Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Gu-Hsin Lai"). Showing records 1 – 20 of 20 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Chang, Tzu-Ching. Detecting Malware with DLL Injection And PE Infection.

Degree: Master, Information Management, 2016, NSYSU

 Advanced Persistent Attack Threat is one of notorious in enterprises and organization. APT attack is a highly organized, well-funded attack against a specific target .Cyber… (more)

Subjects/Keywords: Malware; PE File; PE Infection; APT Attack; DLL Injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, T. (2016). Detecting Malware with DLL Injection And PE Infection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Web. 20 Nov 2019.

Vancouver:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. LIN, Wen-yung. A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System.

Degree: Master, Information Management, 2014, NSYSU

 With the invention and application of information and communication technology, the world has entered the age of digital information, and the competitive environment in each… (more)

Subjects/Keywords: Information System; System Reengineering; Information System Reengineering; Tax Information System; Business Process Reengineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LIN, W. (2014). A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

LIN, Wen-yung. “A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System.” 2014. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

LIN, Wen-yung. “A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System.” 2014. Web. 20 Nov 2019.

Vancouver:

LIN W. A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

LIN W. A Study of Reengineering for Information Systems ï¼ The Case of Taxation Information System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803114-132538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Lo, Wen-Ling. Botnet Detection Based on HTTP Header Anomaly.

Degree: Master, Information Management, 2015, NSYSU

 Nowadays, botnets use virus to infect computers all around the world and turn them into bots. By controlling the large number of bots, attacker can… (more)

Subjects/Keywords: Ant Colony Optimization; Behavior of botnets; HTTP Header; HTTP Botnet; DBScan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lo, W. (2015). Botnet Detection Based on HTTP Header Anomaly. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lo, Wen-Ling. “Botnet Detection Based on HTTP Header Anomaly.” 2015. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lo, Wen-Ling. “Botnet Detection Based on HTTP Header Anomaly.” 2015. Web. 20 Nov 2019.

Vancouver:

Lo W. Botnet Detection Based on HTTP Header Anomaly. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lo W. Botnet Detection Based on HTTP Header Anomaly. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Hsu, Sung-Chien. Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks.

Degree: Master, Information Management, 2015, NSYSU

 Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in… (more)

Subjects/Keywords: IPv6; wireless sensor network; wormhole attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, S. (2015). Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Sung-Chien. “Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks.” 2015. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Sung-Chien. “Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks.” 2015. Web. 20 Nov 2019.

Vancouver:

Hsu S. Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu S. Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Kuo, Yen-chih. Detecting the Accuracy of Highway Incident Warnings in VANETs.

Degree: Master, Information Management, 2016, NSYSU

 VANET, so called Vehicular Ad hoc Network, uses cars as nodes to send packages to other cars or road infrastructure. In this basis, VANET can… (more)

Subjects/Keywords: Misbehavior detect; Verify alarm; Car Cluster; Beacon; VANET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, Y. (2016). Detecting the Accuracy of Highway Incident Warnings in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Web. 20 Nov 2019.

Vancouver:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Chang, Yu-han. Improving Detection Efficiency using Cloud Computing.

Degree: Master, Information Management, 2016, NSYSU

 Recently, with the popularity and convenience features of Internet, Internet has become one of the attacker profitable way to enter the local area network. Most… (more)

Subjects/Keywords: Distributed File System; Cloud Computing; Intrusion Detection System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, Y. (2016). Improving Detection Efficiency using Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Web. 20 Nov 2019.

Vancouver:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Wang, I-Kai. Multi-layer Incremental Clustering for Malware Analysis.

Degree: Master, Information Management, 2015, NSYSU

 The threat of malware is definitely the most important topic of internet security. As the growth of malware is faster ever and ever, the defense… (more)

Subjects/Keywords: incremental clustering; malware detection; static analysis; malware family

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, I. (2015). Multi-layer Incremental Clustering for Malware Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, I-Kai. “Multi-layer Incremental Clustering for Malware Analysis.” 2015. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, I-Kai. “Multi-layer Incremental Clustering for Malware Analysis.” 2015. Web. 20 Nov 2019.

