|
???tair.name??? >
???browser.page.title.author???
|
"hsu chun hsiao"???jsp.browse.items-by-author.description???
Showing items 26-50 of 57 (3 Page(s) Totally) << < 1 2 3 > >> View [10|25|50] records per page
臺大學術典藏 |
2020-05-04T07:56:30Z |
An Investigation of Cyber Autonomy on Government Websites.
|
HSU-CHUN HSIAO; Jeng, Wei; Kim, Tiffany Hyun-Jin; Ku, Yu-Ming; Chang, Chun-Ming; Chen, Hung-Fang; Chen, Yu-Jen; Wang, Chun-Wen; Hsiao, Hsu-Chun; Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Ku, Yu-Ming;Chang, Chun-Ming;Chen, Hung-Fang;Chen, Yu-Jen;Wang, Chun-Wen;Jeng, Wei |
臺大學術典藏 |
2020-05-04T07:56:30Z |
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems
|
Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:30Z |
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
|
Wu, Hao; Hsiao, Hsu-Chun; Asoni, Daniele Enrico; Scherrer, Simon; Perrig, Adrian; Hu, Yih-Chun; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
Securing data planes in software-defined networks
|
Chao, T.-W.;Ke, Y.-M.;Chen, B.-H.;Chen, J.-L.;Hsieh, C.J.;Lee, S.-C.;Hsiao, H.-C.; Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
Decapitation via digital epidemics: A bio-inspired transmissive attack
|
Chen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks
|
Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:29Z |
A secure authorization system in PHR based on CP-ABE
|
Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
CLEF: Limiting the damage caused by large flows in the internet core
|
Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
Traffic-aware patching for cyber security in mobile IoT
|
Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
SandUSB: An installation-free sandbox for USB peripherals
|
Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:28Z |
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes
|
Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
GroupIt: Lightweight Group Key Management for Dynamic IoT Environments
|
Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
SDNProbe: Lightweight fault localization in the error-prone environment
|
Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
DAMUP: Practical and privacy-aware cloud-based DDoS mitigation
|
Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:27Z |
A generic web application testing and attack data generation method
|
Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:26Z |
SafeChain: Securing Trigger-Action Programming from Attack Chains
|
Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:26Z |
An investigation of cyber autonomy on government websites
|
Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F. |
臺大學術典藏 |
2020-05-04T07:56:26Z |
On the Feasibility of Rerouting-Based DDoS Defenses
|
Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO |
臺大學術典藏 |
2020-05-04T07:56:26Z |
Dynamic Path Pruning in Symbolic Execution
|
Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K. |
臺大學術典藏 |
2018-09-10T14:53:25Z |
Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region
|
Wu, H.;Hsiao, H.-C.;Hu, Y.-C.; Wu, H.; Hsiao, H.-C.; Hu, Y.-C.; HSU-CHUN HSIAO |
臺大學術典藏 |
2018-09-10T09:43:21Z |
STRIDE: Sanctuary trail - Refuge from internet DDoS entrapment
|
Hsiao, H.-C.;Kim, T.H.-J.;Yoo, S.;Zhang, X.;Lee, S.B.;Gligor, V.;Perrig, A.; Hsiao, H.-C.; Kim, T.H.-J.; Yoo, S.; Zhang, X.; Lee, S.B.; Gligor, V.; Perrig, A.; HSU-CHUN HSIAO |
臺大學術典藏 |
2018-09-10T09:43:21Z |
Policy-based secure deletion
|
Cachin, C.;Haralambiev, K.;Hsiao, H.-C.;Sorniotti, A.; Cachin, C.; Haralambiev, K.; Hsiao, H.-C.; Sorniotti, A.; HSU-CHUN HSIAO |
臺大學術典藏 |
2018-09-10T09:17:17Z |
LAP: Lightweight anonymity and privacy
|
Hsiao, H.-C.; Kim, T.H.-J.; Perrig, A.; Yamada, A.; Nelson, S.C.; Gruteser, M.; Meng, W.; HSU-CHUN HSIAO |
臺大學術典藏 |
2018-09-10T08:34:51Z |
Efficient and secure threshold-based event validation for VANETs
|
Hsiao, H.-C.;Studer, A.;Dubey, R.;Shi, E.;Perrig, A.; Hsiao, H.-C.; Studer, A.; Dubey, R.; Shi, E.; Perrig, A.; HSU-CHUN HSIAO |
臺大學術典藏 |
2018-09-10T08:34:50Z |
SCION: Scalability, control, and isolation on next-generation networks
|
Zhang, X.;Hsiao, H.-C.;Hasker, G.;Chan, H.;Perrig, A.;ersen, D.G.; Zhang, X.; Hsiao, H.-C.; Hasker, G.; Chan, H.; Perrig, A.; ersen, D.G.; HSU-CHUN HSIAO |
Showing items 26-50 of 57 (3 Page(s) Totally) << < 1 2 3 > >> View [10|25|50] records per page
|