fake News
14%
Forenames
19%
Group Betweenness Centrality
20%
Heuristic Function
14%
Heuristic Search
28%
Hypothesis Generation
15%
Intelligence Collection
19%
Interorganizational Networks
16%
Intrusion Detection
16%
Intrusion Detection System
13%
Large-scale Networks
25%
Leader Algorithm
14%
Link Prediction
21%
Logical Attack Graph
14%
Machine Learning Techniques
15%
Malware
34%
Malware Detection
15%
Maximization Problem
14%
Network Change
14%
Network Intelligence
19%
Network Intrusion Detection System
24%
Network Topology
15%
Online Social Media
17%
Online Social Networks
34%
Orienting Network
19%
Personal Computer
13%
Phonetic Encoding
18%
Planning Graph
14%
Popular
18%
Search Algorithm
15%
Security Awareness
26%
Social Networks
87%
Social Robots
26%
Surnames
19%
Threat Intelligence
20%
Vulnerability
33%
Web Search Engines
20%