Computer Science
Intrusion Detection System
100%
Early Detection
90%
Network Traffic
72%
Security Attack
63%
Software Systems
54%
Deep Learning
54%
Neural Network
40%
Web Application
30%
Performance Problem
27%
Test-Driven Development
27%
Software Development
27%
Network Security
27%
Anomaly Detection
27%
Deep Neural Network
27%
Deep Reinforcement Learning
27%
Discriminator
27%
Random Test
27%
Intrusion Detection
27%
Machine Learning
27%
Systematic Mapping Study
27%
Deep Learning Method
27%
Attention (Machine Learning)
27%
Control-Flow Graph
27%
System Security
27%
System Manufacturer
27%
Cyber Resilience
27%
Integrated System
27%
Code Analysis
27%
Execution Path
27%
Leaning Parameter
27%
Classification Performance
22%
Performance Issue
19%
Recurrent Neural Network
18%
Neural Network Model
18%
Attackers
18%
Feature Selection
18%
Selection Process
18%
Malicious Behavior
18%
Security Intrusion
18%
Data Corruption
18%
Network Intrusion Detection System
18%
Software Development Tool
13%
Speed-up
13%
Network Packet
13%
Position Control
13%
Root Cause Analysis
13%
Development Process
13%
Neural Network Architecture
9%
Application Domain
9%
Targeted System
9%
Keyphrases
Metamorphic Testing
45%
Test Oracle
36%
Intrusion Detection System
36%
Early Intrusion Detection
36%
Metamorphic Relation
31%
Attention Mechanism
27%
Identification Efficiency
27%
Network Security Attacks
27%
Early Anomaly Detection
27%
Real-time Security
27%
Multi-dimensional Input
27%
Security Attack Detection
27%
Performance Test
27%
Input Space
27%
Web-based System
27%
Neural Network
27%
Network Anomaly Detection
27%
Fault Localization
27%
Fault Pattern
27%
Cloud Continuum
27%
Seed Output
27%
Industrial Control Systems
27%
Performance Exploration
27%
Deep Reinforcement Learning (deep RL)
27%
Performance Problems
27%
Test-driven Development
27%
Transformer Model
27%
Metamorphic Transformation
27%
Iterative Optimization
27%
Hyperparameters
27%
Machine Learning Operations (MLOps)
27%
Visual Debugging
27%
Python Program
27%
Program Spectrum
27%
Development Operations
27%
Smart Assistant
27%
EU Cybersecurity Act
27%
Cyber Threats
27%
Engineering Development
27%
System Resilience
27%
DevSecOps
27%
Requirements Engineering
27%
Practice Verification
27%
Practice Management
27%
Cyber Resilience
27%
Large Enterprises
27%
Verification Management
27%
System Security
27%
Test Case Generation
27%
Input Combination
23%