|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"wang y s"
Showing items 46-55 of 240 (24 Page(s) Totally) << < 1 2 3 4 5 6 7 8 9 10 > >> View [10|25|50] records per page
| 臺大學術典藏 |
2020-03-03T03:06:47Z |
Simultaneous temperature and magnetization transfer (MT) monitoring during high-intensity focused ultrasound (HIFU) treatment: Preliminary investigation on ex vivo porcine muscle
|
Peng H.-H.; Huang T.-Y.; WEN-YIH TSENG; Lin E.-L.; Chung H.-W.; Wu C.-C.; Wang Y.-S.; Chen W.-S. |
| 臺大學術典藏 |
2020-02-11T02:34:40Z |
Efficient defense strategies to minimize attackers' success probabilities in honeynet
|
Lin, F.Y.-S;Wang, Y.-S;Tsang, P.-H.; Lin, F.Y.-S; Wang, Y.-S; Tsang, P.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:14Z |
Network recovery strategies for maximization of network survivability
|
Lin, F.Y.-S;Chen, P.-Y;Wang, Y.-S;Chang, Y.-Y.; Lin, F.Y.-S; Chen, P.-Y; Wang, Y.-S; Chang, Y.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:09Z |
Effective network defense strategies against malicious attacks with various defense mechanisms under quality of service constraints
|
Lin, F.Y.-S;Wang, Y.-S;Wu, Y.-P;Hsu, C.-Y.; Lin, F.Y.-S; Wang, Y.-S; Wu, Y.-P; Hsu, C.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks
|
Lin, F.Y.-S;Wang, Y.-S;Wang, J.-W;Chan, C.-H.; Lin, F.Y.-S; Wang, Y.-S; Wang, J.-W; Chan, C.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:00Z |
Maximization of wireless mesh networks survivability to assure service continuity under intelligent attacks
|
Wang, Y.-S;Lin, F.Y.-S;Chan, C.-H;Wang, J.-W.; Wang, Y.-S; Lin, F.Y.-S; Chan, C.-H; Wang, J.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet
|
YEONG-SUNG LIN; Lin, F.Y.-S;Wang, Y.-S;Huang, M.-Y.; Lin, F.Y.-S; Wang, Y.-S; Huang, M.-Y. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Effective network defense strategies to assure service continuity under collaborative attacks
|
Lin, F.Y.-S;Wang, Y.-S;Chang, I.-T;Hsiao, W.-W.; Lin, F.Y.-S; Wang, Y.-S; Chang, I.-T; Hsiao, W.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker
|
Wang, Y.-S;Hung, L.-P;Rau, H.-H;Lin, F.Y.-S.; Wang, Y.-S; Hung, L.-P; Rau, H.-H; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
Modeling synergy effects considering both positive and negative factors between participants
|
Lin, F.Y.-S;Wang, Y.-S.; Lin, F.Y.-S; Wang, Y.-S.; YEONG-SUNG LIN |
Showing items 46-55 of 240 (24 Page(s) Totally) << < 1 2 3 4 5 6 7 8 9 10 > >> View [10|25|50] records per page
|