Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Yan-Ling Hwang"'
Autor:
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang, Yi-Wen Lai
Publikováno v:
Information, Vol 14, Iss 10, p 525 (2023)
The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT),
Externí odkaz:
https://doaj.org/article/d9dd3ce57566420eabdfccaef48afdc0
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 9838 (2022)
Coinhive released its browser-based cryptocurrency mining code in September 2017, and vicious web page writers, called vicious miners hereafter, began to embed mining JavaScript code into their web pages, called mining pages hereafter. As a result, b
Externí odkaz:
https://doaj.org/article/6cd6ffda334d4de1a3c3e1de16d1281c
Publikováno v:
Applied Sciences, Vol 12, Iss 16, p 8088 (2022)
The bothersome evil twin problem has an active user-side remedy in the form of the Wireless Packet Forwarding Detector (WPFD). The evil twin issue can lead to further security problems, including man-in-the-middle (MITM) attacks. Open public Wi-Fi co
Externí odkaz:
https://doaj.org/article/eb21c0de6ce94fe497a64920ab29606e
Publikováno v:
Applied Sciences, Vol 6, Iss 11, p 358 (2016)
Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down. In this paper, we present a three-way ha
Externí odkaz:
https://doaj.org/article/1fac42f6d8fe490db0d6f1728304feed
Publikováno v:
Computers & Electrical Engineering. 68:241-251
JavaScript is a standard of client-side scripting languages. Due to its cross-platform property, JavaScript is widely used in web pages. Hence its security problems can seriously influence the security of devices executing code written by it. This pa
Autor:
Chuan Sheng Wang, Yan Ling Hwang, Fu-Hau Hsu, Kai Wei Chang, Zhi Yao Zhong, Chia Hao Lee, Chuan Kai Kao
Publikováno v:
Computers & Electrical Engineering. 67:159-169
With the rapid growth of Infrastructure as a Service (IaaS), it becomes more important to increase reliability and availability of a service. In our patent, called Connector in the paper, we allow a server to be live migrated to another physical host
Publikováno v:
Applied Mechanics and Materials. :960-964
This study introduces a direct and intuitive method to resist certain apps from sending SMS message stealthily. According to the heuristic analysis and observation, it is apparently that a SMS message, which has the textual content originated from us
Autor:
Chuan Sheng Wang, Fu-Hau Hsu, Yan Ling Hwang, Shih Jen Chen, Yu Liang Hsu, Yu Hsiang Hsneh, Yao Hsin Chen
Publikováno v:
Applied Mechanics and Materials. :900-904
An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name to the legitimate one and is set up by an adversary. The user who associates to the evil twin, adversary may eaves-drops sensitive data on wireless communications to
Publikováno v:
Security and Communication Networks, Vol 2017 (2017)
Web-based botnets are popular nowadays. A Web-based botnet is a botnet whose C&C server and bots use HTTP protocol, the most universal and supported network protocol, to communicate with each other. Because the botnet communication can be hidden easi
Publikováno v:
Applied Mechanics and Materials. :928-933
In order to enhance students' learning motivation, scholars have been investigating the best teaching instruction methods for learning English. The efficacy of multimedia has drawn great attention to this issue and is presumed, under the assumption o