Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Ya-Hui Ou"'
Enhancement to the Effectiveness of Spam Filters by using Statistical Test and Pareto's Optimization
97
Because of the popularity of Internet and wide use of E-mail the volume of spam mails keeps growing rapidly. The growing volume of spam mails annoys people and affects work efficiency significantly. Most previous researches focused on develop
Because of the popularity of Internet and wide use of E-mail the volume of spam mails keeps growing rapidly. The growing volume of spam mails annoys people and affects work efficiency significantly. Most previous researches focused on develop
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/70269225957826511889
Autor:
YA-HUI OU-YANG, 歐陽亞慧
96
The motivation of this research is to help the security employee’s to program their harmonious life between the work and their leisure, thus can help to promote their job performance. Kinmen Area is the object of this study.The purpose of o
The motivation of this research is to help the security employee’s to program their harmonious life between the work and their leisure, thus can help to promote their job performance. Kinmen Area is the object of this study.The purpose of o
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/8hky44
Publikováno v:
Computer Science & Information Technology (CS & IT).
To gain insight into potential cyber threats, this research proposes a novel automatic threat action retrieval system, which collects and analyzes various data sources including security news, incident analysis reports, and darknet hacker forums and
Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks
Publikováno v:
ICEA
With the advancement of technology, modern people increasingly tend to communicate with other people through electronic products, and various relationships gradually become alienated, including the Parent-Child Relationship. Parent-child relationship
Publikováno v:
International Journal of Computer and Electrical Engineering. 10:241-247
Publikováno v:
Journal of Information Security and Applications. 20:26-36
Enormous web pages are visited each day over a network and malicious websites might infect user machines. To identify malicious web sites, the most reliable approach is honeypot, an execution-based method. The vast amount of http traffic makes sandbo
Publikováno v:
Applied Mechanics and Materials. 311:87-92
Energy-efficient routing is a very important issue in wireless sensor networks. An efficient routing method can avoid unnecessary data transmission and thus saves more power to extend the life of a network. The Connected Dominating Set (CDS) is a com
Publikováno v:
AINA Workshops
Targeted cyber attacks play a critical role in disrupting network infrastructure and information privacy. Based on the incident investigation, Intelligence gathering is the first phase of such attacks. To evade detection, hacker may make use of botne
Publikováno v:
CPSNA
An increasing number of security incidents on industrial control systems drew a lot of concerns lately. Many attacks involved multiple attack vectors similar to internet attacks. However, CPS are more vulnerable to attacks. To evade detection, a hack
Publikováno v:
2013 International Symposium on Next-Generation Electronics.
Cloud computing provides business new working paradigm with the benefit of reducing cost and sharing resource. Tasks from different users may be performed on the same machine. Therefore, one primary security concern is whether user data is secure in