|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"lin f y s"
Showing items 81-130 of 302 (7 Page(s) Totally) << < 1 2 3 4 5 6 7 > >> View [10|25|50] records per page
| 臺大學術典藏 |
2020-02-11T02:34:15Z |
Electronic medical archives: A different approach to applying re-signing mechanisms to digital signatures
|
Chen, T.-L;Lin, F.Y.S.; Chen, T.-L; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:14Z |
Cost optimization of integrated network planning based on adaptive sectorization in hybrid F/CDMA telecommunications system via Lagrangean relaxation
|
Chu, K.-C;Lin, F.Y.-S;Wang, C.-S.; Chu, K.-C; Lin, F.Y.-S; Wang, C.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:14Z |
Network recovery strategies for maximization of network survivability
|
Lin, F.Y.-S;Chen, P.-Y;Wang, Y.-S;Chang, Y.-Y.; Lin, F.Y.-S; Chen, P.-Y; Wang, Y.-S; Chang, Y.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:10Z |
A study on information security management with personal data protection
|
Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:09Z |
Effective network defense strategies against malicious attacks with various defense mechanisms under quality of service constraints
|
Lin, F.Y.-S;Wang, Y.-S;Wu, Y.-P;Hsu, C.-Y.; Lin, F.Y.-S; Wang, Y.-S; Wu, Y.-P; Hsu, C.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks
|
Lin, F.Y.-S;Wang, Y.-S;Wang, J.-W;Chan, C.-H.; Lin, F.Y.-S; Wang, Y.-S; Wang, J.-W; Chan, C.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Deployment of secure mobile agents for medical information systems
|
Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Near-optimal evaluation of network survivability under multi-stage attacks
|
Lin, F.Y.-S; Chen, P.-Y; Chen, Q.-T.; YEONG-SUNG LIN; Lin, F.Y.-S;Chen, P.-Y;Chen, Q.-T. |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Resource allocation strategies to maximize network survivability considering of average DOD
|
Lin, F.Y.-S;Chen, P.-Y;Chen, Q.-T.; Lin, F.Y.-S; Chen, P.-Y; Chen, Q.-T.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
A study on agent-based secure scheme for electronic medical record system
|
Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:01Z |
Utilizing joint routing and capacity assignment algorithms to achieve inter- and intra-group delay fairness in multi-rate multicast wireless sensor networks
|
Lin, F.Y.-S;Hsiao, C.-H;Lin, L.S.-H;Wen, Y.-F.; Lin, F.Y.-S; Hsiao, C.-H; Lin, L.S.-H; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:01Z |
Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies
|
Chen, P.-Y;Shih, I.-J;Lin, F.Y.-S.; Chen, P.-Y; Shih, I.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:01Z |
A tutorial on evaluation of network survivability under sophisticated attacker
|
Lin, F.Y.-S;Chen, P.-Y.; Lin, F.Y.-S; Chen, P.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:00Z |
Software vulnerability patch management with semi-markov decision process
|
Huang, C.-C;Farn, K.-J;Lin, F.-Y;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:00Z |
Maximization of wireless mesh networks survivability to assure service continuity under intelligent attacks
|
Wang, Y.-S;Lin, F.Y.-S;Chan, C.-H;Wang, J.-W.; Wang, Y.-S; Lin, F.Y.-S; Chan, C.-H; Wang, J.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Recovery and resource allocation strategies to maximize mobile network survivability by using game theories and optimization techniques
|
Chen, P.-Y;Lin, F.Y.-S.; Chen, P.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet
|
YEONG-SUNG LIN; Lin, F.Y.-S;Wang, Y.-S;Huang, M.-Y.; Lin, F.Y.-S; Wang, Y.-S; Huang, M.-Y. |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
Minimum-cost QoS-constrained deployment and routing policies for wireless relay networks
|
YEONG-SUNG LIN; Liu, Y.-H.; Lin, F.Y.-S;Hsiao, C.-H;Chu, K.-C;Liu, Y.-H.; Lin, F.Y.-S; Hsiao, C.-H; Chu, K.-C |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
A near-optimal distributed QoS constrained routing algorithm for multichannel wireless sensor networks
|
Lin, F.Y.-S;Hsiao, C.-H;Yen, H.-H;Hsieh, Y.-J.; Lin, F.Y.-S; Hsiao, C.-H; Yen, H.-H; Hsieh, Y.-J.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
A novel approach to evaluate software vulnerability prioritization
|
Sun, Y.S.; YEONG-SUNG LIN; Lin, F.Y.-S; Lin, F.-Y; Huang, C.-C; Huang, C.-C;Lin, F.-Y;Lin, F.Y.-S;Sun, Y.S. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
A study on implementations of information security risk assessment: Application to chlorine processing systems of water treatment plants
|
Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Resource allocation strategies under attack-defense dual-role and malicious attacks
|
YEONG-SUNG LIN; Chen, P.-Y;Chen, Y.-J;Lin, F.Y.-S.; Chen, P.-Y; Chen, Y.-J; Lin, F.Y.-S. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Effective network defense strategies to assure service continuity under collaborative attacks
|
Lin, F.Y.-S;Wang, Y.-S;Chang, I.-T;Hsiao, W.-W.; Lin, F.Y.-S; Wang, Y.-S; Chang, I.-T; Hsiao, W.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker
