國立交通大學 |
2020-07-01T05:20:36Z |
DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking
|
Lin, Chun-Han; Lee, Shan-Hsin; Huang, Hsiu-Chuan; Wang, Chi-Wei; Hsu, Chia-Wei; Shieh, ShiuhPyng |
國立交通大學 |
2019-05-02T00:26:49Z |
Finder: Automatic ICC Data Reconstruction for Long-Term Runtime Semantics
|
Hsu, Chia-Wei; Wei, Sheng-Ru; Shieh, Shiuhpyng |
國立交通大學 |
2019-04-02T06:04:50Z |
VMCloak: Toward a Stealthy in-VM Agent Execution
|
Wang, Chiawei; Shieh, Shiuhpyng |
國立交通大學 |
2018-08-21T05:54:31Z |
DROIT plus : Taint Tracking for Storage Access on Android
|
Hsu, Chia-Wei; Chang, Chia-Huei; Wang, Chi-Wei; Shieh, Shiuhpyng |
國立交通大學 |
2018-08-21T05:53:37Z |
Penetration Testing in the IoT Age
|
Chen, Chung-Kuan; Zhang, Zhi-Kai; Lee, Shan-Hsin; Shieh, Shiuhpyng |
國立交通大學 |
2018-01-24T07:41:41Z |
用於網路漏洞掃描器之選擇性進入點探查
|
洪偉達; 謝續平; Hong, Wei-Da; Shieh, Shiuhpyng |
國立交通大學 |
2018-01-24T07:41:38Z |
於命名資料網路之資料存取控制模型
|
卓政逸; 謝續平; Cho, Michael Cheng Yi; Shieh, Shiuhpyng |
國立交通大學 |
2017-04-21T06:55:20Z |
ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction
|
Wang, Chi-Wei; Wang, Chia-Wei; Shieh, Shiuhpyng |
國立交通大學 |
2017-04-21T06:49:34Z |
Tracing Mobile Attackers in Wireless Ad-Hoc Network
|
Yang, Ming Hour; Chiu, Chien-Si; Shieh, Shiuhpyng |
國立交通大學 |
2016-03-28T00:05:43Z |
IoT Security: Ongoing Challenges and Research Opportunities
|
Zhang, Zhi-Kai; Cho, Michael Cheng Yi; Wang, Chia-Wei; Hsu, Chia-Wei; Chen, Chong-Kuan; Shieh, Shiuhpyng |
國立交通大學 |
2015-12-04T07:03:12Z |
METHOD OF GENERATING IN-KERNEL HOOK POINT CANDIDATES TO DETECT ROOTKITS AND THE SYSTEM THEREOF
|
Wang Chi-wei; Chen Chong-kuan; Wang Chia-wei; Shieh Shiuhpyng |
國立交通大學 |
2015-11-26T01:02:35Z |
上下文相關之資料結構逆向工程
|
王偋; Wang, Ping; 謝續平; Shieh, Shiuhpyng |
國立交通大學 |
2015-07-21T11:21:02Z |
Can Malware Be Exterminated by Better Understanding Its Roots?
|
Cho, Michael Cheng Yi; Hsu, Chia-Wei; Shieh, Shiuhpyng; Wang, Chi-Wei |
國立交通大學 |
2015-07-21T08:28:36Z |
Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability
|
Lin, Jia-Chun; Shieh, Shiuhpyng; Hsu, Chia-Wei |
國立交通大學 |
2014-12-16T06:14:49Z |
METHOD FOR DETECTING A POSSIBILITY OF AN UNAUTHORIZED TRANSMISSION OF A SPECIFIC DATUM
|
Wang Chi-Wei; Shieh Shiuhpyng; Chang Chia-Huei |
國立交通大學 |
2014-12-12T02:43:48Z |
JSEMU: 提供動態調整分析政策之模擬架構
|
陳怡嫻; Chen, Yi-Hsien; 謝續平; Shieh, Shiuhpyng |
國立交通大學 |
2014-12-12T02:43:39Z |
ProbeBuilder - Automating Probe Construction in Virtual Machine Introspection through Uncovering Opaque Kernel Data Structures
|
王繼偉; Wang, Chi-Wei; 謝續平; Shieh, Shiuhpyng |
國立交通大學 |
2014-12-12T02:36:35Z |
分析Android儲存裝置存取之資料流動追蹤技術
|
張佳惠; Chang, Chia-Huei; 謝續平; Shieh, Shiuhpyng |
國立交通大學 |
2014-12-12T01:52:38Z |
基於內核函數呼叫模式之惡意程式種類辨認方法
|
劉芳瑜; 謝續平; Shieh, Shiuhpyng |
國立交通大學 |
2014-12-08T15:42:00Z |
Provable Secure AKA Scheme with Reliable Key Delegation in UNITS
|
Huang, Yu-Lun; Shen, C. Y.; Shieh, Shiuhpyng; Wang, Hung-Jui; Lin, Cheng-Chun |
國立交通大學 |
2014-12-08T15:24:46Z |
A path authentication scheme for routing disruption attack prevention in ad hoc network
|
Li-Joe Lin; Shieh, Shiuhpyng; Yang, Tzu-I; Lin, Warren W. |
國立交通大學 |
2014-12-08T15:16:00Z |
Secure authentication protocols resistant to guessing attacks
|
Luo, Jia-Ning; Shieh, Shiuhpyng; Shen, Ji-Chiang |
國立交通大學 |
2014-12-08T15:11:41Z |
SEA: Secure Encrypted-data Aggregation in mobile wireless sensor networks
|
Huang, Shih-I; Shieh, Shiuhpyng |
國立交通大學 |
2014-12-08T15:07:00Z |
Secure encrypted-data aggregation for wireless sensor networks
|
Huang, Shih-I; Shieh, Shiuhpyng; Tygar, J. D. |