Keyword | CPC | PCC | Volume | Score | Length of keyword |
---|---|---|---|---|---|
theory about cyber security | 1.02 | 0.7 | 8934 | 4 | 27 |
theory | 1.02 | 0.2 | 3912 | 93 | 6 |
about | 1.51 | 0.5 | 4735 | 4 | 5 |
cyber | 0.23 | 0.5 | 4379 | 100 | 5 |
security | 1.01 | 0.3 | 5407 | 38 | 8 |
Keyword | CPC | PCC | Volume | Score |
---|---|---|---|---|
theory about cyber security | 1.17 | 0.4 | 416 | 34 |
game theory cyber security | 1.32 | 0.5 | 6599 | 7 |
number theory in cyber security | 1.77 | 0.1 | 8097 | 21 |
graph theory in cyber security | 0.74 | 0.5 | 7421 | 24 |
game theory for cyber security and privacy | 0.76 | 0.8 | 8851 | 82 |
game theory and cyber security | 0.6 | 0.8 | 4015 | 38 |
protection motivation theory cyber security | 1.17 | 0.9 | 1592 | 54 |
game theory in cyber security defence | 1.52 | 0.2 | 1382 | 43 |
what is game theory in cybersecurity | 1.47 | 0.9 | 5508 | 48 |
game theory for network security | 1.88 | 0.1 | 1646 | 95 |
decision and game theory for security | 0.68 | 0.1 | 1386 | 59 |
game theory meets network security and privac | 1.38 | 0.8 | 4262 | 50 |
cyber security and game design | 0.57 | 0.5 | 8334 | 58 |
game theory security breach | 0.7 | 0.5 | 3560 | 3 |
cyber security theory pdf | 0.57 | 0.5 | 4583 | 25 |
video game cyber security | 0.13 | 0.3 | 9196 | 32 |
game theory for mobile location privacy | 1.34 | 1 | 1260 | 10 |