Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Chia-Mai Chen"). Showing records 1 – 21 of 21 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Tsai, Chen-yu. Applications of Homomorphic Encryption.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 First, we prove that if an asymmetric homomorphic encryption (homomorphic on addoperation) which can detect zero, detect equality, compare the value or detect overflow without… (more)

Subjects/Keywords: IND-CPA; detect zero; symmetric encryption scheme; asymmetric encryption; homomorphic encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, C. (2013). Applications of Homomorphic Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Web. 30 Mar 2020.

Vancouver:

Tsai C. Applications of Homomorphic Encryption. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai C. Applications of Homomorphic Encryption. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Yuan, Liang-Chung. Study of Personal Privacy Information Protection Operation In Government Agencies.

Degree: Master, Information Management, 2013, NSYSU

 It can be found that some of personal profiles were theft or leaked from the recent fraud cases, whether in public or non-public agencies. The… (more)

Subjects/Keywords: Personal Data Protection Act; personal data; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, L. (2013). Study of Personal Privacy Information Protection Operation In Government Agencies. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yuan, Liang-Chung. “Study of Personal Privacy Information Protection Operation In Government Agencies.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yuan, Liang-Chung. “Study of Personal Privacy Information Protection Operation In Government Agencies.” 2013. Web. 30 Mar 2020.

Vancouver:

Yuan L. Study of Personal Privacy Information Protection Operation In Government Agencies. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yuan L. Study of Personal Privacy Information Protection Operation In Government Agencies. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Lin, Hui-chun. Study of Effectiveness of Social Engineering Spam Prevention Operation.

Degree: Master, Information Management, 2013, NSYSU

 Due to the rise of e-organization, a great quantity of valuable and confidential information is saved in digitalized way. With the more population of computer… (more)

Subjects/Keywords: Social Engineering; Spam; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, H. (2013). Study of Effectiveness of Social Engineering Spam Prevention Operation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Hui-chun. “Study of Effectiveness of Social Engineering Spam Prevention Operation.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Hui-chun. “Study of Effectiveness of Social Engineering Spam Prevention Operation.” 2013. Web. 30 Mar 2020.

Vancouver:

Lin H. Study of Effectiveness of Social Engineering Spam Prevention Operation. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin H. Study of Effectiveness of Social Engineering Spam Prevention Operation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Chou, Chun-han. Malware Detection System Based on API Log Data Mining.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 As information technology improves, the Internet is involved in every area in our daily life. When the mobile devices and cloud computing technology start to… (more)

Subjects/Keywords: Classification; System Call; API; Data Mining; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chou, C. (2013). Malware Detection System Based on API Log Data Mining. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chou, Chun-han. “Malware Detection System Based on API Log Data Mining.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chou, Chun-han. “Malware Detection System Based on API Log Data Mining.” 2013. Web. 30 Mar 2020.

Vancouver:

Chou C. Malware Detection System Based on API Log Data Mining. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chou C. Malware Detection System Based on API Log Data Mining. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Liu, Ming-Che. APT Attack Detection Based on DNS Time Frequency Analysis.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 Recently, malware infection has become one of the most serious threats against information security. Analysis and detection against malware are regarded as an important issue… (more)

Subjects/Keywords: Malware; Traffic Analysis; APT Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, M. (2013). APT Attack Detection Based on DNS Time Frequency Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Web. 30 Mar 2020.

Vancouver:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Tseng, Yi-Fan. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a massage securely and efficiently as the message is… (more)

Subjects/Keywords: Multi-Receiver Encryption; Anonymity; Identity-Based Encryption; Bilinear Pairing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, Y. (2014). Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Web. 30 Mar 2020.

Vancouver:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Internet] [Thesis]. NSYSU; 2014. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Tseng, Shang-Wei. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Cloud computing is increasingly popular today. Cloud services such as data-outsourcing services provide a growing number of users access to cloud storage for large quantities… (more)

Subjects/Keywords: Dependable System; Data Outsourcing; Cloud-of-Clouds Approach; Cloud Computing; Data Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2014). Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Web. 30 Mar 2020.

Vancouver:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Internet] [Thesis]. NSYSU; 2014. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Chang, Tzu-Ching. Detecting Malware with DLL Injection And PE Infection.

Degree: Master, Information Management, 2016, NSYSU

 Advanced Persistent Attack Threat is one of notorious in enterprises and organization. APT attack is a highly organized, well-funded attack against a specific target .Cyber… (more)

Subjects/Keywords: Malware; PE File; PE Infection; APT Attack; DLL Injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, T. (2016). Detecting Malware with DLL Injection And PE Infection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Web. 30 Mar 2020.

Vancouver:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Internet] [Thesis]. NSYSU; 2016. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Kuo, Jui-hsiang. Study on the Integration of Information Security Management System and Personal Information Management System.

