|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"lin f y s"
Showing items 96-105 of 302 (31 Page(s) Totally) << < 5 6 7 8 9 10 11 12 13 14 > >> View [10|25|50] records per page
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Recovery and resource allocation strategies to maximize mobile network survivability by using game theories and optimization techniques
|
Chen, P.-Y;Lin, F.Y.-S.; Chen, P.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet
|
YEONG-SUNG LIN; Lin, F.Y.-S;Wang, Y.-S;Huang, M.-Y.; Lin, F.Y.-S; Wang, Y.-S; Huang, M.-Y. |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
Minimum-cost QoS-constrained deployment and routing policies for wireless relay networks
|
YEONG-SUNG LIN; Liu, Y.-H.; Lin, F.Y.-S;Hsiao, C.-H;Chu, K.-C;Liu, Y.-H.; Lin, F.Y.-S; Hsiao, C.-H; Chu, K.-C |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
A near-optimal distributed QoS constrained routing algorithm for multichannel wireless sensor networks
|
Lin, F.Y.-S;Hsiao, C.-H;Yen, H.-H;Hsieh, Y.-J.; Lin, F.Y.-S; Hsiao, C.-H; Yen, H.-H; Hsieh, Y.-J.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
A novel approach to evaluate software vulnerability prioritization
|
Sun, Y.S.; YEONG-SUNG LIN; Lin, F.Y.-S; Lin, F.-Y; Huang, C.-C; Huang, C.-C;Lin, F.-Y;Lin, F.Y.-S;Sun, Y.S. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
A study on implementations of information security risk assessment: Application to chlorine processing systems of water treatment plants
|
Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Resource allocation strategies under attack-defense dual-role and malicious attacks
|
YEONG-SUNG LIN; Chen, P.-Y;Chen, Y.-J;Lin, F.Y.-S.; Chen, P.-Y; Chen, Y.-J; Lin, F.Y.-S. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Effective network defense strategies to assure service continuity under collaborative attacks
|
Lin, F.Y.-S;Wang, Y.-S;Chang, I.-T;Hsiao, W.-W.; Lin, F.Y.-S; Wang, Y.-S; Chang, I.-T; Hsiao, W.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker
|
Wang, Y.-S;Hung, L.-P;Rau, H.-H;Lin, F.Y.-S.; Wang, Y.-S; Hung, L.-P; Rau, H.-H; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
Modeling synergy effects considering both positive and negative factors between participants
|
Lin, F.Y.-S;Wang, Y.-S.; Lin, F.Y.-S; Wang, Y.-S.; YEONG-SUNG LIN |
Showing items 96-105 of 302 (31 Page(s) Totally) << < 5 6 7 8 9 10 11 12 13 14 > >> View [10|25|50] records per page
|