English  |  正體中文  |  简体中文  |  Total items :0  
Visitors :  52667315    Online Users :  769
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

"hsu chun hsiao"

Return to Browse by Author
Sorting by Title Sort by Date

Showing items 36-57 of 57  (3 Page(s) Totally)
<< < 1 2 3 > >>
View [10|25|50] records per page

Institution Date Title Author
臺大學術典藏 2020-05-04T07:56:28Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z GroupIt: Lightweight Group Key Management for Dynamic IoT Environments Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z SDNProbe: Lightweight fault localization in the error-prone environment Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z A generic web application testing and attack data generation method Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z SafeChain: Securing Trigger-Action Programming from Attack Chains Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z An investigation of cyber autonomy on government websites Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.
臺大學術典藏 2020-05-04T07:56:26Z On the Feasibility of Rerouting-Based DDoS Defenses Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z Dynamic Path Pruning in Symbolic Execution Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K.
臺大學術典藏 2018-09-10T14:53:25Z Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region Wu, H.;Hsiao, H.-C.;Hu, Y.-C.; Wu, H.; Hsiao, H.-C.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z STRIDE: Sanctuary trail - Refuge from internet DDoS entrapment Hsiao, H.-C.;Kim, T.H.-J.;Yoo, S.;Zhang, X.;Lee, S.B.;Gligor, V.;Perrig, A.; Hsiao, H.-C.; Kim, T.H.-J.; Yoo, S.; Zhang, X.; Lee, S.B.; Gligor, V.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z Policy-based secure deletion Cachin, C.;Haralambiev, K.;Hsiao, H.-C.;Sorniotti, A.; Cachin, C.; Haralambiev, K.; Hsiao, H.-C.; Sorniotti, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:17:17Z LAP: Lightweight anonymity and privacy Hsiao, H.-C.; Kim, T.H.-J.; Perrig, A.; Yamada, A.; Nelson, S.C.; Gruteser, M.; Meng, W.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:51Z Efficient and secure threshold-based event validation for VANETs Hsiao, H.-C.;Studer, A.;Dubey, R.;Shi, E.;Perrig, A.; Hsiao, H.-C.; Studer, A.; Dubey, R.; Shi, E.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z SCION: Scalability, control, and isolation on next-generation networks Zhang, X.;Hsiao, H.-C.;Hasker, G.;Chan, H.;Perrig, A.;ersen, D.G.; Zhang, X.; Hsiao, H.-C.; Hasker, G.; Chan, H.; Perrig, A.; ersen, D.G.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z Flooding-resilient broadcast authentication for VANETs Hsiao, H.-C.;Studer, A.;Chen, C.;Perrig, A.;Bai, F.;Bellur, B.;Iyer, A.; Hsiao, H.-C.; Studer, A.; Chen, C.; Perrig, A.; Bai, F.; Bellur, B.; Iyer, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:08:26Z Secure distributed data aggregation Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T07:27:22Z A study of user-friendly hash comparison schemes Hsiao, H.-C.;Lin, Y.-H.;Studer, A.;Studer, C.;Wang, K.-H.;Kikuchi, H.;Perrig, A.;Sun, H.-M.;Yang, B.-Y.; Hsiao, H.-C.; Lin, Y.-H.; Studer, A.; Studer, C.; Wang, K.-H.; Kikuchi, H.; Perrig, A.; Sun, H.-M.; Yang, B.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T07:27:21Z SPATE: Small-group PKI-less authenticated trust establishment Lin, Y.-H.;Studer, A.;Hsiao, H.-C.;McCune, J.M.;Wang, K.-H.;Krohn, M.;Lin, P.-L.;Perrig, A.;Sun, H.-M.;Yang, B.-Y.; Lin, Y.-H.; Studer, A.; Hsiao, H.-C.; McCune, J.M.; Wang, K.-H.; Krohn, M.; Lin, P.-L.; Perrig, A.; Sun, H.-M.; Yang, B.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T06:35:01Z A Survey of Secure Data Aggregation on Sensor Networks Yu-Shian Chen; Hsu-Chun Hsiao; Chin-Laung Lei; CHIN-LAUNG LEI
臺大學術典藏 2017 Security implications of redirection trail in popular websites worldwide Kim, T.H.-J.; Lin, W.-H.; HSU-CHUN HSIAO; Jeng, W.; Hsiao, H.-C.; Chang, L.
臺大學術典藏 2011 SCION: Scalability, Control, and Isolation on Next-Generation Networks. Zhang, Xin;Hsiao, Hsu-Chun;Hasker, Geoffrey;Chan, Haowen;Perrig, Adrian;Andersen, David G.; Zhang, Xin; Hsiao, Hsu-Chun; Hasker, Geoffrey; Chan, Haowen; Perrig, Adrian; Andersen, David G.; HSU-CHUN HSIAO

Showing items 36-57 of 57  (3 Page(s) Totally)
<< < 1 2 3 > >>
View [10|25|50] records per page