|
"yeali sun"的相關文件
顯示項目 51-75 / 83 (共4頁) << < 1 2 3 4 > >> 每頁顯示[10|25|50]項目
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
A hybrid tag-based recommendation mechanism to support prior knowledge construction
|
Chen, J.M.;Sun, Y.S.;Chen, M.C.; Chen, J.M.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
A novel protocol design and collaborative forensics mechanism for VoIP services
|
Hsu, H.-M.;Lin, F.-Y.;Sun, Y.S.;Chen, M.C.; Hsu, H.-M.; Lin, F.-Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
Distributed agent-based IP location system framework design
|
Lin, F.-Y.;Sun, Y.S.;Chen, M.C.; Lin, F.-Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
A novel approach to evaluate software vulnerability prioritization
|
Huang, C.-C.;Lin, F.-Y.;Lin, F.Y.-S.;Sun, Y.S.; Huang, C.-C.; Lin, F.-Y.; Lin, F.Y.-S.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
Combining dynamic passive analysis and active fingerprinting for effective bot malware detection in virtualized environments
|
Hsiao, S.-W.;Chen, Y.-N.;Sun, Y.S.;Chen, M.C.; Hsiao, S.-W.; Chen, Y.-N.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
A scalable network forensics mechanism for stealthy self-propagating attacks
|
Chen, L.M.;Chen, M.C.;Liao, W.;Sun, Y.S.; Chen, L.M.; Chen, M.C.; Liao, W.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
Protocol and architecture supports for network mobility with QoS-handover for high-velocity vehicles
|
Lee, C.-W.;Chen, M.C.;Sun, Y.S.; Lee, C.-W.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
Forensics tracking for IP user using the markov chain model
|
Lin, F.-Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN; Lin, F.-Y.;Sun, Y.S.;Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
A novel network mobility management scheme supporting seamless handover for high-speed trains
|
Lee, C.-W.;Chen, M.C.;Sun, Y.S.; Lee, C.-W.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
A tag based learning approach to knowledge acquisition for constructing prior knowledge and enhancing student reading comprehension
|
Chen, J.-M.;Chen, M.-C.;Sun, Y.S.; Chen, J.-M.; Chen, M.-C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
TEDQuiz: Automatic quiz generation for TED talks video clips to assess listening comprehension
|
Huang, Y.-T.;Tseng, Y.-M.;Sun, Y.S.;Chen, M.C.; Huang, Y.-T.; Tseng, Y.-M.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Patching assignment optimization for security vulnerabilities
|
Sun, Y.; YEALI SUN; Tong, S.-M.;Huang, C.-C.;Lin, F.-Y.;Sun, Y.; Tong, S.-M.; Huang, C.-C.; Lin, F.-Y. |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
A workload, performance and resource usage
|
YEALI SUN; Sun, Y.S.;Du, C.-E.;Chen, M.C.; Sun, Y.S.; Du, C.-E.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Profiling temporal event behavior for demand prediction in cloud application performance management
|
Sun, Y.S.;Chen, Y.-F.;Chen, M.C.; Sun, Y.S.; Chen, Y.-F.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Resource management issues in 5G ultra dense smallcell networks
|
YEALI SUN; Chuang, M.-C.;Chen, M.C.;Yeali, S.; Chuang, M.-C.; Yeali, S.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Seamless handover for high-speed trains using femtocell-based multiple egress network interfaces
|
YEALI SUN; Lee, C.-W.;Chuang, M.-C.;Chen, M.C.;Sun, Y.S.; Lee, C.-W.; Chuang, M.-C.; Chen, M.C.; Sun, Y.S. |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
The influence of self-regulated learning support and prior knowledge on learning mathematics
|
Chen, M.-C.;Sun, Y.S.;Yang, T.-C.; Chen, M.-C.; Sun, Y.S.; Yang, T.-C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
ANTSdroid: Automatic malware family behaviour generation and analysis for Android apps
|
YEALI SUN; Sun, Y.S.;Chen, C.-C.;Hsiao, S.-W.;Chen, M.C.; Hsiao, S.-W.; Chen, C.-C.; Sun, Y.S.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract)
|
Dolev, S.;Ghanayim, M.;Binun, A.;Frenkel, S.;Sun, Y.S.; Dolev, S.; Ghanayim, M.; Binun, A.; Frenkel, S.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
An Investigation of the Influence of Drug Addiction on Learning Behaviors in a Game-Based Learning Environment
|
YEALI SUN; Sun, Y.S.; Chen, M.-C.; Yang, T.-C.;Chen, M.-C.;Sun, Y.S.; Yang, T.-C. |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
Design of an online multimedia learning system for improving students' perceptions of english language learning
|
Huang, Y.-T.;Yang, T.-C.;Chen, M.C.;Chen, C.-M.;Sun, Y.S.; Huang, Y.-T.; Yang, T.-C.; Chen, M.C.; Chen, C.-M.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
Behavior grouping of Android malware family
|
YEALI SUN; Hsiao, S.-W.;Sun, Y.S.;Chen, M.C.; Hsiao, S.-W.; Sun, Y.S.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:27Z |
ANTSdroid: Using RasMMA algorithm to generate malware behavior characteristics of android malware family
|
Sun, B.; Takahashi, T.; YEALI SUN; Chen, M.-C.; Chuang, W.-L.; Chang, S.-C.; Sun, Y.S.; Chang, S.-C.;Sun, Y.S.;Chuang, W.-L.;Chen, M.-C.;Sun, B.;Takahashi, T. |
| 臺大學術典藏 |
2020-02-10T02:43:27Z |
Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network
|
Huang, Y.-T.;Chen, Y.-Y.;Yang, C.-C.;Sun, Y.;Hsiao, S.-W.;Chen, M.C.; Huang, Y.-T.; Chen, Y.-Y.; Yang, C.-C.; Sun, Y.; Hsiao, S.-W.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:27Z |
A scalable and accurate feature representation method for identifying malicious mobile applications
|
Sun, B.;Sun, Y.S.;Ban, T.;Takahashi, T.;Chang, S.-C.;Inoue, D.; Sun, B.; Sun, Y.S.; Ban, T.; Takahashi, T.; Chang, S.-C.; Inoue, D.; YEALI SUN |
顯示項目 51-75 / 83 (共4頁) << < 1 2 3 4 > >> 每頁顯示[10|25|50]項目
|