Keyphrases
3D Depth Sensing
16%
3D Video
22%
Access Control Framework
19%
Access Control Mechanism
22%
Account Activity
16%
Active Monitoring
22%
Active Positioning
22%
Activity-based Approach
22%
Adaptive Pedagogy
66%
Bird's Eye View
16%
Blacklist
66%
Blockchain
16%
Blockchain-based
33%
Blur Detection
22%
Color Moments
22%
Consumer IoT
16%
Control Decision-making
16%
Cyber-physical Environment
22%
Cyber-physical Space
66%
Data Access Control
16%
Data Storage Model
66%
Detection Rules
22%
Digital Quality of Life
16%
Enterprise Class
22%
Evade
33%
Existing System
33%
Face Spoofing Detection
66%
Financial Fraud
16%
Financial System
66%
Forensic Investigation
16%
Fraud Prevention
22%
Full Period
16%
Geofencing
44%
Hidden Data
16%
Hidden Message
66%
Human Digital Twin
16%
Impersonation
33%
Improved Learning
22%
Incremental Machine Learning
66%
Indoor Positioning System
16%
Indoor Space
22%
Intelligent Tutor System
44%
IT Students
16%
Knearest Neighbor
44%
Least Significant Bit Steganography
16%
Light Reflection
66%
Location Security
66%
Logical Access
44%
LSB Steganalysis
66%
Message Extraction
66%
Monitoring Role
22%
Multi-agency
66%
Multi-factor Authentication
66%
Nave Bayes Algorithm
22%
Night Vision
22%
Non-minimal Interaction
16%
Object-oriented Programming
66%
OpenSim
22%
Pattern Vision
22%
Personal Data
33%
Physical Form
22%
Positioning Technology
22%
Professional Crimes
22%
Programming Subject
22%
Public Dataset
22%
Quality of Life Survey
16%
Re-authentication
22%
Reflection Pattern
22%
Relative Distance
33%
Role-play Simulation
66%
Search Context
16%
Security Incidents
22%
Security Perimeter
22%
Security State
22%
Single Light Source
22%
Smart Contract
66%
Smart Grid Network
22%
Software-as-a-service
33%
Steganalysis
66%
Steganographic
16%
Steganography
16%
Stereo Vision
66%
Structured Teaching
22%
Student Model
22%
Sunderland
44%
Tag Positioning
22%
Target Marketing
16%
Track Analysis
22%
Transactional Data
22%
Two-factor Authentication
16%
U.S Citizens
16%
User Access Patterns
16%
Username
66%
Video Replay
22%
Virtual Currency
44%
Virtual Economy
22%
Virtual Perimeters
66%
Virtual Representation
16%
Virtual Transaction
66%
Working Well
22%
Computer Science
Abstraction Layer
16%
Access Control
100%
Access Control Decision
16%
Access Control Policies
13%
Access Control System
11%
Access Pattern
16%
Active Learning
33%
Active Monitoring
16%
African Continent
66%
Analysis System
22%
Authentication
66%
Auxiliary Information
11%
Best Practice
33%
Blockchain
66%
Bluetooth Device
33%
Computer Forensics
33%
Control Framework
22%
Core Programming
22%
Critical Information
66%
Data Access Control
16%
Digital Evidence
33%
Digital Investigator
26%
Distributed Data Storage
66%
Face Recognition
33%
Factor Authentication System
33%
Forensic Investigator
9%
Forensics Investigation
22%
Fraud Detection
66%
Human Digital Twin
16%
Individual Decision
11%
Information Infrastructure
50%
Information System
16%
Information Technology
66%
Intelligent Tutor
33%
Internal Data
16%
Laplace Operator
33%
Learning Experiences
33%
Learning Opportunity
66%
Legal Information
66%
Logical Access Control
66%
Machine Learning
22%
multi agent
55%
Multi Agent Systems
22%
Multifactor Authentication
66%
Multiple Camera
16%
Object Oriented Programming
66%
Operational Cost
22%
Perimeter Security
44%
Physical Access
11%
Physical Access Control
77%
Physical Entity
50%
Physical Space
100%
Potential Solution
44%
Prevention Mechanism
22%
Problem-Based Learning
33%
Processing Power
16%
Protect Sensitive Data
33%
Relative Distance
33%
Research Paper
16%
Robust Approach
33%
Search Context
9%
Security and Privacy
11%
Security Model
16%
Sensitive Informations
11%
Simulation Environment
16%
Smart Contract
66%
Smart Grid
66%
Smart Grid Network
16%
Smart Home Device
33%
Software Agent
16%
Software Engineer
22%
Steganalysis
66%
Steganography
26%
Tracking Data
22%
Traditional Offering
16%
Traditional Password
33%
Transaction Data
22%
Transactional Data
22%
Two-Factor Authentication
16%
Virtual Currency
44%
Virtual Environments
44%
Vision Systems
16%
Western Philosophy
66%