Basic Search
/ Search Result
Search Result: 97results Search Strategy: "鄭欣明".cadvisor (Phrase)
Refine the results:
Search
Expand the trend chart of search results
Individualized services
:
My Search Strategy
Sort:
Results per page:
Selected0results
Select all on this page
|
1
|
A Novel IoT Malware Classifier Based on Reordering System-Level Execution Flow
|
2
|
Smart Contracts for IoT Resource Allocation
-
Department of Computer Science and Information Engineering
/111/ Master
-
Author:
Jun Yip Choo
Advisor:
-
The application of the Internet of Things (IoT) is expanding, becoming an indispensable
presence. I…
-
Clicks: 551
Downloads: 0
- Full text public date 2028/08/23 (Intranet public)
- Full text public date 2028/08/23 (Internet public)
- Full text public date 2028/08/23 (National library)
|
3
|
Real-Time Pedestrian Detection on IoT Edge Devices: A Light Deep Learning Approach
-
Department of Computer Science and Information Engineering
/111/ Master
-
Author:
Muhammad Dany Alfikri
Advisor:
-
Artificial intelligence, specifically deep learning, has become an integral part of our everyday li…
-
Clicks: 501
Downloads: 0
- Full text public date 2028/08/24 (Intranet public)
- Full text public date 2028/08/24 (Internet public)
- Full text public date 2028/08/24 (National library)
|
4
|
IoTcaptor: Discovering Authentication Bypass in IoT Devicesthrough Guided Concolic Execution
-
Department of Computer Science and Information Engineering
/109/ Master
-
Author:
Jr-Wei Huang
Advisor:
-
Nowadays, the rapid expansion of IoT devices, coupled with increasingly complex hardware architectu…
-
Clicks: 774
Downloads: 0
- Full text public date 2026/08/16 (Intranet public)
- Full text public date 2026/08/16 (Internet public)
- Full text public date 2026/08/16 (National library)
|
5
|
Implementation of an Experimental Self-Organizing Mobile Network Using Virtualization and Software Defined Radio
-
Department of Computer Science and Information Engineering
/106/ Master
-
Author:
Yu-Lin Hsueh
Advisor:
-
Aiming to support high data rate, low latency and requirements of many scenarios, the fifth-generat…
-
Clicks: 672
Downloads: 0
- Full text public date 2023/08/24 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
6
|
A Lightweight Fog-Based Framework for Secure IoT Communications
|
7
|
Mode Selection for Device-to-Device Communications with Channel Fading in Underlay Cellular Network
-
Department of Computer Science and Information Engineering
/106/ Master
-
Author:
Yu-Jyun Wang
Advisor:
-
The device-to-device (D2D) communication can improve network performance with respect to convention…
-
Clicks: 556
Downloads: 0
- Full text public date 2023/01/16 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
8
|
Practical Attacks against LTE Availability with Low-cost Software-defined Radio
-
Department of Computer Science and Information Engineering
/105/ Master
-
Author:
Lian Chang
Advisor:
-
As a significant 4G communication technology in modern society, Long Term Evolution (LTE) provides …
-
Clicks: 869
Downloads: 0
- Full text public date 2022/08/28 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
9
|
Kerberos Based Key Management with Anonymity for IoT Devices in Smart Hotel
-
Department of Computer Science and Information Engineering
/105/ Master
-
Author:
Kai-Ching Wang
Advisor:
-
Smart devices make our lives more convenient, and the hoteliers are trying to improve the comfort o…
-
Clicks: 642
Downloads: 0
- Full text public date 2022/08/29 (Intranet public)
- Full text public date 2027/08/29 (Internet public)
- Full text public date 2027/08/29 (National library)
|
10
|
On Modeling Hybrid IoT Malware Propagation Considering Size Distributions
-
Department of Computer Science and Information Engineering
/106/ Master
-
Author:
Jiong-Lun Li
Advisor:
-
With the increasing use of Interent of Things (IoT) in current network, more and more malware can l…
-
Clicks: 386
Downloads: 0
- Full text public date 2023/08/09 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|