Vancouver:

Wang I. Multi-layer Incremental Clustering for Malware Analysis. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang I. Multi-layer Incremental Clustering for Malware Analysis. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. LAI, CHIPING. Detecting Intrusions Using Social Network Analysis And Bayesian Network.

Degree: Master, Information Management, 2015, NSYSU

 The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target… (more)

Subjects/Keywords: Bayesian Network Model; Intrusion Detection System; Targeted Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LAI, C. (2015). Detecting Intrusions Using Social Network Analysis And Bayesian Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Web. 20 Nov 2019.

Vancouver:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Tsai, Yu-Hsuan. Fast Mobile Malware Detection Based on Hybrid Analysis Method.

Degree: Master, Information Management, 2016, NSYSU

 More and more people nowadays use mobile devices. Mobile malwares are also increase very quickly. How to protect mobile devices become an important issue. The… (more)

Subjects/Keywords: Android; malware; genetic algorithm; static analysis; reverse engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, Y. (2016). Fast Mobile Malware Detection Based on Hybrid Analysis Method. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Yu-Hsuan. “Fast Mobile Malware Detection Based on Hybrid Analysis Method.” 2016. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Yu-Hsuan. “Fast Mobile Malware Detection Based on Hybrid Analysis Method.” 2016. Web. 20 Nov 2019.

Vancouver:

Tsai Y. Fast Mobile Malware Detection Based on Hybrid Analysis Method. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai Y. Fast Mobile Malware Detection Based on Hybrid Analysis Method. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0522114-000113

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Fu, Jung-Kuang. The Design of Monitoring Distributed Systems in Cloud.

Degree: Master, Information Management, 2016, NSYSU

 In the technology advancement today, IT Management now has been facing a vast and complex information environment. With the rise of Cloud Computing and Virtual… (more)

Subjects/Keywords: Zabbix Monitoring; System maintenance; Information security; Cloud IDC; System monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fu, J. (2016). The Design of Monitoring Distributed Systems in Cloud. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516116-172147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fu, Jung-Kuang. “The Design of Monitoring Distributed Systems in Cloud.” 2016. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516116-172147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fu, Jung-Kuang. “The Design of Monitoring Distributed Systems in Cloud.” 2016. Web. 20 Nov 2019.

Vancouver:

Fu J. The Design of Monitoring Distributed Systems in Cloud. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516116-172147.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fu J. The Design of Monitoring Distributed Systems in Cloud. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0516116-172147

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Chuang, Pan-Jo. Ransomware Detection by Monitoring I/O Requests.

Degree: Master, Information Management, 2017, NSYSU

 In recent years, the major security companies all report ransomware as one of major parts in their annual threat analysis reports. Large viruses spread network… (more)

Subjects/Keywords: Malware; Dynamic Detection; Ransomware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chuang, P. (2017). Ransomware Detection by Monitoring I/O Requests. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chuang, Pan-Jo. “Ransomware Detection by Monitoring I/O Requests.” 2017. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chuang, Pan-Jo. “Ransomware Detection by Monitoring I/O Requests.” 2017. Web. 20 Nov 2019.

Vancouver:

Chuang P. Ransomware Detection by Monitoring I/O Requests. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chuang P. Ransomware Detection by Monitoring I/O Requests. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Chang, Che-cheng. Persistent Threat Detection Using Hidden Markov Model.

Degree: Master, Information Management, 2013, NSYSU

 In recent years the types of attack has apparently moved from single attack behavior to more phased attack behavior, new attack type called Advanced Persistent… (more)

Subjects/Keywords: Intrusion Detection System; Social Engineering; Hidden Markov Model; Advanced Persistent Threat; BotHunter

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, C. (2013). Persistent Threat Detection Using Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-145205

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Che-cheng. “Persistent Threat Detection Using Hidden Markov Model.” 2013. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-145205.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Che-cheng. “Persistent Threat Detection Using Hidden Markov Model.” 2013. Web. 20 Nov 2019.

