Basic Search / Search Result

  • Search Result: 4results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="Intrusion Detection System"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Design of an Intrusion Detection System Using Transformer along with Pre-Processing of Window-Based Packets in the Internet of Things
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: Yu-Jyun Han Advisor: Huei-Wen Ferng
    • With the widespread application of the Internet of things (IoT) in various fields, the associated c…
    • Clicks: 1191Downloads: 0
    • Full text public date 2025/08/31 (Intranet public)
    • Full text public date 2025/08/31 (Internet public)
    • Full text public date 2025/08/31 (National library)

    2

    Intrusion Detection System with Temporal Relationships
    • Department of Computer Science and Information Engineering /96/ Master
    • Author: Yen-Chin Lee Advisor: Hsing-Kuo Pao
    • In society nowadays, the use of Internet becomes more prevalent. However, as the Internet developed…
    • Clicks: 1061Downloads: 0
    • Full text public date 2013/08/05 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Cooperative Dissemination and Detection System for a Vehicular Ad-Hoc Network
    • Department of Computer Science and Information Engineering /98/ Master
    • Author: Jeng-Li Huang Advisor: Huei-Wen Ferng
    • In these years, applications for MANET communication become the extensive trends. Vehicular Ad-Hoc …
    • Clicks: 459Downloads: 0
    • Full text public date 2015/08/02 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Intrusion Detection Based on Principal Component Analysis and Cascaded Extreme Learning Machine
    • Department of Electronic and Computer Engineering /107/ Master
    • Author: ZHEN-YU DU Advisor: Wei-Mei Chen
    • Along with the prosperous development of information network, information security has undoubtedly …
    • Clicks: 1064Downloads: 0
    • Full text public date 2024/08/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)
    1