Computer Science
Android
100%
Security and Privacy
78%
Insider Threat
78%
Mobile App
65%
Mobile Application
54%
Operating Systems
52%
Internet Browser
52%
Source Codes
52%
Android Malware
52%
Hybrid Approach
52%
Machine Learning
44%
User Data
39%
Web Browser
39%
Cyber Attack
39%
Threat Detection
35%
Future Direction
34%
Android Application
32%
Sensitive Informations
26%
Back End
26%
Malware Detection
26%
Information Exposure
26%
Enhanced Security
26%
Search Engine
26%
Ranking Algorithm
26%
Predictive Model
26%
Long Short-Term Memory Networks
26%
Early Detection
26%
Attackers
26%
Security Attack
26%
Call Graph
26%
Named Entity Recognition
26%
Security Policy
26%
System Calls
26%
Privacy Implication
26%
Misinformation
26%
Mobile Operating System
21%
Research Effort
21%
Malicious Intent
14%
Conditional Random Field
13%
Answering Machine
13%
Network Structures
13%
Personal Data
13%
Multilayer Perceptron
13%
Resulting Score
13%
Defense Strategy
13%
Extreme Gradient Boosting
13%
Vulnerability Scanner
13%
Application Package
13%
Privacy Preference
13%
Static Program Analysis
13%
Keyphrases
WebView
26%
Information Exposure
26%
User Agent Strings
26%
Android App
26%
Embedded Browser
26%
Permission Requests
26%
User Clicks
26%
Free Applications
26%
Insider Threat Detection
26%
Insider Threat
26%
Privacy Score
26%
Arabic Content
26%
System Call Graph
26%
Android Malware
26%
Data-driven Predictive Model
26%
Cyber Security Attacks
26%
Android Malware Detection
26%
Kotlin
26%
Adaptive Security
26%
Web Surfing
17%
Input Generation
17%
Android OS
13%
Bootstrap Aggregation
13%
Google Android
13%
Mobile App Store
13%
Third-party Applications
13%
Robust Filter
13%
Malware Analysis
13%
User Device
13%
Document Frequency
13%
Hybrid Words Embedding
13%
Safer Internet
8%
App Features
8%
HTTP Requests
8%
App Descriptions
8%
Data Imbalance Issue
8%
Retrieval-based Question Answering
8%
Data Theft
8%
Conditional Random Fields
8%
Arabic Named Entity
8%
Application Package
8%
Freelancers
8%
Environment Detection
8%
Zero-day Attacks
8%
Kotlin Language
8%
Step Detection Algorithm
8%
Feature Utilization
8%
Threat Landscape
8%
Malware Behavior
8%
On-device
8%