Browse Title Index


 
Issue Title
 
Vol 20, No 3 (2014) 資安監控巨量資料分析-以G-SOC建置為例 Abstract
高天助 , 劉培文 , 趙偉傑 , 沈裕翔 , 劉上菱 , 李兆文 , 李國禎 , 毛敬豪 , 朱宇豐
 
Vol 20, No 2 (2014) 黑暗首爾(Dark Seoul)資訊安全事故(2013-03-20)及其防禦方法初論 Abstract
樊國楨 , 韓宜蓁 , 季祥
 
Vol 25, No 4 (2019) Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments Abstract
Hsin-Nan Kuo, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang, Chun-I Fan
 
Vol 28, No 4 (2022) Federal Anonymous Identity Management for 5G-Based Smart Ambulance based on Chebyshev Chaotic Maps Abstract
Tzu-Wei Lin
 
Vol 29, No 4 (2023) Implementation and Analysis of Side-Channel Attack Mitigation Based on Autoencoder Abstract
Chung-Wei Kuo, Kuo-Yu Tsai, Wei-Ming Weng, Chun-Chang Lin, Yu-Yi Hong, Guan-Lin Wang
 
Vol 29, No 2 (2023) Implementation of Base Station Identity Authentication using BBS Signatures Abstract
Pei-Jing Sun, Jieh-Chian Wu
 
Vol 30, No 4 (2024) Improving Industrial Control System Security with Smart Contract Technology Abstract   PDF
YingCheng Wu, I-Hsien Liu, Jung-Shian Li
 
Vol 23, No 1 (2017) Increasing bandwidth in Tor paths with multiple inter-relay connections Abstract
Te-Yu Liu, Po-Ching Lin
 
Vol 29, No 3 (2023) Integrated Network Intrusion Detection and Alarm System based on Convolutional Neural Networks and Feature Mechanisms Abstract
Cheng-Ta Huang, Chia-Hsuan Lee, Hao-Yu Wang, Wei-Jen Wang
 
Vol 25, No 2 (2019) Internet of Things and 5G Solutions for development of Smart Cities and Connected Systems Abstract
Coert G. Jordaan, Nazanin Malekian, Reza Malekian
 
Vol 30, No 1 (2024) Intrusion Detection for Time-Sensitive Industrial Control Systems Abstract
Yun-Kuang Chou, Bo-Chao Cheng
 
Vol 29, No 4 (2023) Intrusion Detection System Based on Transformer Abstract
Meng-Tien Tsai, Kuo-Chun Tseng
 
Vol 21, No 4 (2015) ISMS與PIMS整合導入之研究-以國防部全球資訊網站系統為例 Abstract
孫天貴 , 左瑞麟
 
Vol 30, No 2 (2024) JAVA Web System Deserialization Vulnerability Detection Technology Abstract
Hung-Wei Chiang, Chao-Lung Chou
 
Vol 23, No 3 (2017) LINE封包特徵分析預測使用者網路活動 Abstract
Jay-chang Chen
 
Vol 26, No 3 (2020) Low-Rate Denial-of-Service detection based on Convolutional Neural Network Abstract
Min-Yan Tsai, Augustine Sii Ho Hann, Hsin-Hung Cho
 
Vol 20, No 4 (2014) New Risk Analysis Method for Information System Security Abstract
Easter C. K. Huang, Chung-Jen Chin
 
Vol 28, No 4 (2022) On Identifying Suspicious Accounts Using Anomaly Detection Technology Abstract
YAN-SIANG CHEN, CHU-HSING LIN, CHUN-MING LAI
 
Vol 23, No 4 (2017) One Step toward IoT Authentication in Mobile Systems Abstract
HungYu Chienhor
 
Vol 22, No 4 (2016) OTP隨機認證秘密基礎應用於行動網管 Abstract
邱泰源 , 方仁威 , 劉興華
 
Vol 23, No 3 (2017) OTT機上盒侵權與資安數位鑑識架構初探 Abstract
Chuang Ming-Shiung, Lin Chun-Hsien
 
Vol 27, No 1 (2021) Overview of Cyberattacks Against Radio Access Networks in Long-term Evolution Mobile Networks and Defense Solutions Abstract
Ruei-Hau Hsu, Onkar Mumbrekar
 
Vol 25, No 1 (2019) Preface Abstract
Chi-Yuan Chen
 
Vol 25, No 2 (2019) Preface Abstract
Chi-Yuan Chen
 
Vol 25, No 3 (2019) Preface Abstract
Chi-Yuan Chen
 
126 - 150 of 304 Items << < 1 2 3 4 5 6 7 8 9 10 > >>