|
Wang, Y.-S;Hung, L.-P;Rau, H.-H;Lin, F.Y.-S.; Wang, Y.-S; Hung, L.-P; Rau, H.-H; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
Modeling synergy effects considering both positive and negative factors between participants
|
Lin, F.Y.-S;Wang, Y.-S.; Lin, F.Y.-S; Wang, Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
An evaluation of network survivability under the effect of accumulated experience from sophisticated attackers
|
Chen, P.-Y;Lin, F.Y.-S.; Chen, P.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:54Z |
A testbed-based framework for performance evaluation of multicast broadcast systems in OFDMA networks
|
Hsiao, C.-H;Rampa, V;Wen, Y.-F;Lin, F.Y.-S.; Hsiao, C.-H; Rampa, V; Wen, Y.-F; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:53Z |
A precision operation optimization for detection-based sensor networks
|
Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:53Z |
Explore and analyze the performance factors on Wi-Fi sensing starvation problems
|
Wen, Y.-F;Chen, S.-Y;Hsiao, C.-H;Lin, F.Y.-S.; Wen, Y.-F; Chen, S.-Y; Hsiao, C.-H; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:47Z |
Dynamical cloud hosts assignment to achieve cost-effectiveness in cloud radio access networks
|
Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F;Chien, P.-C.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F; Chien, P.-C.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:46Z |
Resource allocation and multisession routing algorithms in coordinated multipoint wireless communication networks
|
Lin, F.Y.-S;Wen, Y.-F;Fang, L.-W;Hsiao, C.-H.; Lin, F.Y.-S; Wen, Y.-F; Fang, L.-W; Hsiao, C.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:46Z |
Adaptive Broadcast Routing Assignment Algorithm for Blockchain Synchronization Services
|
Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F;Su, Y.-C.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F; Su, Y.-C.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:46Z |
Optimization-Based Resource Management Strategies for 5G C-RAN Slicing Capabilities
|
Lin, F.Y.-S;Hsiao, C.-H;Wen, Y.-F;Wu, Y.-S.; Lin, F.Y.-S; Hsiao, C.-H; Wen, Y.-F; Wu, Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:46Z |
Starvation-avoidance routing assignment for multihop wireless networks
|
Chen, S.-Y;Lin, F.Y.-S;Wen, Y.-F;Hsiao, C.-H.; Chen, S.-Y; Lin, F.Y.-S; Wen, Y.-F; Hsiao, C.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:45Z |
Lagrangian-Relaxation-Based Self-Repairing Mechanism for Wi-Fi Networks
|
Tsai, M.-C;Lin, F.Y.-S;Wen, Y.-F.; Tsai, M.-C; Lin, F.Y.-S; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:32:30Z |
Minimum-cost multicast routing for multi-layered multimedia distribution
|
Cheng, H.-C;Lin, F.Y.-S.; Cheng, H.-C; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
A novel approach to evaluate software vulnerability prioritization
|
Huang, C.-C.;Lin, F.-Y.;Lin, F.Y.-S.;Sun, Y.S.; Huang, C.-C.; Lin, F.-Y.; Lin, F.Y.-S.; Sun, Y.S.; YEALI SUN |
| 國立臺灣大學 |
2012 |
A Study on ISMS Policy: Importing Personal Data Protection of ISMS
|
Huang, C.C.; Fran, K.J.; Lin, F.Y.S. |
| 國立臺灣大學 |
2012 |
Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD
|
Lin, F.Y.S.; Chen, P.Y.; Chen, Q.T. |
| 國立臺灣大學 |
2012 |
Maximization of Network Survivability under Malicious and Epidemic Attacks
|
Lin, F.Y.S.; Wang, Y.S.; Chung, H.Y.; Pan, J.L. |
| 國立臺灣大學 |
2012 |
Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
|
Lin, F.Y.S.; Wang, Y.S.; Wu, Y.P.Wu; Hsu, C.Y. |
| 國立臺灣大學 |
2012 |
Resource Allocation Strategies to Maximize Network Survivability Considering of Average DOD
|
Lin, F.Y.S.; Chen, P.Y.; Chen, Q.T. |
| 臺大學術典藏 |
2012 |
Maximization of network survivability under malicious and epidemic attacks
|
Lin, F.Y.-S;Wang, Y.-S;Chung, H.-Y;Pan, J.-L.; Lin, F.Y.-S; Wang, Y.-S; Chung, H.-Y; Pan, J.-L.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2012 |
A study on ISMS policy: Importing personal data protection of ISMS
|
Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN; Huang, C.-C; Huang, C.-C;Farn, K.-J;Lin, F.Y.-S. |
| 國立臺灣大學 |
2011 |
A Novel Grey Data Generating Technique on Elliptic Curve Cryptosystems
|
Chen, T.L.; Chung, Y.F.; Lin, F.Y.S. |
| 國立臺灣大學 |
2011 |
A Lagrangean Relaxation Based Sensor Deployment Algorithm to Optimize Quality of Service for Target Positioning
|
Chiu, P.L.Chiu; Lin, F.Y.S. |
| 國立臺灣大學 |
2011 |
The Effect of Call Admission Policies on the System Benefit of CDMA Communication Networks
|
Chu, K.C.; Lin, F.Y.S.; Hung, L.P. |
| 國立臺灣大學 |
2011 |
Electronic Medical Archives: A Different Approach on Applying Re-Signing Mechanism to the Digital Signature
|
Chen, T.L.; Lin, F.Y.S. |
| 國立臺灣大學 |
2011 |
A Secure Conference Key Protocol over ECC-based Grey Systems
|
Chen, T.L.Chen; Chung, Y.F.Chung; Lin, F.Y.S. |
| 國立臺灣大學 |
2011 |
A Study on Agent-based Secure Scheme for Electronic Medical Record System
|
Chen, T.L.; Chung, Y.F.; Lin, F.Y.S. |
Showing items 81-130 of 302 (7 Page(s) Totally) << < 1 2 3 4 5 6 7 > >> View [10|25|50] records per page
|