English  |  正體中文  |  简体中文  |  总笔数 :2823024  
造访人次 :  30244446    在线人数 :  805
教育部委托研究计画      计画执行:国立台湾大学图书馆
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
关于TAIR

浏览

消息

著作权

相关连结

"hsiao h c"的相关文件

回到依作者浏览
依题名排序 依日期排序

显示项目 1-25 / 67 (共3页)
1 2 3 > >>
每页显示[10|25|50]项目

机构 日期 题名 作者
臺大學術典藏 2021-06-02T05:43:33Z Catalytic transfer hydrogenation and anticancer activity of arene-ruthenium compounds incorporating bi-dentate precursors Chang Y.-H.; Leu W.-J.; Datta A.; Hsiao H.-C.; Lin C.-H.; JIH-HWA GUH; Huang J.-H.
臺大學術典藏 2021-06-02T05:43:31Z Synthesis and characterization of ruthenium compounds incorporating keto-amine ligands. The applications of catalytic transfer hydrogenation and cancer cell inhibition Lin T.-H.; Das K.; Datta A.; Leu W.-J.; Hsiao H.-C.; Lin C.-H.; JIH-HWA GUH; Huang J.-H.
臺大學術典藏 2021-01-04T05:52:15Z An investigation of cyber autonomy on government websites Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.; Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; Wei Jeng
臺大學術典藏 2021-01-04T05:52:15Z A decentralized framework for cultivating research lifecycle transparency Jeng, W.;Wang, S.-H.;Chen, H.-W.;Huang, P.-W.;Chen, Y.-J.;Hsiao, H.-C.; Jeng, W.; Wang, S.-H.; Chen, H.-W.; Huang, P.-W.; Chen, Y.-J.; Hsiao, H.-C.; Wei Jeng
臺大學術典藏 2020-06-16T06:30:43Z Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; JA-LING WU
臺大學術典藏 2020-05-04T07:56:30Z Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z Securing data planes in software-defined networks Chao, T.-W.;Ke, Y.-M.;Chen, B.-H.;Chen, J.-L.;Hsieh, C.J.;Lee, S.-C.;Hsiao, H.-C.; Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z Decapitation via digital epidemics: A bio-inspired transmissive attack Chen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z A secure authorization system in PHR based on CP-ABE Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z CLEF: Limiting the damage caused by large flows in the internet core Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Traffic-aware patching for cyber security in mobile IoT Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z SandUSB: An installation-free sandbox for USB peripherals Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z GroupIt: Lightweight Group Key Management for Dynamic IoT Environments Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z SDNProbe: Lightweight fault localization in the error-prone environment Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z A generic web application testing and attack data generation method Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z SafeChain: Securing Trigger-Action Programming from Attack Chains Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z An investigation of cyber autonomy on government websites Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.
臺大學術典藏 2020-05-04T07:56:26Z On the Feasibility of Rerouting-Based DDoS Defenses Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z Dynamic Path Pruning in Symbolic Execution Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K.
臺大學術典藏 2020-04-16T02:34:46Z A secure authorization system in PHR based on CP-ABE FEI-PEI LAI; Lai, F.; Chung, H.H.;Wang, P.S.;Ho, T.-W.;Hsiao, H.-C.;Lai, F.; Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.
臺大學術典藏 2020-04-16T02:34:46Z Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; FEI-PEI LAI
臺大學術典藏 2019-07-11T00:31:02Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes Pang A.-C.;Hsiao H.-C.;Yeh J.-R.; Yeh J.-R.; Hsiao H.-C.; Pang A.-C.

显示项目 1-25 / 67 (共3页)
1 2 3 > >>
每页显示[10|25|50]项目