Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Bing-Kai Hong"'
Autor:
Bing-Kai Hong, 洪稟凱
106
Radio access network virtualization, its main concept is to abstract and share infrastructure the radio resources. To implement the software radio technology, the base station is splitted into a hardware remote radio frequency RRH and a soft
Radio access network virtualization, its main concept is to abstract and share infrastructure the radio resources. To implement the software radio technology, the base station is splitted into a hardware remote radio frequency RRH and a soft
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/tje2m4
Publikováno v:
IEEE Internet of Things Magazine. 5:76-81
Publikováno v:
2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW).
Publikováno v:
SP Workshops
This demonstration presents an automatic IoT runtime platform with a web interface, ELF Analyzer, where suspicious ELF files uploaded by users could be executed and dynamically analyzed for malicious behavior identification. The key component of our
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030440374
AINA Workshops
AINA Workshops
The infamous distributed denial-of-service (DDoS) cyberattack in which attackers aim to disrupt normal services provided by one or more servers over the Internet based on distributed resources have been deeply investigated. However, the impacts on th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9cb15bc09b9b46450ef18087d9c76461
https://doi.org/10.1007/978-3-030-44038-1_50
https://doi.org/10.1007/978-3-030-44038-1_50
Publikováno v:
VTC-Fall
Long Term Evolution (LTE) is governing mobile communication technology in recent years, and its security issue always receives lots of attention. Due to the popularity of software defined radio (SDR), low-cost development hardware, and open source LT
Autor:
Jr-Wei Huang, Tao Ban, Daisuke Inoue, Koji Nakao, Ryoichi Isawa, Bing-Kai Hong, Shin-Ming Cheng
Publikováno v:
AsiaJCIS
This paper provides a measurement study on the IoT firmware. Based on a thorough review of the state of art of IoT firmware emulation and vulnerability scan tools and techniques, we propose a unified framework that could monitor the security status o
Publikováno v:
VCIP
The love of beauty is an essential part of all healthy human nature. Not only do women pay great attention to facial care, but in recent years, men's consumption in this area has also grown year by year. In facial care, in addition to sunscreen, skin
Publikováno v:
ISCE
This paper presents a dielectric capacitive non-invasive liquid level detection method and device without the needs of physical quantity sampling. The procedure is that, by using a tiny electric field without destroying the system structure and state