Keyphrases
Attack Tree
80%
Care Provision
77%
Kronecker
71%
Medical Records
71%
Cyber-attacks
71%
Data Sharing
68%
Data Sharing Platform
53%
Software Teams
53%
Virtual Humans
53%
Stochastic Automata Networks
53%
Blockchain
50%
Data Lake
50%
Relaxation System
48%
Patient-centered
47%
Healthcare System Design
44%
Breathing Relaxation
43%
Cyberattack Analysis
42%
Distributed Projects
42%
Vulnerability
41%
Privacy-preserving
41%
Medical Data
41%
Health Systems
41%
Human Breathing
40%
Federated Learning
39%
COVID-19 Pandemic
38%
Cybersecurity
36%
Health Platform
35%
Analytic Hierarchy Process
35%
Privacy Notice
35%
Vector Descriptor
35%
Patient-centric Healthcare
35%
Cyber Threat Intelligence
35%
Coaching
35%
Performance Evaluation
35%
Ensemble Clustering
35%
Access Rules
35%
Healthcare
31%
Privacy Concerns
30%
Security Threats
27%
Machine Learning
27%
Design Decisions
26%
Toolchain
26%
Analytical Modeling
26%
Resilient
26%
Patient-centric Systems
26%
Performance Index
25%
Increased Productivity
23%
Access Control
23%
Performance Analysis
23%
Efficiency Improvement
23%
Personalized Care
23%
Wearable Devices
23%
Tensor Algebra
23%
User Interface
23%
Fuzzy Logic
23%
Authentication Mechanism
22%
Markovian Model
22%
Web-based
21%
Smart Environments
21%
Breathing Exercises
21%
Teamwork
21%
Smart Buildings
21%
Virtual Coach
21%
World Wide Web
20%
Europe
20%
Levels of Support
20%
Comparative Analysis
20%
Distributed Machine Learning
19%
Centre Care
17%
Energy Awareness
17%
Modbus RTU
17%
Electronic Government System
17%
Artificial Immunity
17%
Communication Architecture
17%
Modbus Protocol
17%
User-centered Development
17%
Multi-level Communication
17%
Chest Radiology
17%
E-Government Framework
17%
Perfect Simulation
17%
Conflict-free Access
17%
Smart Healthcare System
17%
Demand Disruption
17%
Prophet Model
17%
Citizen-centric
17%
Personalized Data
17%
Agile Unified Process
17%
Team Motivation
17%
Cancer Waiting Time
17%
Game Principles
17%
Local Team
17%
Ventilated Room
17%
Fluid Residence Time
17%
Community Health Resources
17%
Territorial Resources
17%
Internet Topology
17%
Security Assessment
17%
Data Narratives
17%
Time-memory Trade-off
17%
Metal Activation
17%
Computer Science
Blockchain
100%
Data Sharing
95%
Software Development
80%
Development Team
71%
Cyberattack
71%
Automaton
65%
Case Study
65%
Privacy Preserving
59%
Cybersecurity
57%
Virtual Humans
53%
Performance Evaluation
53%
Machine Learning
50%
Medical Record
47%
Artificial Intelligence
39%
Data Privacy
36%
Software Development Tool
35%
Global Software Development
35%
Federated Learning
35%
Autonomous System
35%
Energy Saving
35%
Analytic Hierarchy Process
35%
Cyber Threat Intelligence
35%
Healthcare Data
31%
Virtual Reality
29%
Data Source
29%
Personal Data
29%
Working Team
26%
Security and Privacy
25%
Healthcare Provider
23%
Information Security
23%
Wearable Device
23%
General Data Protection Regulation
23%
Performance Analysis
23%
Access Control
23%
Data Retrieval
23%
Tool Chain
23%
Internet of Things
22%
Large State Space
22%
Human Interaction
22%
Continuous Time
22%
Numerical Methods
22%
Markov Chain
22%
Smart Environment
21%
Data Partitioning
20%
User Interfaces
20%
Experimental Result
20%
Comparative Analysis
19%
Distributed Machine Learning
19%
Decision-Making
18%
Communication Architecture
17%
Modbus
17%
Interaction Techniques
17%
Extended Reality
17%
Special Interest
17%
Simulation Study
17%
Development Environment
17%
Central Element
17%
Computer Communication Technology
17%
Multifactor Authentication
17%
Cancer Patient
17%
Transition Time
17%
Treatment Plan
17%
Mixed Reality
17%
Augmented Reality
17%
Security Assessment
17%
Participatory Design
17%
Virtual Community
17%
Evaluation Metric
17%
Structured Model
17%
Stochastic Petri Net
17%
Solving Algorithm
17%
Sparse Solution
17%
Chat
17%
Statistical Model
17%
Weighted Average
17%
Administrative Burden
17%
Interdomain Routing
17%
Network Domain
17%
Internet Topology
17%
Software Engineering
17%
Structural Property
17%
Inference Model
17%
Actual Performance
17%
Business Models
17%
Mean Absolute Error
17%
Model Checking
17%
Enhance Understanding
17%
Fuzzy Logic
17%
Structural Equivalence
17%
Display Information
17%
Undesired Behavior
17%
Homomorphic Encryption
17%
Existing Protocol
17%
Operational Process
17%
Process Improvement
17%
Resource Availability
17%
Explainable Artificial Intelligence
17%
Smart Device
17%
Quantitative Data
17%
Visual Representation
17%