Keyphrases
Attacker
40%
Behavior Change
20%
Botnet Detection
20%
Collaborative Research
100%
Concept Drift
100%
Contrastive Learning
20%
Course Materials
20%
Critical Infrastructure
20%
Data Breach
20%
Data Labeling
20%
Defense System
20%
Dynamic Change
40%
Dynamic Concept
20%
Generative Models
20%
Impact Review
20%
Internet-enabled Systems
20%
Labeling Cost
20%
Learning-based
100%
Long-term Sustainability
20%
Longitudinal Data
20%
Machine Learning
20%
Machine Learning Based
20%
Malware Analysis
20%
Malware Sample
20%
Measuring Instrument
20%
Minimal Labeling
20%
Network Intrusion Detection
20%
Proactive Approach
20%
Ransomware
20%
Reactive Defenses
20%
Reactive Method
20%
Resilience
20%
Review Criteria
20%
Security Applications
20%
Security Defense
100%
Self-supervised Learning Model
20%
Self-supervision
40%
Sophisticated Attacks
20%
Technology Transfer
20%
Training Stages
20%
Underrepresented Students
20%
Unlabeled Data
20%
User Organizations
20%
Computer Science
Attackers
40%
Concept Drift
100%
Contrastive Learning
20%
Critical Infrastructure
20%
Generative Model
20%
Longitudinal Data
20%
Malware
20%
Malware Analysis
20%
Malware Sample
20%
Measurement Tool
20%
network intrusion detection
20%
Proactive Approach
20%
Security Application
20%
Self-Supervised Learning
20%
Sophisticated Attack
20%
Unlabeled Data
20%