Keyphrases
Internet of Things
60%
Physical Unclonable Function
60%
IoT Infrastructure
45%
Balanced Training
45%
Integrated Training
45%
European Research
45%
Innovative Training Network
45%
IoT Applications
45%
Horizon 2020
45%
Training Program
45%
Well-balancing
45%
Interdisciplinary Training
45%
Curie
45%
Early-stage Researchers
45%
IoT Security
30%
Training Networks
30%
Intelligent Framework
30%
Attack Defense
30%
Edge Intelligent
30%
Edge Intelligence
30%
IoT Devices
30%
Machine Learning Modeling Attack
30%
Marie Curie ITN
30%
Secure Architecture
30%
Machine Learning
30%
Advance Learning
30%
Cloud-edge Networks
30%
Resource Orchestration
30%
Predictive Machine Learning
30%
Decentralized Identification
30%
Decentralized Authentication
30%
Proof-of-work
20%
Lightweight Security
17%
IoT Cybersecurity
15%
Training Networks
15%
Farthest Edges
15%
Cloud Node
15%
Modeling Attack
12%
Safety-critical Systems
9%
Trusted Communication
9%
Security Features
9%
Transaction Confirmation
9%
Secure Data Exchange
9%
Next Generation Systems
9%
Technical Teams
9%
ML Applications
9%
Fundamental Limitations
9%
Attacker
9%
Security Requirements
9%
Resource-constrained
9%
Unique Identifier
9%
Manufacturing Variations
9%
Integrated Circuits
9%
Machine Learning Attack
7%
Unclonable
7%
Security Primitive
7%
Device Authentication
7%
Device Identification
7%
IOTA Tangle
6%
Decentralized Identity
6%
Tamper-proof
6%
Heterogeneous IoT Devices
6%
Chrysalis
6%
Scalable Infrastructures
6%
Decentralized Identity Management
6%
Hash-based Cryptography
6%
Adversarial System
6%
Security Function
6%
Passive Eavesdropper
6%
Key Security
6%
Integrity Preserving
6%
Leveraging Technology
6%
Cancer Monitoring
6%
Affliction
6%
Specific Entropy
6%
Computer Science
Internet of Things
100%
Machine Learning
100%
Deep Reinforcement Learning
45%
Future Direction
30%
Identifier System
30%
Performance Analysis
30%
Training Environment
30%
Simulation Tool
30%
Simulation Environment
30%
Internet-Of-Things
30%
Blockchain
22%
Security and Privacy
20%
Deep Q-Network
20%
Use Case
15%
Identity Management
15%
Digital Identity
15%
IoT Application
15%
Resource Requirement
15%
Energy Efficient
15%
Energy Consumption
15%
Raspberry Pi
15%
Constant Monitoring
15%
Training Tool
15%
Network Design
15%
Network Resource
15%
Internet of Things Device
15%
Initial Configuration
15%
Computational Task
15%
Network Layer
15%
Reinforcement Learning
15%
Computation Offloading
15%
Processing Time
15%
Artificial Intelligence
9%
Performance Issue
9%
Privacy Concern
9%
Massive Amount
9%
Systems Performance
9%
Security Concern
9%
User Information
9%
Systems and Application
9%
Safety Critical Systems
9%
Unique Identifier
9%
Security Requirements
9%
Attackers
9%
Security Feature
9%
Integrated Circuits
9%
Reliable Communication
9%
Generation System
9%
Network Algorithm
9%
Multilayer Perceptron
9%
Obfuscation Technique
9%
Security Application
9%
Learning Technique
9%
Supervised Learning
9%
Obfuscation
9%
Machine Learning Algorithm
9%
Device Identification
9%
Unique Constraint
9%
Training Program
7%
And-States
7%
Cybersecurity
7%
Enabling System
7%
Performance Gap
7%
Technical Team
7%
Distributed Ledger Technology
7%
Technical Detail
7%
Security Mechanism
7%
Hardware Requirement
7%
Authentication Device
7%
Transmission Time
7%
Constrained Device
7%
Experimental Result
7%
Embedded Device
7%
Enabled Function
6%
Security Function
6%
Engineering
Internet of Things
60%
Network Edge
30%
Initial Configuration
30%
Metrics
30%
Simulation Tool
30%
Simulation Environment
30%
Layer Network
30%
Performance Analysis
30%
Reinforcement Learning
30%
End Device
30%
Processing Time
30%
Tasks
30%
Network Resource
30%
Network Node
30%
Coming Year
30%
Nodes
30%
Power Device
15%
Blockchain
7%
Transmissions
7%
Latest Version
7%