Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="malware detection"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    O-RAN-Enabled Malicious and Anomalous xAPP Detector
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: You-Run Chen Advisor: Shin-Ming Cheng
    • The Open Radio Access Network (O-RAN) is a next-generation RAN architecture that provides a more fl…
    • Clicks: 282Downloads: 0
    • Full text public date 2028/08/10 (Intranet public)
    • Full text public date 2028/08/10 (Internet public)
    • Full text public date 2028/08/10 (National library)

    2

    Hash-Based Function Call Graph Fusion Method for IoT Malware Detection
    • Department of Computer Science and Information Engineering /111/ Master
    • Author: Ming-Huang Lin Advisor: Shin-Ming Cheng
    • The rapid growth of the Internet of Things (IoT) brings convenience and efficiency improvements to …
    • Clicks: 314Downloads: 0
    • Full text public date 2026/08/16 (Intranet public)
    • Full text public date 2026/08/16 (Internet public)
    • Full text public date 2026/08/16 (National library)

    3

    Backdoor Attack against Malware Detector based on Data Extremum Analysis

    4

    Malware Detection Based on Dynamic Behavior Analysis
    • Department of Computer Science and Information Engineering /100/ Master
    • Author: Chun-chih Wu Advisor: Hsing-Kuo Pao
    • Malware detection has been one of the most important research topics since the time we start to use…
    • Clicks: 191Downloads: 1
    • Full text public date 2017/07/23 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    Basic Block-Based Embedding for IoT Malware Identification

    6

    Addressing Dataset Imbalance in Network Traffic-based Malware Detection Using Beyond-SMOTE Synthetic Data Generation

    7

    Structural Attack against Graph-­based IoT Malware Detection at Assembly Level
    1