Basic Search / Search Result

  • Search Result: 82results Search Strategy: "賴源正".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection
    • Department of Information Management /110/ Master
    • Author: Jheng-Yan Lin Advisor:
    • Traditional intrusion detection systems (IDSs) require manual updates, which cannot usually keep up…
    • Clicks: 189Downloads: 0
    • Full text public date 2025/09/20 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    2

    Knowledge-based Query Trees for RFID Anti-collision Protocols
    • Department of Information Management /110/ Doctor
    • Author: Zelalem Legese Hailemariam Advisor:
    • Radio Frequency Identification (RFID) has allowed the realization of ubiquitous tracking and monito…
    • Clicks: 230Downloads: 0
    • Full text public date 2024/07/21 (Intranet public)
    • Full text public date 2024/07/21 (Internet public)
    • Full text public date 2024/07/21 (National library)

    3

    Multi-Resource Network Slicing with Deep Reinforcement Learning for Optimal QoS Satisfaction Ratio
    • Department of Information Management /111/ Master
    • Author: Hui-Chu Yang Advisor:
    • The 5G networks provide the services with low latency, high speed, and large bandwidth, which short…
    • Clicks: 394Downloads: 0
    • Full text public date 2033/03/29 (Intranet public)
    • Full text public date 2033/03/29 (Internet public)
    • Full text public date 2033/03/29 (National library)

    4

    Reinforcement Learning-based Offloading in a Device-Edge-Cloud Computing Environment
    • Department of Information Management /110/ Master
    • Author: Yun-Chen Chang Advisor:
    • Today's mobile applications require more computing resources, but Device has limited computing reso…
    • Clicks: 215Downloads: 0
    • Full text public date 2025/09/22 (Intranet public)
    • Full text public date 2032/09/22 (Internet public)
    • Full text public date 2032/09/22 (National library)

    5

    Cache Slicing with Minimum QoS Violation Probability in the Cloud and Edge Systems
    • Department of Information Management /108/ Master
    • Author: Pei-Yin Chen Advisor:
    • The 5G network architecture includes radio access network (RAN) and core network. However, diverse …
    • Clicks: 387Downloads: 0
    • Full text public date 2025/08/19 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    Detecting Hybrid DDoS Attacks with Flow Differentiation in Software-Defined Networking
    • Department of Information Management /107/ Master
    • Author: Kai-Zhong Zhou Advisor:
    • Distributed denial-of-service (DDoS) attacks have become one of the main attacks in the network now…
    • Clicks: 324Downloads: 0
    • Full text public date 2024/08/16 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    An AI Driven Risk Assess Framework to Evaluate DDoS Cyber Attacks
    • Department of Information Management /107/ Master
    • Author: CHUN-WEI HUANG Advisor:
    • The cloud computing and Internet of Things (IoT) have become two key technologies to meet future bu…
    • Clicks: 415Downloads: 0
    • Full text public date 2024/08/20 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    A Generative Adversarial Network to Generate Link Flooding Attacks
    • Department of Information Management /108/ Master
    • Author: Yu-Ching Huang Advisor:
    • Link Flooding Attack (LFA) will not only attack one server but a target area, which include several…
    • Clicks: 535Downloads: 0
    • Full text public date 2025/08/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    9

    Defending Link Flooding Attacks with Blocking and Rerouting Attack Traffic in Hybrid SDN
    • Department of Information Management /108/ Master
    • Author: Si-Ru Lin Advisor:
    • Link Flooding Attack (LFA) is a new type of DDoS attack that targets a specific low-density data st…
    • Clicks: 218Downloads: 0
    • Full text public date 2025/03/23 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    Social-Aware multi-hop Grouping Scheme for Multicast D2D Communications
    • Department of Information Management /109/ Master
    • Author: Shih-Hung Lo Advisor:
    • Considering the increasing demands of spectrum in the future, spectrum resources are getting less a…
    • Clicks: 212Downloads: 0
    • Full text public date 2025/11/14 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)