Basic Search / Search Result

  • Search Result: 97results Search Strategy: "鄭欣明".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    A Novel IoT Malware Classifier Based on Reordering System-Level Execution Flow

    2

    Smart Contracts for IoT Resource Allocation
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: Jun Yip Choo Advisor:
    • The application of the Internet of Things (IoT) is expanding, becoming an indispensable presence. I…
    • Clicks: 551Downloads: 0
    • Full text public date 2028/08/23 (Intranet public)
    • Full text public date 2028/08/23 (Internet public)
    • Full text public date 2028/08/23 (National library)

    3

    Real-Time Pedestrian Detection on IoT Edge Devices: A Light Deep Learning Approach
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: Muhammad Dany Alfikri Advisor:
    • Artificial intelligence, specifically deep learning, has become an integral part of our everyday li…
    • Clicks: 501Downloads: 0
    • Full text public date 2028/08/24 (Intranet public)
    • Full text public date 2028/08/24 (Internet public)
    • Full text public date 2028/08/24 (National library)

    4

    IoTcaptor: Discovering Authentication Bypass in IoT Devicesthrough Guided Concolic Execution
    • Department of Computer Science and Information Engineering /109/ Master
    • Author: Jr-Wei Huang Advisor:
    • Nowadays, the rapid expansion of IoT devices, coupled with increasingly complex hardware architectu…
    • Clicks: 774Downloads: 0
    • Full text public date 2026/08/16 (Intranet public)
    • Full text public date 2026/08/16 (Internet public)
    • Full text public date 2026/08/16 (National library)

    5

    Implementation of an Experimental Self-Organizing Mobile Network Using Virtualization and Software Defined Radio
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Yu-Lin Hsueh Advisor:
    • Aiming to support high data rate, low latency and requirements of many scenarios, the fifth-generat…
    • Clicks: 672Downloads: 0
    • Full text public date 2023/08/24 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    A Lightweight Fog-Based Framework for Secure IoT Communications

    7

    Mode Selection for Device-to-Device Communications with Channel Fading in Underlay Cellular Network
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Yu-Jyun Wang Advisor:
    • The device-to-device (D2D) communication can improve network performance with respect to convention…
    • Clicks: 556Downloads: 0
    • Full text public date 2023/01/16 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Practical Attacks against LTE Availability with Low-cost Software-defined Radio
    • Department of Computer Science and Information Engineering /105/ Master
    • Author: Lian Chang Advisor:
    • As a significant 4G communication technology in modern society, Long Term Evolution (LTE) provides …
    • Clicks: 869Downloads: 0
    • Full text public date 2022/08/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    9

    Kerberos Based Key Management with Anonymity for IoT Devices in Smart Hotel
    • Department of Computer Science and Information Engineering /105/ Master
    • Author: Kai-Ching Wang Advisor:
    • Smart devices make our lives more convenient, and the hoteliers are trying to improve the comfort o…
    • Clicks: 642Downloads: 0
    • Full text public date 2022/08/29 (Intranet public)
    • Full text public date 2027/08/29 (Internet public)
    • Full text public date 2027/08/29 (National library)

    10

    On Modeling Hybrid IoT Malware Propagation Considering Size Distributions
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Jiong-Lun Li Advisor:
    • With the increasing use of Interent of Things (IoT) in current network, more and more malware can l…
    • Clicks: 386Downloads: 0
    • Full text public date 2023/08/09 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)