|
"hsu chun hsiao"的相关文件
显示项目 11-35 / 57 (共3页) 1 2 3 > >> 每页显示[10|25|50]项目
| 臺大學術典藏 |
2020-05-04T07:56:34Z |
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.
|
Wu, Hao;Hsiao, Hsu-Chun;Hu, Yih-Chun; Wu, Hao; Hsiao, Hsu-Chun; Hu, Yih-Chun; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:34Z |
STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
|
Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Yoo, Sangjae;Zhang, Xin;Lee, Soo Bum;Gligor, Virgil D.;Perrig, Adrian; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Yoo, Sangjae; Zhang, Xin; Lee, Soo Bum; Gligor, Virgil D.; Perrig, Adrian; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:34Z |
LAP: Lightweight Anonymity and Privacy.
|
Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Perrig, Adrian; Yamada, Akira; Nelson, Samuel C.; Gruteser, Marco; Meng, Wei; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:33Z |
SandUSB: An installation-free sandbox for USB peripherals.
|
Cheng, Shin-Ming; HSU-CHUN HSIAO; Loe, Edwin Lupito;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Lee, Shao-Chuan;Cheng, Shin-Ming; Loe, Edwin Lupito; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Lee, Shao-Chuan |
| 臺大學術典藏 |
2020-05-04T07:56:33Z |
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
|
Kung, Yi-Hsuan;Lee, Taeho;Tseng, Po-Ning;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Lee, Soo Bum;Lin, Yue-Hsun;Perrig, Adrian; Kung, Yi-Hsuan; Lee, Taeho; Tseng, Po-Ning; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Lee, Soo Bum; Lin, Yue-Hsun; Perrig, Adrian; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:33Z |
Securing data planes in software-defined networks.
|
Lee, Shao-Chuan; Hsiao, Hsu-Chun; HSU-CHUN HSIAO; Hsieh, Chen Jung; Chen, Jhu-Lin; Chao, Tzu-Wei; Ke, Yu-Ming; Chen, Bo-Han |
| 臺大學術典藏 |
2020-05-04T07:56:33Z |
XIA: architecting a more trustworthy and evolvable internet.
|
Naylor, David;Mukerjee, Matthew K.;Agyapong, Patrick;Grandl, Robert;Kang, Ruogu;Machado, Michel;Brown, Stephanie;Doucette, Cody;Hsiao, Hsu-Chun;Han, Dongsu;Kim, Tiffany Hyun-Jin;Lim, Hyeontaek;Ovon, Carol;Zhou, Dong;Lee, Soo Bum;Lin, Yue-Hsun;Stuart, H. Colleen;Barrett, Daniel Paul;Akella, Aditya;Andersen, David G.;Byers, John W.;Dabbish, Laura;Kaminsky, Michael;Kiesler, Sara B.;Peha, Jon M.;Perrig, Adrian;Seshan, Srinivasan;Sirbu, Marvin A.;Steenkiste, Peter; Naylor, David; Mukerjee, Matthew K.; Agyapong, Patrick; Grandl, Robert; Kang, Ruogu; Machado, Michel; Brown, Stephanie; Doucette, Cody; Hsiao, Hsu-Chun; Han, Dongsu; Kim, Tiffany Hyun-Jin; Lim, Hyeontaek; Ovon, Carol; Zhou, Dong; Lee, Soo Bum; Lin, Yue-Hsun; Stuart, H. Colleen; Barrett, Daniel Paul; Akella, Aditya; Andersen, David G.; Byers, John W.; Dabbish, Laura; Kaminsky, Michael; Kiesler, Sara B.; Peha, Jon M.; Perrig, Adrian; Seshan, Srinivasan; Sirbu, Marvin A.; Steenkiste, Peter; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:32Z |
CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
|
Ke, Yu-Ming;Chen, Chih-Wei;Hsiao, Hsu-Chun;Perrig, Adrian;Sekar, Vyas; Ke, Yu-Ming; Chen, Chih-Wei; Hsiao, Hsu-Chun; Perrig, Adrian; Sekar, Vyas; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:32Z |
Security Implications of Redirection Trail in Popular Websites Worldwide.
