Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Hui-Tang Lin"). Showing records 1 – 8 of 8 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Yuan, Tun-Jui. Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel.

Degree: Master, Information Management, 2013, NSYSU

 Maritime industry is an important industry of national economy, which is an indispensable strategic services industry to Taiwan (R.O.C). Maritime industry has a large contribution… (more)

Subjects/Keywords: Information Security; Semi-open Network; Vessel Information System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, T. (2013). Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yuan, Tun-Jui. “Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel.” 2013. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yuan, Tun-Jui. “Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel.” 2013. Web. 22 Aug 2019.

Vancouver:

Yuan T. Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yuan T. Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0630113-180259

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Yuan, Liang-Chung. Study of Personal Privacy Information Protection Operation In Government Agencies.

Degree: Master, Information Management, 2013, NSYSU

 It can be found that some of personal profiles were theft or leaked from the recent fraud cases, whether in public or non-public agencies. The… (more)

Subjects/Keywords: Personal Data Protection Act; personal data; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, L. (2013). Study of Personal Privacy Information Protection Operation In Government Agencies. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yuan, Liang-Chung. “Study of Personal Privacy Information Protection Operation In Government Agencies.” 2013. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yuan, Liang-Chung. “Study of Personal Privacy Information Protection Operation In Government Agencies.” 2013. Web. 22 Aug 2019.

Vancouver:

Yuan L. Study of Personal Privacy Information Protection Operation In Government Agencies. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yuan L. Study of Personal Privacy Information Protection Operation In Government Agencies. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0631113-111055

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Chang, Tzu-Ching. Detecting Malware with DLL Injection And PE Infection.

Degree: Master, Information Management, 2016, NSYSU

 Advanced Persistent Attack Threat is one of notorious in enterprises and organization. APT attack is a highly organized, well-funded attack against a specific target .Cyber… (more)

Subjects/Keywords: Malware; PE File; PE Infection; APT Attack; DLL Injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, T. (2016). Detecting Malware with DLL Injection And PE Infection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Web. 22 Aug 2019.

Vancouver:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Kuo, Yen-chih. Detecting the Accuracy of Highway Incident Warnings in VANETs.

Degree: Master, Information Management, 2016, NSYSU

 VANET, so called Vehicular Ad hoc Network, uses cars as nodes to send packages to other cars or road infrastructure. In this basis, VANET can… (more)

Subjects/Keywords: Misbehavior detect; Verify alarm; Car Cluster; Beacon; VANET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, Y. (2016). Detecting the Accuracy of Highway Incident Warnings in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Web. 22 Aug 2019.

Vancouver:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Chang, Yu-han. Improving Detection Efficiency using Cloud Computing.

Degree: Master, Information Management, 2016, NSYSU

 Recently, with the popularity and convenience features of Internet, Internet has become one of the attacker profitable way to enter the local area network. Most… (more)

Subjects/Keywords: Distributed File System; Cloud Computing; Intrusion Detection System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, Y. (2016). Improving Detection Efficiency using Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Web. 22 Aug 2019.

Vancouver:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Huang, Jhe-Jhun. Detecting Drive-by Download Based on Reputation System.

Degree: Master, Information Management, 2012, NSYSU

 Drive-by download is a sort of network attack which uses different techniques to plant malicious codes in their computers. It makes the traditional intrusion detection… (more)

Subjects/Keywords: Honeypot; Machine Learning; Drive-by Download; Reputation System; DNS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, J. (2012). Detecting Drive-by Download Based on Reputation System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-180904

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Jhe-Jhun. “Detecting Drive-by Download Based on Reputation System.” 2012. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-180904.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Jhe-Jhun. “Detecting Drive-by Download Based on Reputation System.” 2012. Web. 22 Aug 2019.

Vancouver:

Huang J. Detecting Drive-by Download Based on Reputation System. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-180904.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang J. Detecting Drive-by Download Based on Reputation System. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-180904

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Tsai, Min-ying. Mutilple Sensor Anomaly Correlation.

Degree: Master, Information Management, 2012, NSYSU

 IDS (Intrusion Detection System) detect intrusions and generate alerts to administrator. With Internet more and more popular, IDS products a lot of alerts make administrators… (more)

Subjects/Keywords: meta-log filtering; Alert correlation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, M. (2012). Mutilple Sensor Anomaly Correlation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Min-ying. “Mutilple Sensor Anomaly Correlation.” 2012. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Min-ying. “Mutilple Sensor Anomaly Correlation.” 2012. Web. 22 Aug 2019.

Vancouver:

Tsai M. Mutilple Sensor Anomaly Correlation. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai M. Mutilple Sensor Anomaly Correlation. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Tsai, Hung-Shiuan. Concise Analysis of Malware Behavior.

Degree: Master, Information Management, 2012, NSYSU

 In recent years the popularity of the internet, the network not only providing information to the general users to browse the contents of the site,… (more)

Subjects/Keywords: Virtual Machine; Memory Forensics; Malware Behavior; Dynamic Analysis; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, H. (2012). Concise Analysis of Malware Behavior. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183939

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Hung-Shiuan. “Concise Analysis of Malware Behavior.” 2012. Thesis, NSYSU. Accessed August 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183939.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Hung-Shiuan. “Concise Analysis of Malware Behavior.” 2012. Web. 22 Aug 2019.

Vancouver:

Tsai H. Concise Analysis of Malware Behavior. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Aug 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183939.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai H. Concise Analysis of Malware Behavior. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0110112-183939

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.