Computer Science
Bitcoin
100%
Public Internet
83%
Network Layer
75%
Detection Algorithm
50%
Application Layer
50%
Cascading Failure
50%
Service Dependency
50%
High-Level Language
50%
Legacy Application
50%
Admission Control
50%
Machine Learning
50%
Performance Monitor
50%
Resource Utilisation
50%
Guided Optimization
50%
Internet Application
50%
Mass Surveillance
50%
Internet of Things
50%
Voice over Internet Protocol (VoIP)
50%
Completion Time
50%
cloud provider
50%
Cryptocurrency
50%
Anomaly Detection
50%
Failure Characteristic
50%
Path Selection
50%
Potential Benefit
50%
Output-Queue
50%
Attackers
30%
Interdomain Routing
29%
Blockchain
25%
Performance Metric
25%
Software Systems
25%
Memory Footprint
25%
Critical Application
16%
Anonymous Transaction
16%
Outbound Connection
16%
Performance Guarantee
16%
Reducing Latency
16%
Provider Service
16%
Service Offering
16%
Wide Area Network
16%
Data Center
16%
Critical System
12%
Programming Language
12%
Participatory Design
12%
Malicious Client
12%
Denial of Service Attack
12%
Programmable Network
12%
Peer to Peer Networks
12%
Research Community
10%
Network Operator
10%
Benchmarking
10%
Building-Blocks
10%
Code Reuse
10%
Granularity
10%
User Communication
8%
Packet Processing
8%
High Throughput
8%
Hosting Service
8%
Buffer Utilization
8%
Harmful Interference
8%
Action Network
8%
Internal Action
8%
side-channel
8%
Commercial off the Shelf
8%
Use Case
8%
Shelf Hardware
8%
Internet Traffic
8%
Incident Report
7%
Supernode
5%
Autonomous System
5%
Collected Data
5%
Routing Infrastructure
5%
Keyphrases
Edge-to-edge
50%
Network Layer Attacks
50%
Service Dependency
50%
Routing Attacks
50%
Quality of Experience Management
50%
Video Quality of Experience
50%
Cascade Control
50%
Internet Applications
50%
Reverie
50%
Switch Buffer
50%
Connectivity Recovery
50%
VoIP Calls
50%
Flow-aware
50%
Profile Optimization
50%
VoIP Services
33%
Network Layer
25%
Application Layer
25%
Network Applications
25%
Small Memory Footprint
25%
Broadcom
25%
Multiple Queues
25%
Sizing Method
25%
Malicious Flow
16%
High-throughput Test
16%
Surveillance Scenarios
16%
Data Plane Attack
16%
Internet's Core
12%
Pipeline Length
12%
Traffic-aware
12%
Collaborative Architecture
10%
Industry Consolidation
10%
Coaxing
10%
Block Propagation
10%
Dependable Systems
8%
IODEF
8%
Mitigation Process
8%
Interface Protocol
8%
Incident Reporting
8%
Attack Source
8%
Close Cooperation
8%
Collaborative Mechanism
8%
Buffer Queue
8%
Transient Congestion
8%
Obliviousness
8%
Datacenter Transport
8%
Bounded Buffers
8%
Bursty Workload
8%
IoT Anomaly Detection
8%
Congestion Signal
8%
Loss Tolerance
8%
Data-driven Systems
7%
Traffic Disruption
7%
BGP Hijacking
6%
Relay Operation
6%
Third-party Dependency
6%
Third-party DNS
6%
Mining Pool
5%