TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| Access Control | |
| Adversarial Training | |
| air-gap | |
| anonymization | |
| anonymous e-cash | |
| attack countermeasure tree | |
| auditability | |
| Authentication | |
| Authentication Compromise | |
| Automated Classification | |
| avalanche effect | |
| B | |
| Bayesian Framework | |
| blockchain | |
| brain imaging | |
| C | |
| Chainweb | |
| CIC-DDoS2019 | |
| CIC-DoS2017 | |
| CIC-IDS2017 | |
| cloud security | |
| Convex Hull | |
| covert channels | |
| CSE-CIC-IDS2018 | |
| Cyber range | |
| D | |
| data privacy | |
| dataset issues | |
| Deep Learning | |
| Detection model | |
| digital forensic | |
| Distributed Denial of Service (DDoS) | |
| distributed ledger technologies | |
| E | |
| e-voting | |
| EEG | |
| Efficient query | |
| electromagnetic | |
| electronic voting machines | |
| encrypted cloud data | |
| exfiltration | |
| F | |
| face recognition | |
| fake news | |
| fake news detection | |
| feature analysis | |
| Federated Learning | |
| Feistel network | |
| formalization | |
| forward privacy | |
| G | |
| Garage door openers | |
| gender estimation | |
| General Data Protection Regulation | |
| Geostationary orbit | |
| Guided-LDA | |
| H | |
| Hand Gesture | |
| human detection of fake news | |
| Human-readable identifiers | |
| I | |
| In-Air Gesture | |
| Industrial control system (ICS) | |
| injection attack | |
| Integer Programming | |
| Internet of Things | |
| Internet of Things (IoT) | |
| IoT (Internet of Things) | |
| IoT dataset | |
| IoT profiling | |
| Iot security | |
| K | |
| Keeloq | |
| keyword analysis | |
| Kidney Exchange | |
| knowledge graph | |
| L | |
| leakage | |
| M | |
| Mental Health | |
| mining attacks | |
| Mobile Apps | |
| mobile crowdsensing | |
| Model Extraction | |
| multi-dimensional privacy | |
| N | |
| Natural Language Processing | |
| network | |
| network intrusion detection | |
| network traces | |
| neuro security | |
| neuro-cognitive | |
| NIST | |
| NLP | |
| NSL-KDD | |
| O | |
| obfuscation | |
| ontology | |
| P | |
| Poisoning Attack | |
| Practical System | |
| presentable digital forensic evidence | |
| Privacy | |
| privacy policies | |
| Privacy Policy | |
| privacy preservation | |
| Private payment | |
| Probabilistic Model | |
| proof of vote validity | |
| Proof-of-Work | |
| Q | |
| quantitative assessment | |
| R | |
| range query | |
| result verifiability | |
| Rolling code | |
| S | |
| SATA | |
| Satellite communication | |
| Satellite security | |
| SCADA | |
| scalability | |
| Secure Multi-Party Computation | |
| Secure storage | |
| Security | |
| security threat | |
| spatial-temporal constraint | |
| SSE schemes | |
| surveillance video | |
| T | |
| topic modelling | |
| Traceability | |
| U | |
| UNSW-NB15 | |
| Usable Privacy and Security | |
| usable security | |
| User Authentication | |
| User behavior simulation | |
| user studies | |
| user study | |
| V | |
| V2G system | |
| vote privacy | |
| W | |
| Web 3.0 | |
| worker selection | |
| Z | |
| zero-knowledge proof | |
| zk-SNARKs | |