|
English
|
正體中文
|
简体中文
|
0
|
|
???header.visitor??? :
50697675
???header.onlineuser??? :
364
???header.sponsordeclaration???
|
|
|
|
???tair.name??? >
???browser.page.title.author???
|
"p w"???jsp.browse.items-by-author.description???
Showing items 11-16 of 16 (1 Page(s) Totally) 1 View [10|25|50] records per page
| 國立成功大學 |
2024 |
A Case Study of Network-Based Intrusion Detection System Deployment in Industrial Control Systems with Network Isolation
|
Chen;N, -Y.;Chou;P, -W.;Li;J, -S.;Liu;I, -H. |
| 國立成功大學 |
2024 |
Using Software-Defined Tenant to Improve Network Adaptation in 5G Core Networks
|
Tsai;P, -W.;Xia;N;Fang;T, -Y.;Huang;H, -H.;Yang;C, -S. |
| 國立成功大學 |
2024 |
RECALL: Towards Generalized Representations in�Unsupervised Federated Learning Under Non-IID Conditions
|
Chen;P, -W.;Lin;J;Yeh;F, -H.;Cupek;R;Chen;C, -C. |
| 國立成功大學 |
2024 |
The Detecting Abnormal Operations in ICS Using Finite-State Machines
|
Chou;P, -W.;Chen;N, -Y.;Li;J, -S.;Liu;I, -H. |
| 國立成功大學 |
2024 |
An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
|
Fei;C;Xia;N;Tsai;P, -W.;Lu;Y;Pan;X;Gong;J |
| 國立成功大學 |
2023-09 |
Development of EUV interference lithography for 25 nm line/space patterns
|
Sahoo;A, K.;Chen;P, -h.;Lin;C, -h.;Liu;R, -s.;Lin;B, -j.;Kao;T, -s.;Chiu;P, -w.;Huang;T, -p.;Lai;W, -y.;Wang;J;Lee;Y, -y.;Kuan;C, -k. |
Showing items 11-16 of 16 (1 Page(s) Totally) 1 View [10|25|50] records per page
|