| Issue | Title | |
| Vol 25, No 3 (2019) | 資訊安全相關專利公告 | Details |
| Chi-Yuan Chen | ||
| Vol 27, No 3 (2021) | 資訊安全相關專利公告 | Details |
| Chi-Yuan Chen | ||
| Vol 28, No 3 (2022) | 資訊安全相關專利公告 | Details |
| Chi-Yuan Chen | ||
| Vol 29, No 3 (2023) | 資訊安全相關專利公告 | Details |
| Chi-Yuan Chen | ||
| Vol 30, No 3 (2024) | 資訊安全相關專利公告 | Details |
| Chi-Yuan Chen | ||
| Vol 21, No 1 (2015) | 資訊安全管理系統稽核初論:根基於資安健診與標準化 | Abstract |
| 樊國楨 , 季祥 , 韓宜蓁 | ||
| Vol 24, No 4 (2018) | 資訊安全潛力人才深掘 | Abstract |
| Benjamin Tseng, Chi-Yuan Chen, Iuon-Chang Lin | ||
| Vol 20, No 3 (2014) | 資安監控巨量資料分析-以G-SOC建置為例 | Abstract |
| 高天助 , 劉培文 , 趙偉傑 , 沈裕翔 , 劉上菱 , 李兆文 , 李國禎 , 毛敬豪 , 朱宇豐 | ||
| Vol 20, No 2 (2014) | 黑暗首爾(Dark Seoul)資訊安全事故(2013-03-20)及其防禦方法初論 | Abstract |
| 樊國楨 , 韓宜蓁 , 季祥 | ||
| Vol 25, No 4 (2019) | Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments | Abstract |
| Hsin-Nan Kuo, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang, Chun-I Fan | ||
| Vol 28, No 4 (2022) | Federal Anonymous Identity Management for 5G-Based Smart Ambulance based on Chebyshev Chaotic Maps | Abstract |
| Tzu-Wei Lin | ||
| Vol 29, No 4 (2023) | Implementation and Analysis of Side-Channel Attack Mitigation Based on Autoencoder | Abstract |
| Chung-Wei Kuo, Kuo-Yu Tsai, Wei-Ming Weng, Chun-Chang Lin, Yu-Yi Hong, Guan-Lin Wang | ||
| Vol 29, No 2 (2023) | Implementation of Base Station Identity Authentication using BBS Signatures | Abstract |
| Pei-Jing Sun, Jieh-Chian Wu | ||
| Vol 30, No 4 (2024) | Improving Industrial Control System Security with Smart Contract Technology | Abstract PDF |
| YingCheng Wu, I-Hsien Liu, Jung-Shian Li | ||
| Vol 23, No 1 (2017) | Increasing bandwidth in Tor paths with multiple inter-relay connections | Abstract |
| Te-Yu Liu, Po-Ching Lin | ||
| Vol 29, No 3 (2023) | Integrated Network Intrusion Detection and Alarm System based on Convolutional Neural Networks and Feature Mechanisms | Abstract |
| Cheng-Ta Huang, Chia-Hsuan Lee, Hao-Yu Wang, Wei-Jen Wang | ||
| Vol 25, No 2 (2019) | Internet of Things and 5G Solutions for development of Smart Cities and Connected Systems | Abstract |
| Coert G. Jordaan, Nazanin Malekian, Reza Malekian | ||
| Vol 31, No 1 (2025) | Introduction to The ZTAID Model for Zero Trust Maturity Assessment (ZTMA) | Abstract |
| Isaac Yi-Yuan Lee, Shih Wei Liao, Duncan Tu, Allen Chang | ||
| Vol 30, No 1 (2024) | Intrusion Detection for Time-Sensitive Industrial Control Systems | Abstract |
| Yun-Kuang Chou, Bo-Chao Cheng | ||
| Vol 29, No 4 (2023) | Intrusion Detection System Based on Transformer | Abstract |
| Meng-Tien Tsai, Kuo-Chun Tseng | ||
| Vol 21, No 4 (2015) | ISMS與PIMS整合導入之研究-以國防部全球資訊網站系統為例 | Abstract |
| 孫天貴 , 左瑞麟 | ||
| Vol 30, No 2 (2024) | JAVA Web System Deserialization Vulnerability Detection Technology | Abstract |
| Hung-Wei Chiang, Chao-Lung Chou | ||
| Vol 23, No 3 (2017) | LINE封包特徵分析預測使用者網路活動 | Abstract |
| Jay-chang Chen | ||
| Vol 26, No 3 (2020) | Low-Rate Denial-of-Service detection based on Convolutional Neural Network | Abstract |
| Min-Yan Tsai, Augustine Sii Ho Hann, Hsin-Hung Cho | ||
| Vol 20, No 4 (2014) | New Risk Analysis Method for Information System Security | Abstract |
| Easter C. K. Huang, Chung-Jen Chin | ||
| 126 - 150 of 316 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |