Computer Science
Cyber Physical Systems
100%
Cybersecurity
90%
Automotive Domain
61%
Embedded Control
54%
Microservice Architecture
54%
Pattern Languages
54%
Physical Quantity
54%
Software Interface
54%
Domain-Specific Language
54%
Configurability
54%
Uncertainty Propagation
54%
Distributed Control
45%
Security Engineering
45%
Expert Judgment
43%
Security Feature
40%
Confidential Data
40%
Use Case
40%
Internet of Things
40%
Automotive System
39%
Critical Infrastructure
36%
Infrastructure Traffic
36%
Software Architect
36%
Supply Chain
36%
Industrial Internet of Things
36%
Development Lifecycle
34%
Dependable System
31%
Target Software
27%
Software Engineer
27%
Shared Resource
27%
Information Sorting
27%
Controlling Access
27%
Security Vulnerability
27%
Development Cycle
27%
Mesh Networking
27%
Design Optimization
27%
Autonomy System
27%
Fault Tolerance Mechanism
27%
Curriculum Design
27%
Threat Analysis
27%
Millisecond Range
27%
Physical Infrastructure
27%
Commercial off the Shelf
27%
Internal Memory
27%
Hardware Fault
27%
Hardware Resource
27%
Permanent Fault
27%
Digital System
27%
Conceptual Model
27%
Software Process
27%
Feedback Loop
27%
Code Metrics
27%
Software Application
27%
Assessing Risk
27%
Surrounding Environment
27%
Process Improvement
27%
Tight Integration
27%
Data Processing
27%
Six Sigma
27%
Common Criterion
27%
Process Architecture
27%
Assessment Model
27%
Digitalization
27%
Architectural Decision
27%
Software Design Pattern
27%
Security Concern
27%
Numerical Data
27%
Predictive Model
27%
Model Failure
27%
Failure Scenario
27%
Driven Software
27%
Security Properties
27%
Propagation Strategy
27%
Virtual Prototype
27%
Adaptive Software System
27%
Portable Device
27%
Practice Recommendation
27%
Technical Progress
27%
Development Process
23%
Lifecycle Stage
22%
Dimensional Analysis
22%
Specialized Version
22%
Target Audience
22%
Production Stage
22%
Communication Protocol
22%
Automation System
18%
Industrial Automation
18%
Integrity Violation
18%
Problem Domain
18%
Quantity Pattern
18%
Related Pattern
18%
Development Approach
18%
Mathematical Simulation
18%
Integration Technique
18%
Information Technology
18%
Product Configuration
18%
Extracting Information
18%
Security Technique
18%
Component Configuration
18%
Industrial Sector
18%
Software Product
18%
Security Countermeasure
15%
Cyber Attack
15%
Classification Scheme
15%
Industrial Control System
15%
Operational Stage
13%
Mesh Network
13%
Untrusted Environment
13%
Man-in-the-Middle Attack
13%
Critical System
13%
Cross Cutting Concern
13%
Reliable Connection
13%
Software-Defined Networking
13%
Intelligent Transportation System
13%
Service Discovery
13%
System Engineer
13%
Matrix Operation
13%
Connected System
13%
Networking Technology
13%
Holistic System
13%
Physical Simulation
13%
System Integrity
13%
System Architect
13%
Environmental Damage
13%
Threat Landscape
13%
Development Stage
13%
Security Design
13%
Analysis Pattern
13%
Driving Behavior
13%
Communication Latency
13%
Security Risk Assessment
13%
Attack Probability
13%
Threat Capability
13%
Security Domain
13%
Systems Analyst
13%
Frequency System
13%
Calculating Risk
13%
Integrated Circuits
13%
Reference Architecture
13%
Frequency Attack
13%
Storage Resource
13%
Communication Environment
13%
Software Design
13%
Modern Software
13%
software product line engineering
13%
Encryption
13%
Autonomous Driving
13%
Shelf Hardware
13%
Related Consequence
13%
Design Solution
13%
Product Service
13%
Security Attack
13%
Numerical Value
13%
Control Function
13%
Operational Behavior
13%
Embedded Systems
10%
Software Architecture
9%
Security Concept
9%
System Function
9%
Assessment Method
9%
Security Standard
9%
Assistant System
9%
Level Principle
9%
Time Constraint
9%
Continuous Integration
9%
Continuous Deployment
9%
Software Component
9%
Detecting Anomaly
9%
Model-Driven Engineering
9%
Interoperability
9%
Research Project
9%
Study Program
9%
Software Developer
9%
Share Knowledge
9%
Training Material
9%
Deep Understanding
9%
Software Product Line
9%
Informed Decision
9%
Process Management
9%
Implementation Level
9%
Anomaly Detection
9%
Deployment Process
9%
Design Patterns
9%
Operational Architecture
9%
Protection Mechanism
6%
Potential Attack
6%
Development Effort
6%
Advanced Driver Assistance System
6%
Solution Design
6%
Point Estimate
6%
Smart Grid
6%
Critical Aspect
6%
System Software
6%
Heterogeneous System
6%
Design-Space Exploration
5%
Related Product
5%
Certification Process
5%
Identity Theft
5%
Global Network
5%
Product Quality
5%
Engineering Discipline
5%
Engineering
Industrial Control
40%
Critical Infrastructure
36%
Customer Expectation
34%
Distributed Control
27%
Error Indicator
27%
Error Distribution
27%
Engineering Designer
27%
Development Cycle
27%
Multiple Approach
27%
Safety Risk Assessment
27%
Design Time
27%
Process Improvement
27%
Expert Judgment
27%
Mechatronic Design
27%
Steering Angle δ
27%
SPICE
27%
Layer Model
27%
Nodes
27%
Data Value
27%
Predictive Maintenance
27%
Failure Scenario
27%
Automotives
27%
Numerical Data
27%
Fits and Tolerances
27%
Cyber Security
27%
Numerical Value
27%
Design Process
27%
Built System
27%
Pattern Design System
27%
Assessment Method
18%
Additional Requirement
13%
Development Phase
13%
Production Stage
13%
Private Key
13%
Manufacturing Phase
13%
Security Feature
13%
Matrix Operation
13%
Physical Simulation
13%
System Unit
13%
Design Development
13%
Process Design
13%
Design Solution
13%
Design Optimization
13%
Control System
13%
Process Control
13%
Effective Solution
13%
Value Creation
13%
Increasing Demand
13%
Millisecond
13%
Experimental Result
13%
Coming Year
13%
Adaptive Systems
9%
Cyber Attack
9%
Design Paradigm
9%
Self-Adaptive Software
9%
Malware
9%
Harmful Event
9%
Locks (Fasteners)
9%
Virtualization
9%
Control Function
9%
Environmental Damage
6%
Driving Energy
6%
Smart Healthcare
6%
Health Monitoring
6%
Production Operation
6%
Cost Engineering
6%
Operation and Maintenance
6%
Engineering Discipline
6%
Safety Function
6%
Assessor
6%
Original Equipment Manufacturer
6%
Information Technology
5%
Systematic Approach
5%
Evaluator
5%
Product Certification
5%
Hardware Software Interface
5%
Classification Scheme
5%
Physical Vehicle
5%