Degree: Master, Information Management, 2013, NSYSU

 With the formally carrying out of the Personal Information Protection Act, the Party is going to realize his own rights to his personal information. Therefore,… (more)

Subjects/Keywords: Personal Information Management System; Information Security Management System; Information Security and Personal Information Management System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, J. (2013). Study on the Integration of Information Security Management System and Personal Information Management System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Web. 30 Mar 2020.

Vancouver:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. LIN, Wen-yung. A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System.

Degree: Master, Information Management, 2014, NSYSU

 With the invention and application of information and communication technology, the world has entered the age of digital information, and the competitive environment in each… (more)

Subjects/Keywords: Information System; System Reengineering; Information System Reengineering; Tax Information System; Business Process Reengineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LIN, W. (2014). A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

LIN, Wen-yung. “A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System.” 2014. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

LIN, Wen-yung. “A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System.” 2014. Web. 30 Mar 2020.

Vancouver:

LIN W. A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System. [Internet] [Thesis]. NSYSU; 2014. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

LIN W. A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Lo, Wen-Ling. Botnet Detection Based on HTTP Header Anomaly.

Degree: Master, Information Management, 2015, NSYSU

 Nowadays, botnets use virus to infect computers all around the world and turn them into bots. By controlling the large number of bots, attacker can… (more)

Subjects/Keywords: Ant Colony Optimization; Behavior of botnets; HTTP Header; HTTP Botnet; DBScan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lo, W. (2015). Botnet Detection Based on HTTP Header Anomaly. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lo, Wen-Ling. “Botnet Detection Based on HTTP Header Anomaly.” 2015. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lo, Wen-Ling. “Botnet Detection Based on HTTP Header Anomaly.” 2015. Web. 30 Mar 2020.

Vancouver:

Lo W. Botnet Detection Based on HTTP Header Anomaly. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lo W. Botnet Detection Based on HTTP Header Anomaly. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Kuo, Yen-chih. Detecting the Accuracy of Highway Incident Warnings in VANETs.

Degree: Master, Information Management, 2016, NSYSU

 VANET, so called Vehicular Ad hoc Network, uses cars as nodes to send packages to other cars or road infrastructure. In this basis, VANET can… (more)

Subjects/Keywords: Misbehavior detect; Verify alarm; Car Cluster; Beacon; VANET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, Y. (2016). Detecting the Accuracy of Highway Incident Warnings in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Web. 30 Mar 2020.

Vancouver:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Internet] [Thesis]. NSYSU; 2016. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Chang, Yu-han. Improving Detection Efficiency using Cloud Computing.

Degree: Master, Information Management, 2016, NSYSU

 Recently, with the popularity and convenience features of Internet, Internet has become one of the attacker profitable way to enter the local area network. Most… (more)

Subjects/Keywords: Distributed File System; Cloud Computing; Intrusion Detection System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, Y. (2016). Improving Detection Efficiency using Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Web. 30 Mar 2020.

Vancouver:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Internet] [Thesis]. NSYSU; 2016. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Lin, Cheng-Ting. A Secret-Sharing-Based Method for Cloud Storage System.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many… (more)

Subjects/Keywords: exclusive-or operation; random number; cloud computing system; secret sharing; cloud storage system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, C. (2015). A Secret-Sharing-Based Method for Cloud Storage System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Cheng-Ting. “A Secret-Sharing-Based Method for Cloud Storage System.” 2015. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Cheng-Ting. “A Secret-Sharing-Based Method for Cloud Storage System.” 2015. Web. 30 Mar 2020.

Vancouver:

Lin C. A Secret-Sharing-Based Method for Cloud Storage System. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin C. A Secret-Sharing-Based Method for Cloud Storage System. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. Wang, Ying-Fang. Defense Mechanism of Industrial Control Systems.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, the process of industrial development improved from complex to simple. The theory of automatic control also develops rapidly, and the level of… (more)

Subjects/Keywords: Conpot; SNMP; Industrial Control System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2015). Defense Mechanism of Industrial Control Systems. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Ying-Fang. “Defense Mechanism of Industrial Control Systems.” 2015. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Ying-Fang. “Defense Mechanism of Industrial Control Systems.” 2015. Web. 30 Mar 2020.

Vancouver:

Wang Y. Defense Mechanism of Industrial Control Systems. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. Defense Mechanism of Industrial Control Systems. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Wang, I-Kai. Multi-layer Incremental Clustering for Malware Analysis.

