Keyphrases
ACO-OFDM
19%
Adaptive Routing
10%
Adversarial Attack
9%
Analytical Model
15%
Analytical Modeling
10%
Anomaly Detection
12%
Artificial Bee Colony Algorithm
11%
Artificial Neural Network
17%
Attack Algorithm
9%
Bit Error Rate
9%
Blanket Coverage
9%
Call Center
12%
Cloud Computing
9%
Cluster-based
10%
Cognitive Engine
14%
Cognitive Radio System
19%
Collision-free
19%
Convolutional Neural Network
23%
Cross-layer
16%
Cyber-attacks
11%
Data Gathering Protocol
12%
Data Gathering Scheme
11%
Deep Learning
39%
Deep Learning Model
16%
Distributed Nodes
11%
Electroencephalography
12%
Encryption
15%
Energy Consumption
19%
Epileptic Seizure
12%
Error Performance
12%
Feature Classification
12%
Feature Extraction
15%
Free Media
13%
Glasgow
12%
Global Positioning System
10%
Hypercube
10%
Indoor Environment
12%
Information Security
12%
Initial Deployment
11%
Insider Threat
19%
Internet of Things
38%
Internet of Things Devices
10%
Intrusion Detection
24%
Intrusion Detection System
41%
IoT Devices
10%
Jacobian
9%
Latency
17%
Localization System
12%
Long Range Wide Area Network (LoRaWAN)
51%
LoRa
19%
Low Power
10%
Low-power Wide-area Network (LPWAN)
10%
Machine Learning Algorithms
24%
Machine Learning Techniques
11%
Malware
13%
Maximum Coverage
12%
Mean Squared Error
12%
Medium Access Control
25%
Message Latency
9%
Mobile Ad Hoc Network (MANET)
25%
Mobile Data Collection
25%
Mobile Sensor Networks
33%
Monitoring System
21%
Movie Reviews
15%
Multicomputer
10%
Multiple-input multiple-output System
14%
Network on chip
19%
Network Performance
10%
Neural Network
36%
Neural Network Model
19%
Node Deployment
17%
Nodes Deployment Algorithm
45%
NSL-KDD
13%
Occupancy Monitoring
25%
Orthogonal Frequency Division multiplexing System
19%
Packet Switching
10%
Performance Analysis
21%
Performance Evaluation
23%
Performance Metrics
11%
Persian
10%
Propagation Model
21%
Random Neural Network
100%
Routing Algorithm
23%
Routing Protocol
11%
Saliency Map
9%
Sensor Node
24%
Sentiment Analysis
12%
Simulation Study
22%
Spidergon
12%
Support Vector Machine
15%
Swarm Optimization
12%
TCP Performance
9%
Time Occupancy
12%
Trace-driven Simulation
12%
Underwater Sensor Networks
58%
Urban Environment
13%
Urban Scenario
20%
Wireless Sensor Networks
25%
World Wide Web
11%
Wormhole
21%
Computer Science
Adaptive Routing
10%
Adversarial Machine Learning
10%
Analytical Model
21%
Anomaly Detection
12%
Artificial Bee Colony Algorithm
10%
Artificial Neural Network
11%
Autoencoder
7%
Cloud Computing
10%
Cognitive Engine
7%
Cognitive Radio
12%
Cognitive Radio Networks
8%
Computer Vision
8%
Convolutional Neural Network
38%
Cyber Attack
7%
Cybersecurity
12%
Data Detection
6%
Decision-Making
7%
Deep Learning Method
45%
Deep Learning Model
14%
Deep Neural Network
7%
Deterministic Routing
7%
Encryption Scheme
16%
Energy Consumption
24%
Energy Efficiency
12%
Energy Saving
7%
Ensemble Learning
8%
Experimental Result
9%
False Positive
6%
fault-tolerance
7%
Feature Extraction
27%
Feature Selection
8%
Gathering Data
25%
Global Positioning System
16%
Health Care
7%
Hypercube
11%
Information Security
15%
Insider Threat
19%
Internet of Things Device
10%
Internet-Of-Things
80%
Intrusion Detection
25%
Intrusion Detection System
36%
Jacobian matrix
8%
Learning Approach
8%
Learning System
32%
Long Short-Term Memory Network
9%
Low Power Wide Area Networks
12%
Machine Learning
25%
Machine Learning Algorithm
23%
Machine Learning Approach
8%
Machine Learning Technique
6%
Malware
19%
Maximum Coverage
14%
Mean Absolute Error
8%
Media Access Control
21%
Media Access Control Protocol
22%
Message Latency
11%
mobile ad-hoc network
25%
mobile sensor network
31%
Monitoring System
25%
Multicomputers
12%
Multilayer Perceptron
8%
Network Lifetime
8%
Network Monitoring
6%
Network Performance
7%
Network Security
8%
Network Topology
9%
Networks on Chips
25%
Neural Network
67%
Neural Network Architecture
16%
Neural Network Model
12%
Packet Delivery Ratio
8%
Penetration Testing
12%
Performance Analysis
12%
Performance Evaluation
28%
Performance Metric
9%
Performance Model
18%
Prediction Accuracy
9%
Propagation Model
34%
Quality of Service
8%
Received Signal Strength
17%
Residual Neural Network
9%
Retransmission
9%
Routing Algorithm
29%
Routing Protocol
20%
Security and Privacy
9%
Sensor Networks
59%
Sensor Node
24%
Sentiment Analysis
21%
Simulation Experiment
10%
Simulation Study
23%
Spread Spectrum
9%
Support Vector Machine
11%
System-on-Chip
8%
Temporal Convolutional Network
6%
Transfer Learning
8%
Urban Environment
19%
Vulnerability Scanner
8%
Web Application
12%
Wide Area Network
38%
Wireless Sensor Network
29%