|
HSU-CHUN HSIAO; Lin, Wei-Hsi; Kim, Tiffany Hyun-Jin; Jeng, Wei; Hsiao, Hsu-Chun; Chang, Li; Chang, Li;Hsiao, Hsu-Chun;Jeng, Wei;Kim, Tiffany Hyun-Jin;Lin, Wei-Hsi |
| 臺大學術典藏 |
2020-05-04T07:56:32Z |
Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes.
|
Yeh, Jia-Rung; Hsiao, Hsu-Chun; Pang, Ai-Chun; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:32Z |
SIBRA: Scalable Internet Bandwidth Reservation Architecture.
|
Basescu, Cristina;Reischuk, Raphael M.;Szalachowski, Pawel;Perrig, Adrian;Zhang, Yao;Hsiao, Hsu-Chun;Kubota, Ayumu;Urakawa, Jumpei; Basescu, Cristina; Reischuk, Raphael M.; Szalachowski, Pawel; Perrig, Adrian; Zhang, Yao; Hsiao, Hsu-Chun; Kubota, Ayumu; Urakawa, Jumpei; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:31Z |
DAMUP: Practical and privacy-aware cloud-based DDoS mitigation.
|
Hsiao, Hsu-Chun; Wang, Hsin-Yi; Lin, Su-Chin;Huang, Po-Wei;Wang, Hsin-Yi;Hsiao, Hsu-Chun; Lin, Su-Chin; Huang, Po-Wei; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:31Z |
Dynamic Path Pruning in Symbolic Execution.
|
Chen, Ying-Shen; Chen, Wei-Ning; Wu, Che-Yu; Hsiao, Hsu-Chun; Huang, Shih-Kun; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:31Z |
SDNProbe: Lightweight Fault Localization in the Error-Prone Environment.
|
Ke, Yu-Ming;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin; Ke, Yu-Ming; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:30Z |
On the Feasibility of Rerouting-Based DDoS Defenses.
|
HSU-CHUN HSIAO; Wang, Yu-Su; Tung, Shu-Po; Chiang, Wei-Hsuan; Hsiao, Hsu-Chun; Tran, Muoi;Kang, Min Suk;Hsiao, Hsu-Chun;Chiang, Wei-Hsuan;Tung, Shu-Po;Wang, Yu-Su; Tran, Muoi; Kang, Min Suk |
| 臺大學術典藏 |
2020-05-04T07:56:30Z |
An Investigation of Cyber Autonomy on Government Websites.
|
HSU-CHUN HSIAO; Jeng, Wei; Kim, Tiffany Hyun-Jin; Ku, Yu-Ming; Chang, Chun-Ming; Chen, Hung-Fang; Chen, Yu-Jen; Wang, Chun-Wen; Hsiao, Hsu-Chun; Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Ku, Yu-Ming;Chang, Chun-Ming;Chen, Hung-Fang;Chen, Yu-Jen;Wang, Chun-Wen;Jeng, Wei |
| 臺大學術典藏 |
2020-05-04T07:56:30Z |
Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems
|
Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:30Z |
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
|
Wu, Hao; Hsiao, Hsu-Chun; Asoni, Daniele Enrico; Scherrer, Simon; Perrig, Adrian; Hu, Yih-Chun; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:29Z |
Securing data planes in software-defined networks
|
Chao, T.-W.;Ke, Y.-M.;Chen, B.-H.;Chen, J.-L.;Hsieh, C.J.;Lee, S.-C.;Hsiao, H.-C.; Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:29Z |
Decapitation via digital epidemics: A bio-inspired transmissive attack
|
Chen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:29Z |
CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks
|
Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:29Z |
A secure authorization system in PHR based on CP-ABE
|
Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:28Z |
CLEF: Limiting the damage caused by large flows in the internet core
|
Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:28Z |
Traffic-aware patching for cyber security in mobile IoT
|
Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO |
| 臺大學術典藏 |
2020-05-04T07:56:28Z |
SandUSB: An installation-free sandbox for USB peripherals
|
Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO |
显示项目 11-35 / 57 (共3页) 1 2 3 > >> 每页显示[10|25|50]项目
|