Similarity | Rank | |
---|---|---|
encryption | 0.741 | 12672 |
computer_security | 0.739 | 68036 |
network_security | 0.683 | 45208 |
decryption | 0.650 | 93105 |
information_security | 0.644 | 25742 |
crypto | 0.640 | 98293 |
Internet_security | 0.613 | 86537 |
information_theory | 0.606 | 80241 |
cipher | 0.603 | 44738 |
digital_signature | 0.592 | 63775 |
computer_science | 0.583 | 8952 |
cyber_security | 0.581 | 29800 |
software_engineering | 0.579 | 32198 |
encrypt | 0.579 | 14327 |
data_security | 0.570 | 71029 |
cybersecurity | 0.566 | 29050 |
distribute_computing | 0.565 | 86914 |
datum_security | 0.565 | 83145 |
Algorithms | 0.562 | 48835 |
reverse_engineering | 0.560 | 67826 |
computing | 0.553 | 8540 |
Information_Security | 0.549 | 41846 |
distribute_system | 0.548 | 46515 |
biometrics | 0.548 | 41949 |
machine_learning | 0.544 | 25874 |