|
Issue |
Title |
|
Vol 20, No 3 (2014) |
資安監控巨量資料分析-以G-SOC建置為例 |
Abstract
|
高天助 , 劉培文 , 趙偉傑 , 沈裕翔 , 劉上菱 , 李兆文 , 李國禎 , 毛敬豪 , 朱宇豐 |
|
Vol 20, No 2 (2014) |
黑暗首爾(Dark Seoul)資訊安全事故(2013-03-20)及其防禦方法初論 |
Abstract
|
樊國楨 , 韓宜蓁 , 季祥 |
|
Vol 25, No 4 (2019) |
Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments |
Abstract
|
Hsin-Nan Kuo, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang, Chun-I Fan |
|
Vol 28, No 4 (2022) |
Federal Anonymous Identity Management for 5G-Based Smart Ambulance based on Chebyshev Chaotic Maps |
Abstract
|
Tzu-Wei Lin |
|
Vol 29, No 4 (2023) |
Implementation and Analysis of Side-Channel Attack Mitigation Based on Autoencoder |
Abstract
|
Chung-Wei Kuo, Kuo-Yu Tsai, Wei-Ming Weng, Chun-Chang Lin, Yu-Yi Hong, Guan-Lin Wang |
|
Vol 29, No 2 (2023) |
Implementation of Base Station Identity Authentication using BBS Signatures |
Abstract
|
Pei-Jing Sun, Jieh-Chian Wu |
|
Vol 30, No 4 (2024) |
Improving Industrial Control System Security with Smart Contract Technology |
Abstract
PDF
|
YingCheng Wu, I-Hsien Liu, Jung-Shian Li |
|
Vol 23, No 1 (2017) |
Increasing bandwidth in Tor paths with multiple inter-relay connections |
Abstract
|
Te-Yu Liu, Po-Ching Lin |
|
Vol 29, No 3 (2023) |
Integrated Network Intrusion Detection and Alarm System based on Convolutional Neural Networks and Feature Mechanisms |
Abstract
|
Cheng-Ta Huang, Chia-Hsuan Lee, Hao-Yu Wang, Wei-Jen Wang |
|
Vol 25, No 2 (2019) |
Internet of Things and 5G Solutions for development of Smart Cities and Connected Systems |
Abstract
|
Coert G. Jordaan, Nazanin Malekian, Reza Malekian |
|
Vol 30, No 1 (2024) |
Intrusion Detection for Time-Sensitive Industrial Control Systems |
Abstract
|
Yun-Kuang Chou, Bo-Chao Cheng |
|
Vol 29, No 4 (2023) |
Intrusion Detection System Based on Transformer |
Abstract
|
Meng-Tien Tsai, Kuo-Chun Tseng |
|
Vol 21, No 4 (2015) |
ISMS與PIMS整合導入之研究-以國防部全球資訊網站系統為例 |
Abstract
|
孫天貴 , 左瑞麟 |
|
Vol 30, No 2 (2024) |
JAVA Web System Deserialization Vulnerability Detection Technology |
Abstract
|
Hung-Wei Chiang, Chao-Lung Chou |
|
Vol 23, No 3 (2017) |
LINE封包特徵分析預測使用者網路活動 |
Abstract
|
Jay-chang Chen |
|
Vol 26, No 3 (2020) |
Low-Rate Denial-of-Service detection based on Convolutional Neural Network |
Abstract
|
Min-Yan Tsai, Augustine Sii Ho Hann, Hsin-Hung Cho |
|
Vol 20, No 4 (2014) |
New Risk Analysis Method for Information System Security |
Abstract
|
Easter C. K. Huang, Chung-Jen Chin |
|
Vol 28, No 4 (2022) |
On Identifying Suspicious Accounts Using Anomaly Detection Technology |
Abstract
|
YAN-SIANG CHEN, CHU-HSING LIN, CHUN-MING LAI |
|
Vol 23, No 4 (2017) |
One Step toward IoT Authentication in Mobile Systems |
Abstract
|
HungYu Chienhor |
|
Vol 22, No 4 (2016) |
OTP隨機認證秘密基礎應用於行動網管 |
Abstract
|
邱泰源 , 方仁威 , 劉興華 |
|
Vol 23, No 3 (2017) |
OTT機上盒侵權與資安數位鑑識架構初探 |
Abstract
|
Chuang Ming-Shiung, Lin Chun-Hsien |
|
Vol 27, No 1 (2021) |
Overview of Cyberattacks Against Radio Access Networks in Long-term Evolution Mobile Networks and Defense Solutions |
Abstract
|
Ruei-Hau Hsu, Onkar Mumbrekar |
|
Vol 25, No 1 (2019) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 25, No 2 (2019) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
Vol 25, No 3 (2019) |
Preface |
Abstract
|
Chi-Yuan Chen |
|
126 - 150 of 304 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |