|
"yeong sung lin"的相關文件
顯示項目 81-130 / 156 (共4頁) << < 1 2 3 4 > >> 每頁顯示[10|25|50]項目
| 臺大學術典藏 |
2020-02-11T02:34:53Z |
Maximization of network survival time in the event of intelligent and malicious attacks
|
Tsang, P.-H;Lin, F.Y.-S;Chen, C.-W.; Tsang, P.-H; Lin, F.Y.-S; Chen, C.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:52Z |
Reliable greedy forwarding in obstacle-aware wireless sensor networks
|
Hsu, M.-T;Lin, F.Y.-S;Chang, Y.-S;Juang, T.-Y.; Hsu, M.-T; Lin, F.Y.-S; Chang, Y.-S; Juang, T.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:52Z |
Multirate throughput optimization with fairness constraints in wireless local area networks
|
Kuo, Y.-L;Lai, K.-W;Lin, F.Y.-S;Wen, Y.-F;Wu, E.H.-K;Chen, G.-H.; Kuo, Y.-L; Lai, K.-W; Lin, F.Y.-S; Wen, Y.-F; Wu, E.H.-K; Chen, G.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:52Z |
Fair inter-tap routing and backhaul assignment for wireless mesh networks
|
YEONG-SUNG LIN; Wen, Y.F.; Lin, F.Y.S; Lin, F.Y.S;Wen, Y.F. |
| 臺大學術典藏 |
2020-02-11T02:34:51Z |
Maximization of network robustness considering the effect of escalation and accumulated experience of intelligent attackers
|
Lin, F.Y.-S;Tsang, P.-H;Chen, P.-Y;Chen, H.-T.; Lin, F.Y.-S; Tsang, P.-H; Chen, P.-Y; Chen, H.-T.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:51Z |
Delay QoS and MAC aware energy-efficient data-aggregation routing in wireless sensor networks
|
Lin, F.Y.-S;Yen, H.-H;Lin, S.-P.; Lin, F.Y.-S; Yen, H.-H; Lin, S.-P.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:48Z |
An admission control-based benefit optimization model for mobile communications: The effect of a decision time budget
|
Chu, K.-C;Wang, C.-S;Lin, F.Y.-S.; Chu, K.-C; Wang, C.-S; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:48Z |
Backhaul and routing assignments with end-to-end qos constraints for wireless mesh networks
|
YEONG-SUNG LIN; Tzeng, Y.-C; Lee, C.-T.; Lin, F.Y.-S; Wen, Y.-F; Wen, Y.-F;Lin, F.Y.-S;Tzeng, Y.-C;Lee, C.-T. |
| 臺大學術典藏 |
2020-02-11T02:34:48Z |
An efficient date-constraint hierarchical key management scheme for mobile agents
|
YEONG-SUNG LIN; Lin, F.Y.S.; Chung, Y.-F; Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L |
| 臺大學術典藏 |
2020-02-11T02:34:48Z |
Adaptive channel reservation for call admission control to support prioritized soft handoff calls in a cellular CDMA system
|
Chu, K.-C;Hung, L.-P;Lin, F.Y.-S.; Chu, K.-C; Hung, L.-P; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:47Z |
An efficient Lagrangean relaxation-based object tracking algorithm in wireless sensor networks
|
Lin, F.Y.-S;Lee, C.-T.; Lin, F.Y.-S; Lee, C.-T.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:41Z |
Efficient estimation and collision-group-based anticollision algorithms for dynamic frame-slotted ALOHA in RFID networks
|
Lin, C.-F;Lin, F.Y.-S.; Lin, C.-F; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:40Z |
Near optimal secret sharing for information leakage maximization
|
Lin, F.Y.-S;Chu, K.-C;Chen, P.-Y;Chen, G.-W.; Lin, F.Y.-S; Chu, K.-C; Chen, P.-Y; Chen, G.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:40Z |
Efficient defense strategies to minimize attackers' success probabilities in honeynet
|
Lin, F.Y.-S;Wang, Y.-S;Tsang, P.-H.; Lin, F.Y.-S; Wang, Y.-S; Tsang, P.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:40Z |
An efficient time slot allocation algorithm in wireless networks
|
Lin, F.Y.-S;Lee, C.-T;Lin, L.-Y.; Lin, F.Y.-S; Lee, C.-T; Lin, L.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:29Z |
Evaluation of Network Survivability Considering Degree of Disconnectivity
|
Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Chen, P.-Y; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:29Z |
An efficient circuit-switched broadcasting in star graph
|
Lee, C.-T;Lin, Y.-S.; Lee, C.-T; Lin, Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:29Z |
Near-optimal defense strategies against DDoS attacks based upon packet filtering and blocking enabled by packet marking
|
Lin, F.Y.-S;Chen, P.-Y;Chiang, C.-W.F.; Lin, F.Y.-S; Chen, P.-Y; Chiang, C.-W.F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:29Z |
Modeling of adaptive load balancing with hybrid F/CDMA and sectorization schemes in mobile communication networks
|
YEONG-SUNG LIN; Wang, C.-S.; Chu, K.-C;Lin, F.Y.-S;Wang, C.-S.; Chu, K.-C; Lin, F.Y.-S |
| 臺大學術典藏 |
2020-02-11T02:34:28Z |
A novel grey data generating technique on Elliptic Curve Cryptosystems
|
Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:23Z |
The effect of call admission policies on the system benefit of CDMA communication networks
|
Chu, K.-C;Lin, F.Y.-S;Hung, L.-P.; Chu, K.-C; Lin, F.Y.-S; Hung, L.-P.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:23Z |
Relay station placement strategy in IEEE 802.16j WiMAX networks
|
Lu, H.-C;Liao, W;Lin, F.Y.-S.; Lu, H.-C; Liao, W; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:22Z |
Network defense strategies for maximization of network survivability
|
Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Chen, P.-Y; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:22Z |
Maximization of network survivability considering degree of disconnectivity
|
Yeong-Sung Lin, F;Yen, H.-H;Chen, P.-Y.; Yeong-Sung Lin, F; Yen, H.-H; Chen, P.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:22Z |
Evaluation of network survivability considering degree of disconnectivity
|
YEONG-SUNG LIN; Lin, F.Y.-S;Yen, H.-H;Chen, P.-Y;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Chen, P.-Y; Wen, Y.-F. |
| 臺大學術典藏 |
2020-02-11T02:34:22Z |
A Lagrangean relaxation based sensor deployment algorithm to optimize quality of service for target positioning
|
Chiu, P.-L;Lin, F.Y.-S.; Chiu, P.-L; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:15Z |
Electronic medical archives: A different approach to applying re-signing mechanisms to digital signatures
|
Chen, T.-L;Lin, F.Y.S.; Chen, T.-L; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:14Z |
Cost optimization of integrated network planning based on adaptive sectorization in hybrid F/CDMA telecommunications system via Lagrangean relaxation
|
Chu, K.-C;Lin, F.Y.-S;Wang, C.-S.; Chu, K.-C; Lin, F.Y.-S; Wang, C.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:14Z |
Network recovery strategies for maximization of network survivability
|
Lin, F.Y.-S;Chen, P.-Y;Wang, Y.-S;Chang, Y.-Y.; Lin, F.Y.-S; Chen, P.-Y; Wang, Y.-S; Chang, Y.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:10Z |
A study on information security management with personal data protection
|
Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:09Z |
Effective network defense strategies against malicious attacks with various defense mechanisms under quality of service constraints
|
Lin, F.Y.-S;Wang, Y.-S;Wu, Y.-P;Hsu, C.-Y.; Lin, F.Y.-S; Wang, Y.-S; Wu, Y.-P; Hsu, C.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks
|
Lin, F.Y.-S;Wang, Y.-S;Wang, J.-W;Chan, C.-H.; Lin, F.Y.-S; Wang, Y.-S; Wang, J.-W; Chan, C.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Deployment of secure mobile agents for medical information systems
|
Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Near-optimal evaluation of network survivability under multi-stage attacks
|
Lin, F.Y.-S; Chen, P.-Y; Chen, Q.-T.; YEONG-SUNG LIN; Lin, F.Y.-S;Chen, P.-Y;Chen, Q.-T. |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
Resource allocation strategies to maximize network survivability considering of average DOD
|
Lin, F.Y.-S;Chen, P.-Y;Chen, Q.-T.; Lin, F.Y.-S; Chen, P.-Y; Chen, Q.-T.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:03Z |
A study on agent-based secure scheme for electronic medical record system
|
Chen, T.-L;Chung, Y.-F;Lin, F.Y.S.; Chen, T.-L; Chung, Y.-F; Lin, F.Y.S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:01Z |
Utilizing joint routing and capacity assignment algorithms to achieve inter- and intra-group delay fairness in multi-rate multicast wireless sensor networks
|
Lin, F.Y.-S;Hsiao, C.-H;Lin, L.S.-H;Wen, Y.-F.; Lin, F.Y.-S; Hsiao, C.-H; Lin, L.S.-H; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:01Z |
Maximization of multi-round network survivability under considerations of the defender's defensive messaging strategies
|
Chen, P.-Y;Shih, I.-J;Lin, F.Y.-S.; Chen, P.-Y; Shih, I.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:01Z |
A tutorial on evaluation of network survivability under sophisticated attacker
|
Lin, F.Y.-S;Chen, P.-Y.; Lin, F.Y.-S; Chen, P.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:00Z |
Software vulnerability patch management with semi-markov decision process
|
Huang, C.-C;Farn, K.-J;Lin, F.-Y;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:00Z |
Maximization of wireless mesh networks survivability to assure service continuity under intelligent attacks
|
Wang, Y.-S;Lin, F.Y.-S;Chan, C.-H;Wang, J.-W.; Wang, Y.-S; Lin, F.Y.-S; Chan, C.-H; Wang, J.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Recovery and resource allocation strategies to maximize mobile network survivability by using game theories and optimization techniques
|
Chen, P.-Y;Lin, F.Y.-S.; Chen, P.-Y; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:58Z |
Effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet
|
YEONG-SUNG LIN; Lin, F.Y.-S;Wang, Y.-S;Huang, M.-Y.; Lin, F.Y.-S; Wang, Y.-S; Huang, M.-Y. |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
Minimum-cost QoS-constrained deployment and routing policies for wireless relay networks
|
YEONG-SUNG LIN; Liu, Y.-H.; Lin, F.Y.-S;Hsiao, C.-H;Chu, K.-C;Liu, Y.-H.; Lin, F.Y.-S; Hsiao, C.-H; Chu, K.-C |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
A near-optimal distributed QoS constrained routing algorithm for multichannel wireless sensor networks
|
Lin, F.Y.-S;Hsiao, C.-H;Yen, H.-H;Hsieh, Y.-J.; Lin, F.Y.-S; Hsiao, C.-H; Yen, H.-H; Hsieh, Y.-J.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:57Z |
A novel approach to evaluate software vulnerability prioritization
|
Sun, Y.S.; YEONG-SUNG LIN; Lin, F.Y.-S; Lin, F.-Y; Huang, C.-C; Huang, C.-C;Lin, F.-Y;Lin, F.Y.-S;Sun, Y.S. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
A study on implementations of information security risk assessment: Application to chlorine processing systems of water treatment plants
|
Huang, C.-C;Farn, K.-J;Lin, F.Y.-S.; Huang, C.-C; Farn, K.-J; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Resource allocation strategies under attack-defense dual-role and malicious attacks
|
YEONG-SUNG LIN; Chen, P.-Y;Chen, Y.-J;Lin, F.Y.-S.; Chen, P.-Y; Chen, Y.-J; Lin, F.Y.-S. |
| 臺大學術典藏 |
2020-02-11T02:33:56Z |
Effective network defense strategies to assure service continuity under collaborative attacks
|
Lin, F.Y.-S;Wang, Y.-S;Chang, I.-T;Hsiao, W.-W.; Lin, F.Y.-S; Wang, Y.-S; Chang, I.-T; Hsiao, W.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:33:55Z |
A Cyber-Attack Synergy Model Considering Both Positive and Negative Impacts from Each Attacker
|
Wang, Y.-S;Hung, L.-P;Rau, H.-H;Lin, F.Y.-S.; Wang, Y.-S; Hung, L.-P; Rau, H.-H; Lin, F.Y.-S.; YEONG-SUNG LIN |
顯示項目 81-130 / 156 (共4頁) << < 1 2 3 4 > >> 每頁顯示[10|25|50]項目
|