| 淡江大學 |
2011 |
Security Robot Simulator
|
Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C. |
| 大葉大學 |
2004-07 |
Security Schemes for Protecting Mobile Agent Based Networks
|
Ho;Tsaur, Woei-Jiunn |
| 佛光大學 |
2009-06-10 |
Security Sector Reform and Its Practices in Taiwan
|
張中勇 |
| 佛光大學 |
2007-03-07 |
Security Sector Reform in Taiwan
|
張中勇 |
| 國立交通大學 |
2018-08-21T05:52:42Z |
Security Semantics Modeling with Progressive Distillation
|
Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston |
| 中國科技大學 |
2013-07-20 |
Security Software based on Windows NDIS Filter Drivers
|
Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen |
| 佛光大學 |
2009-12-25 |
Security Solutions for Critical Dedicated Ethernet Services
|
黃慶圓;Cherng Yeh |
| 佛光大學 |
2009-12-25 |
Security Solutions for Critical Dedicated Ethernet Services
|
黃慶圓;Cherng Yeh |
| 國立臺灣海洋大學 |
2011-10 |
Security Threats in Advanced Metering Infrastructure
|
He-Ming Ruan;Yu-Sheng Yang;I-An Fan;Pei-Jinn Chai;Chun-Ying Huang;Chin-Laung Lei |
| 臺大學術典藏 |
2018-09-10T08:46:17Z |
Security Threats in Advanced Metering Infrastructure
|
He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
1989-09 |
Security Valuation Models and the Accounting Data
|
Wang, Tay-Chang; Wang, Tay-Chang |
| 國立臺灣大學 |
1989-09 |
Security Valuation Models and the Accounting Data
|
王泰昌; Wang, Tay-Chang |
| 元智大學 |
May-21 |
Security Verification for Cyber-Physical Systems Using Model Checking
|
Ching-Chieh Chan; Cheng-Zen Yang; Chin-Feng Fan |
| 淡江大學 |
2010-12 |
Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol
|
Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen |
| 國立彰化師範大學 |
2009 |
Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment
|
Chuang, Y. H. ; Tseng, Yuh-Min |
| 國立成功大學 |
2015 |
Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs
|
Gope, Prosanta; Hwang, Tzonelih |
| 淡江大學 |
1998-03-29 |
Security, transparency and accountability : an analysis of R.O.C. arms acquisition process
|
陳一新; Chen, I-hsin |
| 臺大學術典藏 |
2020-05-04T07:53:54Z |
Security-Aware Design Methodology and Optimization for Automotive Systems.
|
Lin, Chung-Wei;Zheng, Bowen;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zheng, Bowen; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN |
| 臺大學術典藏 |
2020-05-04T07:53:55Z |
Security-aware mapping for CAN-based real-time distributed automotive systems.
|
Lin, Chung-Wei;Zhu, Qi;Phung, Calvin;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zhu, Qi; Phung, Calvin; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN |
| 臺大學術典藏 |
2020-05-04T07:53:55Z |
Security-aware mapping for TDMA-based real-time distributed systems.
|
CHUNG-WEI LIN; Lin, Chung-Wei;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L. |
| 臺大學術典藏 |
2020-05-04T07:53:54Z |
Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems.
|
Lin, Chung-Wei; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN; Lin, Chung-Wei;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L. |
| 臺大學術典藏 |
2005 |
Security-Enhanced Data Delivery in Sensor Networks
|
Kuo, Chin-Fu; Lu, Yung-Feng; Pang, Ai-Chun; Kuo, Tei-Wei; Kuo, Chin-Fu; Lu, Yung-Feng; Pang, Ai-Chun; Kuo, Tei-Wei |
| 國立臺灣大學 |
2005 |
Security-Enhanced Data Delivery in Sensor Networks
|
Kuo, C.-F.; Lu, Y.-F.; 逄愛君; Kuo, T.-W.; Kuo, C.-F.; Lu, Y.-F.; Pang, A.-C.; Kuo, T.-W. |
| 國立臺灣大學 |
2005 |
Security-Enhanced Data Delivery in Sensor Networks
|
Kuo, Chin-Fu; Lu, Yung-Feng; Pang, Ai-Chun; Kuo, Tei-Wei |
| 國立成功大學 |
2009-06-15 |
SEC內線交易宣告對公司股價之影響
|
黃虹儒; Huang, Hung-Ju |