| 亞洲大學 |
2001-08 |
Security patrolling in building corridors by multiple-camera computer vision and automatic vehicle navigation techniques
|
R. C. Liu;W. H. Tsai |
| 淡江大學 |
2008 |
Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait
|
白揚恩; Polisensky, Jan |
| 臺大學術典藏 |
2021-08-09T08:34:47Z |
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective
|
Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA |
| 中國文化大學 |
2017-07 |
Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles
|
吳盈德 |
| 中國文化大學 |
2021-02 |
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System
|
Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu) |
| 亞洲大學 |
2008-05 |
Security protection of face images transmitted on networks by information hiding techniques
|
D. C. Wu, C. S. Li;W. H. Tsai |
| 亞洲大學 |
2010-01 |
Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes
|
I. S. Lee;W. H. Tsai |
| 亞洲大學 |
2008-08 |
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
|
I. S. Lee;W. H. Tsai |
| 國立成功大學 |
2020 |
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems
|
Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S. |
| 國立政治大學 |
2008 |
Security Relations among China, Japan and Taiwan, 1995-2008
|
羅思婷 |
| 淡江大學 |
2011 |
Security Robot Simulator
|
Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C. |
| 大葉大學 |
2004-07 |
Security Schemes for Protecting Mobile Agent Based Networks
|
Ho;Tsaur, Woei-Jiunn |
| 佛光大學 |
2009-06-10 |
Security Sector Reform and Its Practices in Taiwan
|
張中勇 |
| 佛光大學 |
2007-03-07 |
Security Sector Reform in Taiwan
|
張中勇 |
| 國立交通大學 |
2018-08-21T05:52:42Z |
Security Semantics Modeling with Progressive Distillation
|
Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston |
| 中國科技大學 |
2013-07-20 |
Security Software based on Windows NDIS Filter Drivers
|
Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen |
| 佛光大學 |
2009-12-25 |
Security Solutions for Critical Dedicated Ethernet Services
|
黃慶圓;Cherng Yeh |
| 佛光大學 |
2009-12-25 |
Security Solutions for Critical Dedicated Ethernet Services
|
黃慶圓;Cherng Yeh |
| 國立臺灣海洋大學 |
2011-10 |
Security Threats in Advanced Metering Infrastructure
|
He-Ming Ruan;Yu-Sheng Yang;I-An Fan;Pei-Jinn Chai;Chun-Ying Huang;Chin-Laung Lei |
| 臺大學術典藏 |
2018-09-10T08:46:17Z |
Security Threats in Advanced Metering Infrastructure
|
He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
1989-09 |
Security Valuation Models and the Accounting Data
|
Wang, Tay-Chang; Wang, Tay-Chang |
| 國立臺灣大學 |
1989-09 |
Security Valuation Models and the Accounting Data
|
王泰昌; Wang, Tay-Chang |
| 元智大學 |
May-21 |
Security Verification for Cyber-Physical Systems Using Model Checking
|
Ching-Chieh Chan; Cheng-Zen Yang; Chin-Feng Fan |
| 淡江大學 |
2010-12 |
Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol
|
Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen |
| 國立彰化師範大學 |
2009 |
Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment
|
Chuang, Y. H. ; Tseng, Yuh-Min |