Degree: Master, Information Management, 2015, NSYSU

 The threat of malware is definitely the most important topic of internet security. As the growth of malware is faster ever and ever, the defense… (more)

Subjects/Keywords: incremental clustering; malware detection; static analysis; malware family

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, I. (2015). Multi-layer Incremental Clustering for Malware Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, I-Kai. “Multi-layer Incremental Clustering for Malware Analysis.” 2015. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, I-Kai. “Multi-layer Incremental Clustering for Malware Analysis.” 2015. Web. 30 Mar 2020.

Vancouver:

Wang I. Multi-layer Incremental Clustering for Malware Analysis. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang I. Multi-layer Incremental Clustering for Malware Analysis. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. LAI, CHIPING. Detecting Intrusions Using Social Network Analysis And Bayesian Network.

Degree: Master, Information Management, 2015, NSYSU

 The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target… (more)

Subjects/Keywords: Bayesian Network Model; Intrusion Detection System; Targeted Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LAI, C. (2015). Detecting Intrusions Using Social Network Analysis And Bayesian Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Web. 30 Mar 2020.

Vancouver:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Tsai, Yu-Hsuan. Fast Mobile Malware Detection Based on Hybrid Analysis Method.

Degree: Master, Information Management, 2016, NSYSU

 More and more people nowadays use mobile devices. Mobile malwares are also increase very quickly. How to protect mobile devices become an important issue. The… (more)

Subjects/Keywords: Android; malware; genetic algorithm; static analysis; reverse engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, Y. (2016). Fast Mobile Malware Detection Based on Hybrid Analysis Method. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Yu-Hsuan. “Fast Mobile Malware Detection Based on Hybrid Analysis Method.” 2016. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Yu-Hsuan. “Fast Mobile Malware Detection Based on Hybrid Analysis Method.” 2016. Web. 30 Mar 2020.

Vancouver:

Tsai Y. Fast Mobile Malware Detection Based on Hybrid Analysis Method. [Internet] [Thesis]. NSYSU; 2016. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai Y. Fast Mobile Malware Detection Based on Hybrid Analysis Method. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. YU, WEI-JEN. Implementation of Disaster Risk Avoidance Mobile Application.

Degree: Master, Information Management, 2015, NSYSU

 It is very important about timing in any kinds of Disasters. Sometimes public alerts is not enough quickly for informal government institution. This research is… (more)

Subjects/Keywords: Public Alerts; Mobile Application; Android APP; MySQL; PHP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

YU, W. (2015). Implementation of Disaster Risk Avoidance Mobile Application. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

YU, WEI-JEN. “Implementation of Disaster Risk Avoidance Mobile Application.” 2015. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

YU, WEI-JEN. “Implementation of Disaster Risk Avoidance Mobile Application.” 2015. Web. 30 Mar 2020.

Vancouver:

YU W. Implementation of Disaster Risk Avoidance Mobile Application. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

YU W. Implementation of Disaster Risk Avoidance Mobile Application. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Lin, Je-Ming. Detecting Mobile Application Malicious Behavior Based on Taint Propagation.

Degree: Master, Information Management, 2013, NSYSU

 When detecting malicious applications on mobile devices, the current main approach is to apply dynamic analysis detection, since dynamic analysis can be directly used for… (more)

Subjects/Keywords: malicious behavior detection; reversing engineering; source code; static analysis; Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2013). Detecting Mobile Application Malicious Behavior Based on Taint Propagation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Je-Ming. “Detecting Mobile Application Malicious Behavior Based on Taint Propagation.” 2013. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Je-Ming. “Detecting Mobile Application Malicious Behavior Based on Taint Propagation.” 2013. Web. 30 Mar 2020.

Vancouver:

Lin J. Detecting Mobile Application Malicious Behavior Based on Taint Propagation. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. Detecting Mobile Application Malicious Behavior Based on Taint Propagation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Yang, Wan-Shiou. Mining Workflow Instances to Support Workflow Schema Design.

Degree: Master, Information Management, 2000, NSYSU

 Facing the increasing global competition, modern business organizations have to respond quickly and correctly to the constant changing environment to ensure their competitive advantages. This… (more)

Subjects/Keywords: Workflow Management; Business Process Reengineering (BPR); Process Discovery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, W. (2000). Mining Workflow Instances to Support Workflow Schema Design. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523100-143315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Wan-Shiou. “Mining Workflow Instances to Support Workflow Schema Design.” 2000. Thesis, NSYSU. Accessed March 30, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523100-143315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Wan-Shiou. “Mining Workflow Instances to Support Workflow Schema Design.” 2000. Web. 30 Mar 2020.

Vancouver:

Yang W. Mining Workflow Instances to Support Workflow Schema Design. [Internet] [Thesis]. NSYSU; 2000. [cited 2020 Mar 30]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523100-143315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yang W. Mining Workflow Instances to Support Workflow Schema Design. [Thesis]. NSYSU; 2000. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0523100-143315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.