Engineering & Materials Science
Authentication
100%
Mobile ad hoc networks
99%
Wireless sensor networks
93%
Sensor networks
68%
Sensor nodes
59%
Query processing
50%
Communication
45%
Network protocols
45%
Access control
33%
Mobile computing
32%
Ad hoc networks
31%
Radio frequency identification (RFID)
31%
Outsourcing
30%
Wireless mesh networks (WMN)
28%
Wireless networks
25%
Crowdsourcing
24%
Smartphones
24%
Jamming
23%
Routing protocols
20%
Data storage equipment
19%
Internet of things
19%
Servers
19%
Unattended sensors
19%
Location based services
19%
Data privacy
17%
Indoor positioning systems
17%
Experiments
17%
Costs
17%
Sensors
15%
Energy efficiency
15%
Physical layer
15%
Botnet
14%
Zigbee
14%
Touch screens
14%
Cryptography
13%
Internet
12%
Bluetooth
12%
Scalability
11%
Throughput
11%
Base stations
11%
Denial-of-service attack
11%
Dynamic loads
10%
Cognitive radio
10%
Network security
10%
Security of data
10%
Radio transmission
10%
Agglomeration
9%
Energy conservation
8%
Spamming
8%
Network layers
8%
Mathematics
Mobile Ad Hoc Networks
40%
Sensor Networks
23%
Authentication
19%
Privacy Preserving
18%
Vertex of a graph
17%
Attack
16%
Privacy
15%
Sensor
15%
Routing Protocol
12%
Query Processing
12%
Service Selection
11%
Vehicular Ad Hoc Networks
11%
Wireless Mesh Networks
11%
Receiver
11%
Access Control
10%
Spectrum Sensing
10%
Context-aware
10%
Reputation System
10%
Cognitive Radio
9%
Peer-to-peer Networks
9%
Navigation System
9%
Range Query
8%
Resources
8%
Jamming
8%
Query
8%
Identity-based
8%
Wireless Sensor Networks
8%
Maximal Ratio Combining
7%
Efficacy
7%
Energy Conservation
7%
Broadcast
7%
Routing
7%
Quality of Service
6%
Spread Spectrum
5%
Movement
5%
Energy
5%
Demand
5%
Communication
5%
Neural Networks
5%