| Issue | Title | |
| Vol 25, No 1 (2019) | 107 年度執行資訊安全領域相關研究摘要 | Details |
| Chi-Yuan Chen | ||
| Vol 26, No 1 (2020) | 108 年度執行資訊安全領域相關研究摘要 | Details |
| Chi-Yuan Chen | ||
| Vol 29, No 1 (2023) | A Block-chain based Coupon Protocol with Online Evaluations and Bonus Rewards | Abstract |
| Xiu-Rong Lin, Sue-Chen Hsueh, Jia-He Zeng | ||
| Vol 27, No 2 (2021) | A Lightweight mutual authentication based on Attribute-based Encryption | Abstract |
| I-Te Chen, Yin-Tung Chen, Jer-Min Tsai | ||
| Vol 31, No 2 (2025) | A Machine Learning-Based Network Intrusion Detection System for Apache Weblogs Using the Random Forest Algorithm | Abstract PDF |
| PIN-RONG CHEN, HAO-YU WENG, CHENG-TA HUANG | ||
| Vol 24, No 1 (2018) | A Novel VENOM Attack Identification Mechanism in Cloud Virtualization Environment | Abstract |
| Cheick Abdoul-Kader, Shih-Hao Chang | ||
| Vol 28, No 3 (2022) | A Preliminary Study on Non-Fungible Tokens - Mechanisms and Markets | Abstract |
| Rui-Zhong Zheng, Ming-Hung Wang | ||
| Vol 27, No 4 (2021) | A Secure Blockchain-SIM Architecture for Mobile | Abstract |
| Jia-Xsuan Lee, Chi-Yuan Chen | ||
| Vol 30, No 2 (2024) | A study on the use of the new COTS device to implement a small-scale fraud attack by merchants | Abstract |
| Ching-Huang Lin, Ta-Wei Tseng, De-Cian Li | ||
| Vol 30, No 1 (2024) | Active defense framework for malicious attacks | Abstract |
| Eric Hsieh, Kuo-Chun Tseng | ||
| Vol 31, No 3 (2025) | AI-Based Construction of APT Hacker Family Attack Intelligence Topology and Risk Assessment Framework: A Case Study of Active Directory Server Attacks | Abstract PDF |
| Jen-Fu Wang, Pin-Han Chen, Ssu-Yu Chen, Shu-Ching Lu, Jui-Ting Hsu, Pin-Chia Chen, Te-En We | ||
| Vol 28, No 1 (2022) | AI-based safety tips wearables | Abstract |
| Chien-Hung Wu, Hsin-Te Wu | ||
| Vol 26, No 4 (2020) | An Effective Hyperparameter Selection for Deep Learning Algorithm in Intrusion Detection System | Abstract |
| Wei-Yan Chang, Yi-Lin Chen, Huang Chen, Chun-Wei Tsai | ||
| Vol 23, No 4 (2017) | An Energy Conservation Authentication Scheme in Wireless Body Area Network | Abstract |
| Chin-Chen Chang, Jung-San Lee, Jia-Shang Wu | ||
| Vol 29, No 3 (2023) | An Overview of 5G Technology Evolution with Cases on Drone, Smart Healthcare and Smart City | Abstract |
| Rai Manu, Chit-Jie Chew, Ying-Chin Chen, Yun-Yi Fan, Jung-San Lee | ||
| Vol 28, No 3 (2022) | An RFID Ownership Transfer Protocol based on multiple owners and different weights | Abstract |
| Jia-Ning Luo, MingHour Yang, Shu-Yu Hsu | ||
| Vol 29, No 1 (2023) | Analysis and Improvements of Real-Time Phishing Resilience for Two-Factor Authentication Apps Based on One-Time Passwords | Abstract |
| Xing-Min Wu, Wei-Chi Ku, Chuan-Hsin Yu | ||
| Vol 30, No 3 (2024) | Analysis and Mitigation Strategies for Prompt Injection Attacks | Abstract |
| Kun-Ji Li, Sheng-Shan Chen, Chin-Yu Sun | ||
| Vol 27, No 2 (2021) | Analysis and Solution of Exploiting Vulnerabilities of Smart Contracts in Decentralized Financial Applications | Abstract |
| Wan-Shiuan Hsu, Iuon-Chang Lin | ||
| Vol 31, No 3 (2025) | Analysis of Deep Learning-Based Side-Channel Attacks on the Post-Quantum Cryptography Algorithm ML-KEM on Embedded Devices | Abstract PDF |
| Chung-Wei Kuo, Yu-Yi Hong, heng-hao Zhuang, Jia-Ruei Liu | ||
| Vol 21, No 2 (2015) | Androbug: Android應用程序之安全漏洞分析系統 | Abstract |
| 林禹成() , 歐捷登() , 孫宏民() | ||
| Vol 21, No 2 (2015) | AppBeach: A Static Behavior Checker for iOS Mobile Applications | Abstract |
| Fang Yu, Steven Tai, Tang-Wei Shao, Wei-Ren Wang | ||
| Vol 31, No 2 (2025) | Automated Cybersecurity Detection Framework Based on Model Context Protocol and Large Language Models | Abstract PDF |
| Wei-Jie Chen, Yi-Ting Liao, Sih-Cin Huang, Ming-Hung Wang | ||
| Vol 28, No 2 (2022) | Automatic Android Malware Detection Rule Generation based on Quark Engine | Abstract |
| Yu-Shiang Dang, Kun-Yu Chen, Sheng-Feng Lu | ||
| Vol 31, No 1 (2025) | Bitcoin Security in the Quantum Era: Risks, Challenges, and Solutions | Abstract |
| Yun-Hsin Chuang | ||
| 1 - 25 of 316 Items | 1 2 3 4 5 6 7 8 9 10 > >> | |