Vancouver:

Chang C. Persistent Threat Detection Using Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-145205.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang C. Persistent Threat Detection Using Hidden Markov Model. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-145205

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Chiang, Wen-Ching. Behavior Analysis of Mobile Malware Based on Information Leakage.

Degree: Master, Information Management, 2013, NSYSU

 With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile… (more)

Subjects/Keywords: Android; Behavior Analysis; Mobile Device; Sensitive Information; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiang, W. (2013). Behavior Analysis of Mobile Malware Based on Information Leakage. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0707113-101154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiang, Wen-Ching. “Behavior Analysis of Mobile Malware Based on Information Leakage.” 2013. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0707113-101154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiang, Wen-Ching. “Behavior Analysis of Mobile Malware Based on Information Leakage.” 2013. Web. 20 Nov 2019.

Vancouver:

Chiang W. Behavior Analysis of Mobile Malware Based on Information Leakage. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0707113-101154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiang W. Behavior Analysis of Mobile Malware Based on Information Leakage. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0707113-101154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Huang, Chiao-Wei. Incremental Clustering Malware from Honeypots.

Degree: Master, Information Management, 2013, NSYSU

 In recent years, cybercriminals use new malware or variants in order to effectively evade inspection from security mechanisms. The honeypot is able to capture the… (more)

Subjects/Keywords: Incremental clustering; Source code similarity; Static analysis; Honeypot; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, C. (2013). Incremental Clustering Malware from Honeypots. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-152613

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Chiao-Wei. “Incremental Clustering Malware from Honeypots.” 2013. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-152613.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Chiao-Wei. “Incremental Clustering Malware from Honeypots.” 2013. Web. 20 Nov 2019.

Vancouver:

Huang C. Incremental Clustering Malware from Honeypots. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-152613.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang C. Incremental Clustering Malware from Honeypots. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713113-152613

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. YU, WEI-JEN. Implementation of Disaster Risk Avoidance Mobile Application.

Degree: Master, Information Management, 2015, NSYSU

 It is very important about timing in any kinds of Disasters. Sometimes public alerts is not enough quickly for informal government institution. This research is… (more)

Subjects/Keywords: Public Alerts; Mobile Application; Android APP; MySQL; PHP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

YU, W. (2015). Implementation of Disaster Risk Avoidance Mobile Application. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

YU, WEI-JEN. “Implementation of Disaster Risk Avoidance Mobile Application.” 2015. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

YU, WEI-JEN. “Implementation of Disaster Risk Avoidance Mobile Application.” 2015. Web. 20 Nov 2019.

Vancouver:

YU W. Implementation of Disaster Risk Avoidance Mobile Application. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

YU W. Implementation of Disaster Risk Avoidance Mobile Application. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0030115-115315

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Ou, Ya-Hui. Detecting Targeted Attacks by Risk Evaluation.

Degree: PhD, Information Management, 2017, NSYSU

 More recently, the problems of targeted attack have been the major subject of study in the fields of network attack research due to the increase… (more)

Subjects/Keywords: targeted attack; feature reduce; rough set theory; intrusion detection system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ou, Y. (2017). Detecting Targeted Attacks by Risk Evaluation. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151

Chicago Manual of Style (16th Edition):

Ou, Ya-Hui. “Detecting Targeted Attacks by Risk Evaluation.” 2017. Doctoral Dissertation, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151.

MLA Handbook (7th Edition):

Ou, Ya-Hui. “Detecting Targeted Attacks by Risk Evaluation.” 2017. Web. 20 Nov 2019.

Vancouver:

Ou Y. Detecting Targeted Attacks by Risk Evaluation. [Internet] [Doctoral dissertation]. NSYSU; 2017. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151.

