Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Wen-Yang Luo"'
Autor:
Wen-Yang Luo, 羅文揚
96
A denial-of-service (DoS) attack is a serious threat to the Internet security nowadays. According to a 2006 CSI/FBI Computer Crime and Security Survey, 25 percent of respondents whose computer detected DoS attacks in the last 12 months. Moreo
A denial-of-service (DoS) attack is a serious threat to the Internet security nowadays. According to a 2006 CSI/FBI Computer Crime and Security Survey, 25 percent of respondents whose computer detected DoS attacks in the last 12 months. Moreo
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/86322151792611924197
Autor:
Chuan Chiang Huang, Chien-Chih Chen, Tzung Han Jeng, Kuang Hung Chang, Yi-Ming Chen, Wen Yang Luo
Publikováno v:
International Journal of Grid and High Performance Computing. 13:12-29
As the application of network encryption technology expands, malicious attacks will also be protected by encryption mechanism, increasing the difficulty of detection. This paper focuses on the analysis of encrypted traffic in the network by hosting l
Autor:
Jeng Tzung-Han, Chuan-Chiang Huang, Chien-Chih Chen, Yi-Ming Chen, Wei-Ming Chan, Wen-Yang Luo
Publikováno v:
Proceedings of the 2nd International Conference on Computing and Big Data.
Network security lacks the verification of real world net flow data, and lacks a platform to collect and integrate net flow data and threat intelligence, so as to generate an evaluation benchmark for machine learning on cybersecurity. NetFlowTotal de
Publikováno v:
Applied Mechanics and Materials. 741:577-581
This paper introduces the common ways for pepper decorticating and the current status of their applications and effects. According to the actual needs of market development and our analysis on peppers’ physical structures, three kinds of decorticat
Publikováno v:
Advanced Materials Research. :687-691
Existing pepper fruit peeling machine for peeling incomplete, improper peeling force, pit protective film damaged, lead to a high impurity rate, pit crushing, unsatisfactory color and other issues. In order to solve these problems, manufacturing pepp
Publikováno v:
Advances in Data Mining. Applications and Theoretical Aspects ISBN: 9783642143991
ICDM
ICDM
Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of triggered alerts. Thus, reducing false alarms efficiently has become the most import
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca919f12bcc8cc4b97a6bdb1ad2cfbee
https://doi.org/10.1007/978-3-642-14400-4_46
https://doi.org/10.1007/978-3-642-14400-4_46