Computer Science
Steganography
100%
Malware
100%
Pattern Matching
100%
Matching Approach
50%
Fingerprint Recognition
50%
Uniform Resource Locator
50%
Smart Meters
50%
Fingerprint Identification
50%
Malware Detection
50%
String Pattern
50%
Authentication
50%
Static Program Analysis
50%
Biometrics
50%
Approximate String Matching
50%
Malicious Code
25%
Data Hiding
25%
Confidential Data
25%
Computer Network
25%
Data Type
25%
Exact Location
25%
secret data
25%
Time Complexity
12%
Daily Activity
12%
Workflow
10%
Bioinformatics
10%
Experimental Result
10%
Hashing
8%
Search Technique
8%
Control-Flow Graph
8%
Antivirus
8%
Machine Learning
8%
Learning System
8%