Keyphrases
Data Size Reduction
66%
Intrusion Detection
66%
Frequent Patterns
66%
Security Enhancement
66%
Sequential Database
66%
Streaming Sensor Data
66%
Main Server
66%
Detection Method
66%
Intrusion Prevention
66%
Streaming Data
66%
Ant-based
66%
Adaptive Pre-processing
66%
Virtual Honeypot
66%
Service Detection
66%
Security Patterns
66%
Distributed Denial of Service (DDoS)
66%
Closed Frequent Itemsets
66%
Cluster Head
50%
Malware
50%
User Behavior
50%
Honeypot
50%
Intruder
50%
Data Compression
33%
Network Intrusion Detection System
33%
Space Constraints
33%
Affected Area
33%
Data Aggregation
33%
Traffic Overhead
33%
Preprocessor
26%
Network Construction
22%
Data Privacy
22%
Intrusion Prevention System
22%
False Data
22%
Shortest Path
16%
Compression Model
16%
Reliable Energy
16%
Energy-efficient Path
16%
Neighbor Node
16%
Source Node
16%
Compressed Data
16%
Data Transmission
16%
Traversal
16%
Destination Information
16%
Main Concepts
16%
Dynamic Compression
16%
Cyber Defense
16%
Sequential Pattern Mining
16%
Hybrid Pattern
16%
Packet Inspection
16%
Smurf
16%
Both-Ways
16%
Large Database
16%
Teardrop
16%
Clone Attack
16%
Host-based
16%
Arrival Rate
16%
Attack Identification
16%
Counterattack
16%
Virtual Roaming
16%
Enterprise Network
16%
Denial of Service
16%
Training System
16%
Ant Colony Optimization
16%
Bandwidth Utilization
16%
Ping of Death
16%
Attacker
16%
Packet Analysis
16%
Multi-level Architecture
16%
Defense System
16%
Secure Architecture
16%
Pheromone
16%
Wastage
16%
Sensor Device
13%
Hyperbolic-valued Hopfield Neural Networks
13%
Preprocessing Techniques
13%
Sensor Data
13%
Pre-processing System
13%
Dynamic Change
13%
Hash Table
13%
Memory Time
13%
Technique Performance
13%
Pattern Generation
11%
Encryption
11%
Host Computer
11%
Intermediate Node
11%
Enlargement
11%
Low Power
11%
Power Energy
11%
Homomorphism
11%
Compromised Node
11%
Aggregation Systems
11%
Efficient Network
11%
Wireless Security
11%
Energy Consumption Reduction
11%
Security Aggregation
11%
Data Vulnerability
11%
Computer Science
Intrusion Detection
100%
Distributed Denial of Service
88%
Intrusion Detection System
77%
Data Stream
66%
User Behavior
66%
Frequent Patterns
66%
Hybrid Technique
66%
Malware
66%
Data Streaming
66%
Enhanced Security
66%
Virtual Honeypot
66%
Intrusion Prevention
66%
Service Detection
66%
Honeypots
50%
Attackers
38%
Preprocessor
33%
Prevention System
33%
Network Security
33%
Computer System
33%
Main Controller
33%
Recorded Information
33%
Client-Server Architecture
33%
Received Information
33%
Intrusion Detection and Prevention
33%
Data Aggregation
28%
Processing Time
28%
Sequential Pattern Mining
22%
Industrial Environment
22%
Sequential Pattern
22%
Data Mining
22%
Minimum Threshold
22%
Maximum Threshold
22%
Denial-of-Service
22%
Enterprise Network
22%
Attacker Information
22%
Training System
22%
Inspection Packet
22%
Hopfield Neural Networks
16%
Preprocessing Technique
16%
Component Analysis
16%
Principal Components
16%
Level Architecture
16%
Optimization Technique
16%
Ant Colony Optimization
16%
Bandwidth Utilization
16%
Frequent Itemsets
9%
Data Privacy
9%
Security Vulnerability
9%
Vulnerability Data
9%
Synthetic Data
9%