| Issue | Title | |
| Vol 30, No 2 (2024) | Cover | Details |
| Chi-Yuan Chen | ||
| Vol 30, No 3 (2024) | Cover | Details |
| Chi-Yuan Chen | ||
| Vol 20, No 4 (2014) | CTF攻防競賽平台設計 | Abstract |
| 趙正宇 , 李倫銓 | ||
| Vol 27, No 3 (2021) | Current Developments and Future Challenge of Governmental Data Center | Abstract |
| Chang-Po Chiang, Shiuh-Jeng Wang | ||
| Vol 23, No 2 (2017) | 物聯網安全通訊標準與應用 | Abstract |
| Chi-Hua Chen, Bon-Yeh Lin, Chin-Song Wu, Chih-Yen Hsiao | ||
| Vol 21, No 3 (2015) | 相位調制技術在數位影像浮水印之應用 | Abstract |
| 陳文淵 | ||
| Vol 23, No 1 (2017) | 系統化量測Android軟體檢測覆蓋率之方法設計與實作 | Abstract |
| 林仲儀 , 邱敬翔 , 黃俊穎 | ||
| Vol 24, No 2 (2018) | 結合軟體工程方法與風險評估機制建構資安威脅模型:以物聯網架構下之智慧電網應用為例 | Abstract |
| Yu-Tso Chen, Chuang-Chiao Huang, James Wu | ||
| Vol 25, No 2 (2019) | 網路勒索病毒的特徵分析與知識本體模型建構 | Abstract |
| Hsiao-Chung Lin, Ping Wang, Wei-Qian Hong | ||
| Vol 24, No 4 (2018) | 網路攻防技術-資訊安全滲透測試技術 | Abstract |
| Kai Chain, Jiin-Chiou Cheng, Wen-Chung Kuo | ||
| Vol 20, No 1 (2014) | 美國能源資料開放運用之資訊安全與隱私權議題分析 | Abstract |
| 蔡博坤 | ||
| Vol 25, No 4 (2019) | DBL: Deniable Blockchain Ledger | Abstract |
| Hsuan-Hao Chen, Po-Wen Chi | ||
| Vol 27, No 3 (2021) | Decentralized data encryption trading platform with enhanced privacy | Abstract |
| Yi-Hsuan Li, Raylin Tso | ||
| Vol 27, No 4 (2021) | Deep Learning based Wireless Radio Identification Architecture for Edge Computing | Abstract |
| Li-En Chang, Chi-Yuan Chen, Hsin-Hung Cho | ||
| Vol 26, No 3 (2020) | Demonstration of Privacy Stealing Attack via Smart Speakers | Abstract |
| Jian-Xian Li, Pei-Jing Sun, Jieh-Chian Wu | ||
| Vol 31, No 2 (2025) | Deployment of the AI-Driven HoneyDroneSystem for Modern Battlefield and Cybersecurity Defense | Abstract PDF |
| Shang-En Tsai, Meng-Hing Aun | ||
| Vol 30, No 4 (2024) | Design a Secure Post-Quantum Cryptography-Based Medical Information System | Abstract PDF |
| Kuo-Yu Tsai, Tzu-Wei Lin, Jie-Rong You, Wen-Xin Lin | ||
| Vol 27, No 1 (2021) | Design and Development of Multi-Pattern Matching Rules for Detecting Cryptocurrency Mining in Packet Inspection | Abstract |
| Pang-Wei Tsai | ||
| Vol 30, No 4 (2024) | Design and Implementation of Open-Source Cybersecurity Monitoring System Using AI: A Case Study at a University in Central Taiwan | Abstract PDF |
| Tzu-Wei Lin, Kuo-Yu Tsai, Chung-Wei Kuo, Wen-Xin Lin, Pin-Chen Li, Wei-Chen Liang, Chien-Yun Huang, Zhi-Jia Fan, Xuan-Ting Chen, Fu-Guei Wang | ||
| Vol 27, No 4 (2021) | Detection and Notification of Rogue BS Attack in 4G LTE Non-Public Networks | Abstract |
| Bing-Kai Hong, Siao-Shan He, Yu-Xiang Lin, Jun-Hong Huang, Shin-Ming Cheng | ||
| Vol 30, No 1 (2024) | Development of a Security Experimental Platform and Simulated Attack Detection for In-Vehicle Networks | Abstract |
| Ping Wang, Jia-Hong Chen | ||
| Vol 30, No 4 (2024) | Digital Bionics and Heritage: Achieving Text Usage Habit Replication through Semantic Recognition Technology and Large Language Models | Abstract PDF |
| Hao-Jiun Hsu, Wei-Che Huang, Ping-Yu Chen, Kai-Cheng Yang, Wen-Yan Dai, Jheng-Jia Huang | ||
| Vol 26, No 2 (2020) | Efficient schemes with diverse of a pair of circulant matrices for AES MixColumns-InvMixcolumns transformation | Abstract |
| Jeng-Jung Wang, Yan-Haw Chen, Guan-Hsiung Liaw, Jack Chang, Cheng-Chih Lee | ||
| Vol 30, No 3 (2024) | Enhancement and Implementation of Encryption Key Protection Mechanisms in Smart Applications of IoT Systems | Abstract |
| Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu | ||
| Vol 22, No 4 (2016) | Enhancement of "Secure user authentication scheme for wireless healthcare sensor networks" | Abstract |
| Jung-San Lee, Ya-Han Kang | ||
| 76 - 100 of 316 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |