English  |  正體中文  |  简体中文  |  總筆數 :0  
造訪人次 :  52889397    線上人數 :  787
教育部委託研究計畫      計畫執行:國立臺灣大學圖書館
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
关于TAIR

浏览

消息

著作权

相关连结

"lin f y s"的相关文件

回到依作者浏览
依题名排序 依日期排序

显示项目 71-120 / 302 (共7页)
<< < 1 2 3 4 5 6 7 > >>
每页显示[10|25|50]项目

机构 日期 题名 作者
臺大學術典藏 2020-02-11T02:34:40Z An efficient time slot allocation algorithm in wireless networks Lin, F.Y.-S;Lee, C.-T;Lin, L.-Y.; Lin, F.Y.-S; Lee, C.-T; Lin, L.-Y.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:29Z Evaluation of Network Survivability Considering Degree of Disconnectivity Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Chen, P.-Y; Wen, Y.-F.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:29Z Near-optimal defense strategies against DDoS attacks based upon packet filtering and blocking enabled by packet marking Lin, F.Y.-S;Chen, P.-Y;Chiang, C.-W.F.; Lin, F.Y.-S; Chen, P.-Y; Chiang, C.-W.F.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:29Z Modeling of adaptive load balancing with hybrid F/CDMA and sectorization schemes in mobile communication networks YEONG-SUNG LIN; Wang, C.-S.; Chu, K.-C;Lin, F.Y.-S;Wang, C.-S.; Chu, K.-C; Lin, F.Y.-S
臺大學術典藏 2020-02-11T02:34:28Z A novel grey data generating technique on Elliptic Curve Cryptosystems Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:23Z The effect of call admission policies on the system benefit of CDMA communication networks Chu, K.-C;Lin, F.Y.-S;Hung, L.-P.; Chu, K.-C; Lin, F.Y.-S; Hung, L.-P.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:23Z Relay station placement strategy in IEEE 802.16j WiMAX networks Lu, H.-C;Liao, W;Lin, F.Y.-S.; Lu, H.-C; Liao, W; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:22Z Network defense strategies for maximization of network survivability Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Chen, P.-Y; Wen, Y.-F.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:22Z Evaluation of network survivability considering degree of disconnectivity YEONG-SUNG LIN; Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Chen, P.-Y; Wen, Y.-F.
臺大學術典藏 2020-02-11T02:34:22Z A Lagrangean relaxation based sensor deployment algorithm to optimize quality of service for target positioning Chiu, P.-L;Lin, F.Y.-S.; Chiu, P.-L; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:15Z Electronic medical archives: A different approach to applying re-signing mechanisms to digital signatures Chen, T.-L;Lin, F.Y.S.; Chen, T.-L; Lin, F.Y.S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:14Z Cost optimization of integrated network planning based on adaptive sectorization in hybrid F/CDMA telecommunications system via Lagrangean relaxation Chu, K.-C;Lin, F.Y.-S;Wang, C.-S.; Chu, K.-C; Lin, F.Y.-S; Wang, C.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:14Z Network recovery strategies for maximization of network survivability Lin, F.Y.-S;Chen, P.-Y;Wang, Y.-S;Chang, Y.-Y.; Lin, F.Y.-S; Chen, P.-Y; Wang, Y.-S; Chang, Y.-Y.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:10Z A study on information security management with personal data protection Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:09Z Effective network defense strategies against malicious attacks with various defense mechanisms under quality of service constraints Lin, F.Y.-S;Wang, Y.-S;Wu, Y.-P;Hsu, C.-Y.; Lin, F.Y.-S; Wang, Y.-S; Wu, Y.-P; Hsu, C.-Y.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:03Z Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks Lin, F.Y.-S;Wang, Y.-S;Wang, J.-W;Chan, C.-H.; Lin, F.Y.-S; Wang, Y.-S; Wang, J.-W; Chan, C.-H.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:03Z Deployment of secure mobile agents for medical information systems Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:03Z Near-optimal evaluation of network survivability under multi-stage attacks Lin, F.Y.-S; Chen, P.-Y; Chen, Q.-T.; YEONG-SUNG LIN; Lin, F.Y.-S;Chen, P.-Y;Chen, Q.-T.
臺大學術典藏 2020-02-11T02:34:03Z Resource allocation strategies to maximize network survivability considering of average DOD Lin, F.Y.-S;Chen, P.-Y;Chen, Q.-T.; Lin, F.Y.-S; Chen, P.-Y; Chen, Q.-T.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:03Z A study on agent-based secure scheme for electronic medical record system Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:01Z Utilizing joint routing and capacity assignment algorithms to achieve inter- and intra-group delay fairness in multi-rate multicast wireless sensor networks Lin, F.Y.-S;Hsiao, C.-H;Lin, L.S.-H;Wen, Y.-F.; Lin, F.Y.-S; Hsiao, C.-H; Lin, L.S.-H; Wen, Y.-F.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:01Z Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies Chen, P.-Y;Shih, I.-J;Lin, F.Y.-S.; Chen, P.-Y; Shih, I.-J; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:01Z A tutorial on evaluation of network survivability under sophisticated attacker Lin, F.Y.-S;Chen, P.-Y.; Lin, F.Y.-S; Chen, P.-Y.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:00Z Software vulnerability patch management with semi-markov decision process Huang, C.-C;Farn, K.-J;Lin, F.-Y;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:34:00Z Maximization of wireless mesh networks survivability to assure service continuity under intelligent attacks Wang, Y.-S;Lin, F.Y.-S;Chan, C.-H;Wang, J.-W.; Wang, Y.-S; Lin, F.Y.-S; Chan, C.-H; Wang, J.-W.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:58Z Recovery and resource allocation strategies to maximize mobile network survivability by using game theories and optimization techniques Chen, P.-Y;Lin, F.Y.-S.; Chen, P.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:58Z Effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet YEONG-SUNG LIN; Lin, F.Y.-S;Wang, Y.-S;Huang, M.-Y.; Lin, F.Y.-S; Wang, Y.-S; Huang, M.-Y.
臺大學術典藏 2020-02-11T02:33:57Z Minimum-cost QoS-constrained deployment and routing policies for wireless relay networks YEONG-SUNG LIN; Liu, Y.-H.; Lin, F.Y.-S;Hsiao, C.-H;Chu, K.-C;Liu, Y.-H.; Lin, F.Y.-S; Hsiao, C.-H; Chu, K.-C
臺大學術典藏 2020-02-11T02:33:57Z A near-optimal distributed QoS constrained routing algorithm for multichannel wireless sensor networks Lin, F.Y.-S;Hsiao, C.-H;Yen, H.-H;Hsieh, Y.-J.; Lin, F.Y.-S; Hsiao, C.-H; Yen, H.-H; Hsieh, Y.-J.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:57Z A novel approach to evaluate software vulnerability prioritization Sun, Y.S.; YEONG-SUNG LIN; Lin, F.Y.-S; Lin, F.-Y; Huang, C.-C; Huang, C.-C;Lin, F.-Y;Lin, F.Y.-S;Sun, Y.S.
臺大學術典藏 2020-02-11T02:33:56Z A study on implementations of information security risk assessment: Application to chlorine processing systems of water treatment plants Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:56Z Resource allocation strategies under attack-defense dual-role and malicious attacks YEONG-SUNG LIN; Chen, P.-Y;Chen, Y.-J;Lin, F.Y.-S.; Chen, P.-Y; Chen, Y.-J; Lin, F.Y.-S.
臺大學術典藏 2020-02-11T02:33:56Z Effective network defense strategies to assure service continuity under collaborative attacks Lin, F.Y.-S;Wang, Y.-S;Chang, I.-T;Hsiao, W.-W.; Lin, F.Y.-S; Wang, Y.-S; Chang, I.-T; Hsiao, W.-W.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:55Z A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker Wang, Y.-S;Hung, L.-P;Rau, H.-H;Lin, F.Y.-S.; Wang, Y.-S; Hung, L.-P; Rau, H.-H; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:55Z Modeling synergy effects considering both positive and negative factors between participants Lin, F.Y.-S;Wang, Y.-S.; Lin, F.Y.-S; Wang, Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:55Z An evaluation of network survivability under the effect of accumulated experience from sophisticated attackers Chen, P.-Y;Lin, F.Y.-S.; Chen, P.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:54Z A testbed-based framework for performance evaluation of multicast broadcast systems in OFDMA networks Hsiao, C.-H;Rampa, V;Wen, Y.-F;Lin, F.Y.-S.; Hsiao, C.-H; Rampa, V; Wen, Y.-F; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:53Z A precision operation optimization for detection-based sensor networks Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:53Z Explore and analyze the performance factors on Wi-Fi sensing starvation problems Wen, Y.-F;Chen, S.-Y;Hsiao, C.-H;Lin, F.Y.-S.; Wen, Y.-F; Chen, S.-Y; Hsiao, C.-H; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:47Z Dynamical cloud hosts assignment to achieve cost-effectiveness in cloud radio access networks Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F;Chien, P.-C.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F; Chien, P.-C.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:46Z Resource allocation and multisession routing algorithms in coordinated multipoint wireless communication networks Lin, F.Y.-S;Wen, Y.-F;Fang, L.-W;Hsiao, C.-H.; Lin, F.Y.-S; Wen, Y.-F; Fang, L.-W; Hsiao, C.-H.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:46Z Adaptive Broadcast Routing Assignment Algorithm for Blockchain Synchronization Services Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F;Su, Y.-C.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F; Su, Y.-C.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:46Z Optimization-Based Resource Management Strategies for 5G C-RAN Slicing Capabilities Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F;Wu, Y.-S.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F; Wu, Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:46Z Starvation-avoidance routing assignment for multihop wireless networks Chen, S.-Y;Lin, F.Y.-S;Wen, Y.-F;Hsiao, C.-H.; Chen, S.-Y; Lin, F.Y.-S; Wen, Y.-F; Hsiao, C.-H.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:33:45Z Lagrangian-Relaxation-Based Self-Repairing Mechanism for Wi-Fi Networks Tsai, M.-C;Lin, F.Y.-S;Wen, Y.-F.; Tsai, M.-C; Lin, F.Y.-S; Wen, Y.-F.; YEONG-SUNG LIN
臺大學術典藏 2020-02-11T02:32:30Z Minimum-cost multicast routing for multi-layered multimedia distribution Cheng, H.-C;Lin, F.Y.-S.; Cheng, H.-C; Lin, F.Y.-S.; YEONG-SUNG LIN
臺大學術典藏 2020-02-10T02:43:31Z A novel approach to evaluate software vulnerability prioritization Huang, C.-C.;Lin, F.-Y.;Lin, F.Y.-S.;Sun, Y.S.; Huang, C.-C.; Lin, F.-Y.; Lin, F.Y.-S.; Sun, Y.S.; YEALI SUN
國立臺灣大學 2012 A Study on ISMS Policy: Importing Personal Data Protection of ISMS Huang, C.C.; Fran, K.J.; Lin, F.Y.S.
國立臺灣大學 2012 Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD Lin, F.Y.S.; Chen, P.Y.; Chen, Q.T.
國立臺灣大學 2012 Maximization of Network Survivability under Malicious and Epidemic Attacks Lin, F.Y.S.; Wang, Y.S.; Chung, H.Y.; Pan, J.L.

顯示項目 71-120 / 302 (共7頁)
<< < 1 2 3 4 5 6 7 > >>
每頁顯示[10|25|50]項目