Browse Title Index


 
Issue Title
 
Vol 23, No 1 (2017) 系統化量測Android軟體檢測覆蓋率之方法設計與實作 Abstract
林仲儀 , 邱敬翔 , 黃俊穎
 
Vol 24, No 2 (2018) 結合軟體工程方法與風險評估機制建構資安威脅模型:以物聯網架構下之智慧電網應用為例 Abstract
Yu-Tso Chen, Chuang-Chiao Huang, James Wu
 
Vol 25, No 2 (2019) 網路勒索病毒的特徵分析與知識本體模型建構 Abstract
Hsiao-Chung Lin, Ping Wang, Wei-Qian Hong
 
Vol 24, No 4 (2018) 網路攻防技術-資訊安全滲透測試技術 Abstract
Kai Chain, Jiin-Chiou Cheng, Wen-Chung Kuo
 
Vol 20, No 1 (2014) 美國能源資料開放運用之資訊安全與隱私權議題分析 Abstract
蔡博坤
 
Vol 25, No 4 (2019) DBL: Deniable Blockchain Ledger Abstract
Hsuan-Hao Chen, Po-Wen Chi
 
Vol 27, No 3 (2021) Decentralized data encryption trading platform with enhanced privacy Abstract
Yi-Hsuan Li, Raylin Tso
 
Vol 27, No 4 (2021) Deep Learning based Wireless Radio Identification Architecture for Edge Computing Abstract
Li-En Chang, Chi-Yuan Chen, Hsin-Hung Cho
 
Vol 26, No 3 (2020) Demonstration of Privacy Stealing Attack via Smart Speakers Abstract
Jian-Xian Li, Pei-Jing Sun, Jieh-Chian Wu
 
Vol 30, No 4 (2024) Design a Secure Post-Quantum Cryptography-Based Medical Information System Abstract   PDF
Kuo-Yu Tsai, Tzu-Wei Lin, Jie-Rong You, Wen-Xin Lin
 
Vol 27, No 1 (2021) Design and Development of Multi-Pattern Matching Rules for Detecting Cryptocurrency Mining in Packet Inspection Abstract
Pang-Wei Tsai
 
Vol 30, No 4 (2024) Design and Implementation of Open-Source Cybersecurity Monitoring System Using AI: A Case Study at a University in Central Taiwan Abstract   PDF
Tzu-Wei Lin, Kuo-Yu Tsai, Chung-Wei Kuo, Wen-Xin Lin, Pin-Chen Li, Wei-Chen Liang, Chien-Yun Huang, Zhi-Jia Fan, Xuan-Ting Chen, Fu-Guei Wang
 
Vol 27, No 4 (2021) Detection and Notification of Rogue BS Attack in 4G LTE Non-Public Networks Abstract
Bing-Kai Hong, Siao-Shan He, Yu-Xiang Lin, Jun-Hong Huang, Shin-Ming Cheng
 
Vol 30, No 1 (2024) Development of a Security Experimental Platform and Simulated Attack Detection for In-Vehicle Networks Abstract
Ping Wang, Jia-Hong Chen
 
Vol 30, No 4 (2024) Digital Bionics and Heritage: Achieving Text Usage Habit Replication through Semantic Recognition Technology and Large Language Models Abstract   PDF
Hao-Jiun Hsu, Wei-Che Huang, Ping-Yu Chen, Kai-Cheng Yang, Wen-Yan Dai, Jheng-Jia Huang
 
Vol 26, No 2 (2020) Efficient schemes with diverse of a pair of circulant matrices for AES MixColumns-InvMixcolumns transformation Abstract
Jeng-Jung Wang, Yan-Haw Chen, Guan-Hsiung Liaw, Jack Chang, Cheng-Chih Lee
 
Vol 30, No 3 (2024) Enhancement and Implementation of Encryption Key Protection Mechanisms in Smart Applications of IoT Systems Abstract
Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu
 
Vol 22, No 4 (2016) Enhancement of "Secure user authentication scheme for wireless healthcare sensor networks" Abstract
Jung-San Lee, Ya-Han Kang
 
Vol 26, No 4 (2020) Evaluation of Information and Industry Security Risk Management Methodology Abstract
Yu-Chih Wei, Yi-Shng Wu, Ya-Chi Chu
 
Vol 22, No 3 (2016) 運用Android仿真器做為數位犯罪工具之研究 Abstract
Szu-Yuan Teng, Yu-Li Lin
 
Vol 22, No 2 (2016) 運用群聚交集特性為基礎之影像驗證技術 Abstract
Wen-Chuan Wu, Huai-Fan Hsu
 
Vol 23, No 3 (2017) 道路交通事故之行動裝置OSINT工具鑑識研究 Abstract
Chang-Yueh Ho, Cheng-Ta Huang, Shiuh-Jeng WANG
 
Vol 21, No 2 (2015) 適用於Android應用程式的隱私風險評估機制 Abstract
Kuo-Hui Yeh, Ren-Zong Kuo, Hao-Xiang Liao, Fang-Jie Yang, Ping-Hsien Lin, Tzu-Chun Lin
 
Vol 21, No 2 (2015) 適用於網路入侵偵測不平衡資料之階層式多重分類器 Abstract
張智傑 , 王勝德
 
Vol 21, No 4 (2015) 適用於IoT之輕量化鑑別機制 Abstract
蔡國裕
 
76 - 100 of 304 Items << < 1 2 3 4 5 6 7 8 9 10 > >>