Keyphrases
Emergency Department
100%
Resource Allocation
56%
Financial Services
50%
Alcohol Level
50%
United Kingdom
50%
Alcohol Intoxication
50%
Breath Alcohol Concentration (BrAC)
50%
Malware
50%
Data Detection
50%
First Encounter
50%
Malicious Data
50%
Distal Phalanx
50%
Generic Model
50%
Code Execution
50%
Malware Analysis
50%
Shared Code
50%
Open Fracture
50%
International Students
50%
Sensor Data
50%
Machine Learning Algorithms
50%
Practitioner Perspectives
50%
Autoencoder
50%
Flucloxacillin
50%
Randomized Placebo-controlled Trial
50%
Load Balancing
50%
Cloud Efficiency
50%
Temporal Convolutional Network
50%
Mobile Crowdsensing
50%
Cloud Data Center
50%
Insider Threat
50%
Resource Allocation Techniques
50%
Head Injury
50%
Traffic Pattern
50%
Optimized Resource Allocation
50%
Mobile Crowdsensing System
37%
Virtualized
25%
Toilet
25%
Malicious Sensors
25%
Cloud Computing
25%
Network Utilization
25%
Traffic Load
25%
LSTM Algorithm
25%
Dynamic Routing Protocol
25%
Average Load
25%
Mobile Devices
25%
Computing Efficiency
25%
Grid Computing
25%
Load Balancing Algorithm
25%
Dynamic Resource Allocation
25%
Data Center Traffic
25%
Computer Science
Long Short-Term Memory Network
50%
Malware
50%
Temporal Convolutional Network
50%
Data Detection
50%
Malware Analysis
50%
Resource Allocation
50%
Machine Learning Algorithm
50%
Load Balancing
50%
Autoencoder
50%
Insider Threat
50%
Mobile Device
33%
Data Center
25%
Traffic Pattern
25%
Distributed Computing
25%
Obfuscation
18%
Performance Model
16%
Vulnerable System
16%
Comparative Analysis
16%
Detection Accuracy
16%
Learning Mechanism
16%
Adversarial Machine Learning
16%
Adaptive Learning
16%
Potential Threat
16%
Focused Research
12%
Cloud Computing
12%
Tree Search
12%
Information and Communication Technologies
12%
Service-Level Agreement
12%
Optimization Problem
12%
Computational Resource
12%
Dynamic Routing
12%
Routing Algorithm
12%
Blocking Probability
12%
Software Solution
12%
Firefly Algorithm
12%
Central Processing Unit
12%
Network Usage
12%
Cloud Computing Paradigm
12%
Allocating Resource
12%
Long Short-Term Memory Networks
12%
Dynamic Resource Allocation
12%
Grid Computing
12%
Machine Learning Approach
12%
Resource Utilisation
12%
Malicious Insider
11%
Detecting Malware
6%
Execution Service
6%
Persistence Service
6%
Actual Function
6%
Dynamic Link Library
6%