Zobrazeno 1 - 10
of 321
pro vyhledávání: '"Yuan-Cheng Lai"'
Autor:
Zheng-Shao Chen, R. Vaitheeshwari, Eric Hsiao-Kuang Wu, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Asad Ali
Publikováno v:
IEEE Access, Vol 12, Pp 141851-141865 (2024)
Advanced Persistent Threat (APT) groups pose significant cybersecurity threats due to their sophisticated and persistent nature. This study introduces a novel methodology to understand their collaborative patterns and shared objectives, which is cruc
Externí odkaz:
https://doaj.org/article/fc5ade556af345fa93441377d79f694b
Publikováno v:
Journal of Communications Software and Systems, Vol 19, Iss 4, Pp 278-288 (2023)
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are two transformative technologies that offer distinct benefits. SDN virtualizes the control plane by separating it from the data plane, while NFV virtualizes the data plane
Externí odkaz:
https://doaj.org/article/0b9c1b6a019c4d36b59e60051b01a64b
Publikováno v:
IEEE Access, Vol 10, Pp 15247-15260 (2022)
As a result of the explosion of security attacks and the complexity of modern networks, machine learning (ML) has recently become the favored approach for intrusion detection systems (IDS). However, the ML approach usually faces three challenges: mas
Externí odkaz:
https://doaj.org/article/0b894e7af5fd4cab87e539ceac029d9b
Publikováno v:
Sensors, Vol 22, Iss 9, p 3323 (2022)
In an IoT (Internet of Things) system where each IoT device has one/many RFID tags, there might be many RFID tags. However, when multiple tags respond to the reader’s interrogation at the same time, their signals collide. Due to the collision, the
Externí odkaz:
https://doaj.org/article/ab90813d45204777be3ecd89d281dedd
Publikováno v:
Micromachines, Vol 12, Iss 9, p 1019 (2021)
The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data. The DetNet applies flow virtualization to satisfy time-
Externí odkaz:
https://doaj.org/article/3ada71204dce420d90e995c4b262fe5b
Publikováno v:
Sensors, Vol 21, Iss 4, p 1027 (2021)
(1) Background: Link flooding attacks (LFA) are a spatiotemporal attack pattern of distributed denial-of-service (DDoS) that arranges bots to send low-speed traffic to backbone links and paralyze servers in the target area. (2) Problem: The tradition
Externí odkaz:
https://doaj.org/article/65800df08210449c86b3f8a773937c5e
Publikováno v:
Sensors, Vol 19, Iss 10, p 2304 (2019)
In Device-to-Device (D2D) communications, the first step is to find all of the neighboring peers in the network by performing a peer discovery process. Most previous studies use the social behaviors of the users to adjust the sending rates of the pee
Externí odkaz:
https://doaj.org/article/cb7c3299c3ad4428ac814ee61c7a93b5
Publikováno v:
Journal of Communications Software and Systems, Vol 9, Iss 4, Pp 212-221 (2013)
Capturing and replaying network flows are important for testing network devices. Replayed traffic should reproduce effects similar to live traffic. This work presents methods to measure the event reproduction ratio, and studies the effectiveness of s
Externí odkaz:
https://doaj.org/article/0ae0fefe9f5048819e3b63388e8b7394
Autor:
Chih-Wen Huang Chih-Wen Huang, Yuan-Cheng Lai Chih-Wen Huang, Chun-Yen Chiu Yuan-Cheng Lai, Pi-Tzong Jan Chun-Yen Chiu, Yen-Hung Chen Pi-Tzong Jan
Publikováno v:
網際網路技術學刊. 24:389-400
Digital transformation becomes the focus of all industries, governments are actively promoting it to increase the welfare of the people in the technological maturity era. Hospitals are highly relevant to people’s lives, and their continuous improve
Autor:
Yuan-Cheng Lai, Didik Sudyana, Ying-Dar Lin, Miel Verkerken, Laurens D’hooge, Tim Wauters, Bruno Volckaert, Filip De Turck
Publikováno v:
IEEE Transactions on Network and Service Management. 20:672-683