|
Issue |
Title |
|
Vol 21, No 2 (2015) |
雲端應用程式資訊流動之動態污點傳播分析 |
Abstract
|
王平 , 林文暉 , 趙文傑 |
|
Vol 22, No 1 (2016) |
雲端服務模式數位證據之識別、蒐集、擷取、保全及驗證程序 |
Abstract
|
Sou-Chan Chen, Szu-Yaun Teng, You-Yen Wan, Wei-Chi Chen |
|
Vol 20, No 1 (2014) |
雲計算網路虛擬化原理與實現 |
Abstract
|
毛文波 , 邊瑞鋒 , 李芳 |
|
Vol 23, No 3 (2017) |
行動裝置數位證據鑑識標準作業程序與案例驗證之探討-以行動鑑識工具UFED萃取數位證據為例 |
Abstract
|
林宜隆 , 方彥霏 |
|
Vol 24, No 4 (2018) |
行動裝置之兩階段身分認證機制 |
Abstract
|
Jia-Ning Luo |
|
Vol 22, No 2 (2016) |
行動媒體之機密資訊傳輸與共享機制 |
Abstract
|
Pei-Yu Lin, Wen-Shao Lan |
|
Vol 21, No 1 (2015) |
視覺密碼學綜述 |
Abstract
|
郭騰 , 劉峰 , 武傳坤 |
|
Vol 26, No 3 (2020) |
資訊安全相關專利公告 |
Details
|
Chi-Yuan Chen |
|
Vol 25, No 3 (2019) |
資訊安全相關專利公告 |
Details
|
Chi-Yuan Chen |
|
Vol 27, No 3 (2021) |
資訊安全相關專利公告 |
Details
|
Chi-Yuan Chen |
|
Vol 28, No 3 (2022) |
資訊安全相關專利公告 |
Details
|
Chi-Yuan Chen |
|
Vol 29, No 3 (2023) |
資訊安全相關專利公告 |
Details
|
Chi-Yuan Chen |
|
Vol 21, No 1 (2015) |
資訊安全管理系統稽核初論:根基於資安健診與標準化 |
Abstract
|
樊國楨 , 季祥 , 韓宜蓁 |
|
Vol 24, No 4 (2018) |
資訊安全潛力人才深掘 |
Abstract
|
Benjamin Tseng, Chi-Yuan Chen, Iuon-Chang Lin |
|
Vol 20, No 3 (2014) |
資安監控巨量資料分析-以G-SOC建置為例 |
Abstract
|
高天助 , 劉培文 , 趙偉傑 , 沈裕翔 , 劉上菱 , 李兆文 , 李國禎 , 毛敬豪 , 朱宇豐 |
|
Vol 20, No 2 (2014) |
黑暗首爾(Dark Seoul)資訊安全事故(2013-03-20)及其防禦方法初論 |
Abstract
|
樊國楨 , 韓宜蓁 , 季祥 |
|
Vol 25, No 4 (2019) |
Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments |
Abstract
|
Hsin-Nan Kuo, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang, Chun-I Fan |
|
Vol 28, No 4 (2022) |
Federal Anonymous Identity Management for 5G-Based Smart Ambulance based on Chebyshev Chaotic Maps |
Abstract
|
Tzu-Wei Lin |
|
Vol 29, No 4 (2023) |
Implementation and Analysis of Side-Channel Attack Mitigation Based on Autoencoder |
Abstract
|
Chung-Wei Kuo, Kuo-Yu Tsai, Wei-Ming Weng, Chun-Chang Lin, Yu-Yi Hong, Guan-Lin Wang |
|
Vol 29, No 2 (2023) |
Implementation of Base Station Identity Authentication using BBS Signatures |
Abstract
|
Pei-Jing Sun, Jieh-Chian Wu |
|
Vol 23, No 1 (2017) |
Increasing bandwidth in Tor paths with multiple inter-relay connections |
Abstract
|
Te-Yu Liu, Po-Ching Lin |
|
Vol 29, No 3 (2023) |
Integrated Network Intrusion Detection and Alarm System based on Convolutional Neural Networks and Feature Mechanisms |
Abstract
|
Cheng-Ta Huang, Chia-Hsuan Lee, Hao-Yu Wang, Wei-Jen Wang |
|
Vol 25, No 2 (2019) |
Internet of Things and 5G Solutions for development of Smart Cities and Connected Systems |
Abstract
|
Coert G. Jordaan, Nazanin Malekian, Reza Malekian |
|
Vol 30, No 1 (2024) |
Intrusion Detection for Time-Sensitive Industrial Control Systems |
Abstract
|
Yun-Kuang Chou, Bo-Chao Cheng |
|
Vol 29, No 4 (2023) |
Intrusion Detection System Based on Transformer |
Abstract
|
Meng-Tien Tsai, Kuo-Chun Tseng |
|
101 - 125 of 283 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |