Computer Science
Cyber Physical Systems
100%
Expert Judgment
78%
Cybersecurity
64%
Embedded Control
60%
Cyber
60%
Assessing Risk
60%
Domain-Specific Language
60%
Configurability
60%
Uncertainty Propagation
60%
Software Interface
60%
Distributed Control
50%
Security Feature
45%
Confidential Data
45%
Standards
42%
Supply Chain
39%
Critical Infrastructure
39%
Security Engineering
38%
Automotive Domain
37%
Development Lifecycle
37%
Protection
36%
Dependable System
35%
Automation
30%
Security Aspect
30%
Process Architecture
30%
Certification
30%
Propagation Strategy
30%
Common Criterion
30%
Software Design Pattern
30%
Software Architecture
30%
Information Sorting
30%
Pattern Languages
30%
Data Processing
30%
Assessment Model
30%
Technical Progress
30%
Mesh Networking
30%
Threat Analysis
30%
Microservice Architecture
30%
Driven Software
30%
Failure Scenario
30%
Predictive Model
30%
Model Failure
30%
Numerical Data
30%
Digitalization
30%
Permanent Fault
30%
Adaptive Software System
30%
Controlling Access
30%
Virtual Prototype
30%
Surrounding Environment
30%
Shared Resource
30%
Secure Communication
30%
Software Architect
30%
Architectural Decision
30%
Communication Protocol
30%
Physical Infrastructure
30%
Software Design
30%
Security Vulnerability
30%
Development Cycle
30%
Security Properties
30%
Process Improvement
30%
Physical Quantity
30%
Use Case
27%
Control
26%
Lifecycle Stage
24%
Production Stage
24%
Autonomous Driving
24%
Attack
24%
Security Attack
21%
Education
20%
Integrity Violation
20%
Product Configuration
19%
Industrial Sector
19%
Extracting Information
19%
Component Configuration
19%
Security Technique
19%
Software Product
19%
Legal Decision
18%
Industrial Control System
17%
Systems Engineering
15%
Autonomy System
15%
Fault Tolerance Mechanism
15%
Millisecond Range
15%
software product line engineering
15%
Modern Software
15%
Physical Simulation
15%
Analysis Pattern
15%
Conceptual Model
15%
Matrix Operation
15%
Software Process
15%
Software Engineer
15%
Untrusted Environment
15%
Specialized Version
15%
Target Audience
15%
Encryption
15%
System Integrity
15%
Operational Stage
15%
Development Stage
15%
Connected System
15%
Mesh Network
15%
System Engineer
15%
Cross Cutting Concern
15%
Intelligent Transportation System
15%
Service Discovery
15%
Holistic System
15%
System Architect
15%
User
15%
Networking Technology
15%
Software-Defined Networking
15%
Reliable Connection
15%
Design Optimization
15%
Curriculum Design
15%
Integrated Circuits
15%
Practice Recommendation
15%
Driving Behavior
15%
Communication Latency
15%
Integrated Model
15%
Internet of Things
15%
Target Software
15%
Man-in-the-Middle Attack
15%
Asymmetric Cryptography
15%
Security Risk Assessment
15%
Threat Capability
15%
Attack Probability
15%
Threat Landscape
15%
Environmental Damage
15%
Potential Attack
15%
Development Process
15%
Automotive System
13%
Cyber Attack
12%
Security Countermeasure
12%
Security Mechanism
12%
Embedded Systems
12%
Probability
12%
Digitization
9%
Industrial Internet of Things
9%
Software Component
9%
Auditing
9%
Operational Architecture
9%
Share Knowledge
9%
Security Concept
9%
Training Material
9%
Infrastructure Traffic
9%
Tight Integration
9%
Stakeholder
9%
Development Approach
9%
Containerization
9%
Design Solution
9%
Shelf Hardware
9%
Related Consequence
9%
Informed Decision
9%
Integration Technique
9%
Software Product Line
9%
Process Management
9%
Product Service
9%
Facilitator
9%
Embedded Device
9%
Cost Efficiency
9%
Commercial off the Shelf
9%
Hardware Fault
9%
Study Program
9%
Computation
9%
Information Technology
9%
Reference Architecture
9%
Hardware Resource
9%
Internal Memory
9%
Communication Environment
9%
Storage Resource
9%
Oriented Service
9%
Security Breach
9%
Paradigm Design
9%
Industrial Setting
9%
Model-Driven Engineering
9%
Reconfiguration
9%
Anomaly Detection
9%
Deployment Process
9%
Quantity Pattern
9%
Detecting Anomaly
9%
Related Pattern
9%
Implementation Level
9%
Mathematical Simulation
9%
Research Project
9%
Dimensional Analysis
9%
Problem Domain
9%
Development Effort
7%
Security Solution
7%
Solution Design
7%
Advanced Driver Assistance System
7%
Calculating Risk
7%
Frequency Attack
7%
Security Domain
7%
Systems Analyst
7%
System Software
7%
Forwarding
7%
Heterogeneous System
7%
Frequency System
7%
Protection Mechanism
7%
Smart Grid
7%
Classification Scheme
7%
Critical Aspect
7%
Elicitation
6%
Threat
6%
Engineering
Accident Prevention
90%
Automation
60%
Sensor Fusion
60%
Fits and Tolerances
45%
Industrial Control
45%
Product
30%
SPICE
30%
Layer Model
30%
Gas Fuel Manufacture
30%
Systems Engineering
30%
Measurement
30%
Pattern Design System
30%
Quantity
30%
Dependability
30%
Error Distribution
30%
Error Indicator
30%
Engineering Designer
30%
Cycles
30%
Cyber Security
30%
Nodes
30%
Safety Risk Assessment
30%
Design Time
30%
Expert Judgment
30%
Process Improvement
30%
Automotives
24%
Radar
24%
Critical Situation
24%
Internet of Things
20%
Chain
15%
Increasing Demand
15%
Process Control
15%
Control System
15%
Reliability
15%
Malfunction
15%
Compatibility
15%
Pattern Detection
15%
Stages
15%
Predictive Maintenance
15%
Failure (Mechanical)
15%
Design Development
15%
Millisecond
15%
Data Value
15%
Performance
15%
Design
15%
Mechanisms
15%
Multiple Approach
15%
Step Change
9%
Automotive Sector
9%
Development
9%
Cyber-Physical Systems
9%
Integration
9%
Functional Safety
9%
Virtualization
9%
Value Creation
9%
Level Sensor
9%
Private Key
9%
Manufacturing Phase
9%
Additional Requirement
9%
Architecture
9%
Realization
9%
Cyber Attack
9%
Internal Fault
9%
Product Design
9%
Design Paradigm
9%
Self-Adaptive Software
9%
Malware
9%
Harmful Event
9%
Assessor
7%
Smart Healthcare
7%
Driving Energy
7%
Health Monitoring
7%
Original Equipment Manufacturer
6%
Gears
6%
Locks (Fasteners)
6%
Evaluator
6%
Systematic Approach
6%
Product Certification
6%
Physical Vehicle
6%
Classification Scheme
6%
Hardware Software Interface
6%
Customer Expectation
5%
Safety Function
5%
Operation and Maintenance
5%
Production Operation
5%
Cost Engineering
5%
Process Specification
5%
Hardware System
5%
Fixed Device
5%