Council of Science Editors:

Ou Y. Detecting Targeted Attacks by Risk Evaluation. [Doctoral Dissertation]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0231117-135151


NSYSU

17. Wang, Tse-yao. The study of data preprocessing difference to impact the botnet detection performance.

Degree: PhD, Information Management, 2016, NSYSU

 Many studies employ machine learning to detect botnet C&C communications traffic quite effective. If the former data handled properly, it will affect the final detection… (more)

Subjects/Keywords: data transformation; machine learning; Botnet detection; Rough Set Theory; feature selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, T. (2016). The study of data preprocessing difference to impact the botnet detection performance. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613116-112523

Chicago Manual of Style (16th Edition):

Wang, Tse-yao. “The study of data preprocessing difference to impact the botnet detection performance.” 2016. Doctoral Dissertation, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613116-112523.

MLA Handbook (7th Edition):

Wang, Tse-yao. “The study of data preprocessing difference to impact the botnet detection performance.” 2016. Web. 20 Nov 2019.

Vancouver:

Wang T. The study of data preprocessing difference to impact the botnet detection performance. [Internet] [Doctoral dissertation]. NSYSU; 2016. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613116-112523.

Council of Science Editors:

Wang T. The study of data preprocessing difference to impact the botnet detection performance. [Doctoral Dissertation]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0613116-112523


NSYSU

18. Tsai, Zheng-Xun. An Automatic Forensic System for Incident Response.

Degree: Master, Information Management, 2018, NSYSU

 In recent years, there are more and more cyber-attacks targeting at Taiwan. Govern- ments, academic institutes, enterprises and even people in Taiwan are the victims… (more)

Subjects/Keywords: Incidents Response; Automatic; Digital Forensics; Malware Detection; Tools Integrate

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, Z. (2018). An Automatic Forensic System for Incident Response. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-200932

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Zheng-Xun. “An Automatic Forensic System for Incident Response.” 2018. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-200932.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Zheng-Xun. “An Automatic Forensic System for Incident Response.” 2018. Web. 20 Nov 2019.

Vancouver:

Tsai Z. An Automatic Forensic System for Incident Response. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-200932.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai Z. An Automatic Forensic System for Incident Response. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-200932

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. Lin, Ze-yu. Detecting Malicious Behavior of Process Injection.

Degree: Master, Information Management, 2018, NSYSU

 Enterprises and government agencies are confronted with the threat of Advanced Persistent Threats (APT), which is featured by its concealment. APT attacks can evade detection… (more)

Subjects/Keywords: Convolutional Neural Network; Malware; Transfer Learning; Dynamic Linked Library; Process Injection; Advanced Persistent Threats

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Z. (2018). Detecting Malicious Behavior of Process Injection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0804118-150656

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Ze-yu. “Detecting Malicious Behavior of Process Injection.” 2018. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0804118-150656.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Ze-yu. “Detecting Malicious Behavior of Process Injection.” 2018. Web. 20 Nov 2019.

Vancouver:

Lin Z. Detecting Malicious Behavior of Process Injection. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0804118-150656.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Z. Detecting Malicious Behavior of Process Injection. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0804118-150656

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Lin, Je-Ming. Detecting Mobile Application Malicious Behavior Based on Taint Propagation.

Degree: Master, Information Management, 2013, NSYSU

 When detecting malicious applications on mobile devices, the current main approach is to apply dynamic analysis detection, since dynamic analysis can be directly used for… (more)

Subjects/Keywords: malicious behavior detection; reversing engineering; source code; static analysis; Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2013). Detecting Mobile Application Malicious Behavior Based on Taint Propagation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Je-Ming. “Detecting Mobile Application Malicious Behavior Based on Taint Propagation.” 2013. Thesis, NSYSU. Accessed November 20, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Je-Ming. “Detecting Mobile Application Malicious Behavior Based on Taint Propagation.” 2013. Web. 20 Nov 2019.

Vancouver:

Lin J. Detecting Mobile Application Malicious Behavior Based on Taint Propagation. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 20]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. Detecting Mobile Application Malicious Behavior Based on Taint Propagation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0810113-121716

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.