English  |  正體中文  |  简体中文  |  0  
???header.visitor??? :  52093607    ???header.onlineuser??? :  1057
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"y huang"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 1-10 of 20  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page

Institution Date Title Author
臺大學術典藏 2019-10-31T06:58:44Z Data Prefetching and Eviction Mechanisms of In-memory Storage Systems Based on Scheduling for Big Data Processing SY-YEN KUO;S. Y. Kuo;Y. Huang;T. Y. Hsia;C. H. Chen; C. H. Chen; T. Y. Hsia; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T15:26:01Z A Programming Framework for Implementing Fault-Tolerant Mechanism on Raspberry Pi Y. L. Hu;Y. Huang;S. Y. Kuo; Y. L. Hu; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T15:00:21Z PCTopk: Privacy- and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-tiered Sensor Networks Y. T. Tsou;Y. L. Hu;Y. Huang;S. Y. Kuo; Y. T. Tsou; Y. L. Hu; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T09:50:28Z Investigating DNS traffic anomalies for malicious activities SY-YEN KUO; F. V. Yarochkin;V. Kropotov;Y. Huang;G. K. Ni;I. Y. Chen;S. Y. Kuo; F. V. Yarochkin; V. Kropotov; Y. Huang; G. K. Ni; I. Y. Chen; S. Y. Kuo
臺大學術典藏 2018-09-10T09:50:28Z Mining Large Network Reconnaissance Data F. Yarochkin;Y. Huang,;S. Y. Kuo; F. Yarochkin; Y. Huang,; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T09:24:53Z Holography: A Behavior-based Profiler for Malware Analysis Y. Dai;Y. Fyodor;M. W. Wu;Y. Huang;S. Y. Kuo; Y. Dai; Y. Fyodor; M. W. Wu; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T08:46:23Z Building Biologically Inspired Defenses Against Malicious Software F. V. Yarochkin; S. Y. Dai; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T07:41:51Z Holography: A Hardware Virtualization Tool for Malware Analysis S. Y. Dai;F. V. Yarochkin;Y. Huang;S. Y. Kuo; S. Y. Dai; F. V. Yarochkin; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T07:41:50Z Xprobe2++: Low volume remote network information gathering tool F. V. Yarochkin;O. Arkin;M. Kydyraliev;S. Y. Dai;Y. Huang;S. Y. Kuo; F. V. Yarochkin; O. Arkin; M. Kydyraliev; S. Y. Dai; Y. Huang; S. Y. Kuo; SY-YEN KUO
臺大學術典藏 2018-09-10T07:09:32Z Survey of Scan Chain Diagnosis Y. Huang;R Guo;W.T. Cheng;J. C.-M. Li; Y. Huang; R Guo; W.T. Cheng; J. C.-M. Li; CHIEN-MO LI

Showing items 1-10 of 20  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page