Basic Search / Search Result

  • Search Result: 84results Search Strategy: "鄭欣明".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    A Novel IoT Malware Classifier Based on Reordering System-Level Execution Flow

    2

    Smart Contracts for IoT Resource Allocation
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: Jun Yip Choo Advisor:
    • The application of the Internet of Things (IoT) is expanding, becoming an indispensable presence. I…
    • Clicks: 191Downloads: 0
    • Full text public date 2028/08/23 (Intranet public)
    • Full text public date 2028/08/23 (Internet public)
    • Full text public date 2028/08/23 (National library)

    3

    Real-Time Pedestrian Detection on IoT Edge Devices: A Light Deep Learning Approach
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: Muhammad Dany Alfikri Advisor:
    • Artificial intelligence, specifically deep learning, has become an integral part of our everyday li…
    • Clicks: 208Downloads: 0
    • Full text public date 2028/08/24 (Intranet public)
    • Full text public date 2028/08/24 (Internet public)
    • Full text public date 2028/08/24 (National library)

    4

    IoTcaptor: Discovering Authentication Bypass in IoT Devicesthrough Guided Concolic Execution
    • Department of Computer Science and Information Engineering /109/ Master
    • Author: Jr-Wei Huang Advisor:
    • Nowadays, the rapid expansion of IoT devices, coupled with increasingly complex hardware architectu…
    • Clicks: 268Downloads: 0
    • Full text public date 2026/08/16 (Intranet public)
    • Full text public date 2026/08/16 (Internet public)
    • Full text public date 2026/08/16 (National library)

    5

    Energy Efficiency Analysis of User-Number Threshlod-Based Small Base Stations On/Off Control in Heterogeneous Networks
    • Department of Computer Science and Information Engineering /109/ Master
    • Author: Meng-Jiang He Advisor:
    • With the advancement of technology in recent years, the traffic of communication networks has been …
    • Clicks: 286Downloads: 0
    • Full text public date 2024/04/03 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    On Exploiting Self-Organized Container Virtualization Radio Access Network Platform to Realize Cooperative Rogue Base Station Attack
    • Department of Computer Science and Information Engineering /107/ Master
    • Author: Wan-Lin Hsieh Advisor:
    • LTE (Long Term Evolution) is governing mobile communication technology in recent years. UMTS (Unive…
    • Clicks: 287Downloads: 0
    • Full text public date 2024/07/26 (Intranet public)
    • Full text public date 2024/07/26 (Internet public)
    • Full text public date 2024/07/26 (National library)

    7

    Design of Large-Scale IoT Honeynet form the Perspective of Virtualized Netwworks
    • Department of Computer Science and Information Engineering /107/ Master
    • Author: Jia-Jhun Lin Advisor:
    • Clicks: 167Downloads: 0
    • Full text public date 2024/08/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Implementation of an Experimental Self-Organizing Mobile Network Using Virtualization and Software Defined Radio
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Yu-Lin Hsueh Advisor:
    • Aiming to support high data rate, low latency and requirements of many scenarios, the fifth-generat…
    • Clicks: 243Downloads: 0
    • Full text public date 2023/08/24 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    9

    A Lightweight Fog-Based Framework for Secure IoT Communications

    10

    Mode Selection for Device-to-Device Communications with Channel Fading in Underlay Cellular Network
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Yu-Jyun Wang Advisor:
    • The device-to-device (D2D) communication can improve network performance with respect to convention…
    • Clicks: 235Downloads: 0
    • Full text public date 2023/01/16 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)