|
Issue |
Title |
|
Vol 23, No 1 (2017) |
系統化量測Android軟體檢測覆蓋率之方法設計與實作 |
Abstract
|
林仲儀 , 邱敬翔 , 黃俊穎 |
|
Vol 24, No 2 (2018) |
結合軟體工程方法與風險評估機制建構資安威脅模型:以物聯網架構下之智慧電網應用為例 |
Abstract
|
Yu-Tso Chen, Chuang-Chiao Huang, James Wu |
|
Vol 25, No 2 (2019) |
網路勒索病毒的特徵分析與知識本體模型建構 |
Abstract
|
Hsiao-Chung Lin, Ping Wang, Wei-Qian Hong |
|
Vol 24, No 4 (2018) |
網路攻防技術-資訊安全滲透測試技術 |
Abstract
|
Kai Chain, Jiin-Chiou Cheng, Wen-Chung Kuo |
|
Vol 20, No 1 (2014) |
美國能源資料開放運用之資訊安全與隱私權議題分析 |
Abstract
|
蔡博坤 |
|
Vol 25, No 4 (2019) |
DBL: Deniable Blockchain Ledger |
Abstract
|
Hsuan-Hao Chen, Po-Wen Chi |
|
Vol 27, No 3 (2021) |
Decentralized data encryption trading platform with enhanced privacy |
Abstract
|
Yi-Hsuan Li, Raylin Tso |
|
Vol 27, No 4 (2021) |
Deep Learning based Wireless Radio Identification Architecture for Edge Computing |
Abstract
|
Li-En Chang, Chi-Yuan Chen, Hsin-Hung Cho |
|
Vol 26, No 3 (2020) |
Demonstration of Privacy Stealing Attack via Smart Speakers |
Abstract
|
Jian-Xian Li, Pei-Jing Sun, Jieh-Chian Wu |
|
Vol 30, No 4 (2024) |
Design a Secure Post-Quantum Cryptography-Based Medical Information System |
Abstract
PDF
|
Kuo-Yu Tsai, Tzu-Wei Lin, Jie-Rong You, Wen-Xin Lin |
|
Vol 27, No 1 (2021) |
Design and Development of Multi-Pattern Matching Rules for Detecting Cryptocurrency Mining in Packet Inspection |
Abstract
|
Pang-Wei Tsai |
|
Vol 30, No 4 (2024) |
Design and Implementation of Open-Source Cybersecurity Monitoring System Using AI: A Case Study at a University in Central Taiwan |
Abstract
PDF
|
Tzu-Wei Lin, Kuo-Yu Tsai, Chung-Wei Kuo, Wen-Xin Lin, Pin-Chen Li, Wei-Chen Liang, Chien-Yun Huang, Zhi-Jia Fan, Xuan-Ting Chen, Fu-Guei Wang |
|
Vol 27, No 4 (2021) |
Detection and Notification of Rogue BS Attack in 4G LTE Non-Public Networks |
Abstract
|
Bing-Kai Hong, Siao-Shan He, Yu-Xiang Lin, Jun-Hong Huang, Shin-Ming Cheng |
|
Vol 30, No 1 (2024) |
Development of a Security Experimental Platform and Simulated Attack Detection for In-Vehicle Networks |
Abstract
|
Ping Wang, Jia-Hong Chen |
|
Vol 30, No 4 (2024) |
Digital Bionics and Heritage: Achieving Text Usage Habit Replication through Semantic Recognition Technology and Large Language Models |
Abstract
PDF
|
Hao-Jiun Hsu, Wei-Che Huang, Ping-Yu Chen, Kai-Cheng Yang, Wen-Yan Dai, Jheng-Jia Huang |
|
Vol 26, No 2 (2020) |
Efficient schemes with diverse of a pair of circulant matrices for AES MixColumns-InvMixcolumns transformation |
Abstract
|
Jeng-Jung Wang, Yan-Haw Chen, Guan-Hsiung Liaw, Jack Chang, Cheng-Chih Lee |
|
Vol 30, No 3 (2024) |
Enhancement and Implementation of Encryption Key Protection Mechanisms in Smart Applications of IoT Systems |
Abstract
|
Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu |
|
Vol 22, No 4 (2016) |
Enhancement of "Secure user authentication scheme for wireless healthcare sensor networks" |
Abstract
|
Jung-San Lee, Ya-Han Kang |
|
Vol 26, No 4 (2020) |
Evaluation of Information and Industry Security Risk Management Methodology |
Abstract
|
Yu-Chih Wei, Yi-Shng Wu, Ya-Chi Chu |
|
Vol 22, No 3 (2016) |
運用Android仿真器做為數位犯罪工具之研究 |
Abstract
|
Szu-Yuan Teng, Yu-Li Lin |
|
Vol 22, No 2 (2016) |
運用群聚交集特性為基礎之影像驗證技術 |
Abstract
|
Wen-Chuan Wu, Huai-Fan Hsu |
|
Vol 23, No 3 (2017) |
道路交通事故之行動裝置OSINT工具鑑識研究 |
Abstract
|
Chang-Yueh Ho, Cheng-Ta Huang, Shiuh-Jeng WANG |
|
Vol 21, No 2 (2015) |
適用於Android應用程式的隱私風險評估機制 |
Abstract
|
Kuo-Hui Yeh, Ren-Zong Kuo, Hao-Xiang Liao, Fang-Jie Yang, Ping-Hsien Lin, Tzu-Chun Lin |
|
Vol 21, No 2 (2015) |
適用於網路入侵偵測不平衡資料之階層式多重分類器 |
Abstract
|
張智傑 , 王勝德 |
|
Vol 21, No 4 (2015) |
適用於IoT之輕量化鑑別機制 |
Abstract
|
蔡國裕 |
|
76 - 100 of 304 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |