Showing
1 - 10
results of
10
for search '
WUU,LIH-CHYAU
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
WUU,LIH-CHYAU
Showing
1 - 10
results of
10
for search '
WUU,LIH-CHYAU
'
, query time: 0.17s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Self-Stabilization on Uniform Systems
by
Wuu
,
Lih
Chyau
,
伍麗樵
Published 1994
Get full text
Others
2
Android Malware Detection Based on API and Permission
by
Chen,KAI-JUN
,
陳凱軍
Published 2019
Other Authors:
“
...
WUU
,
LIH
-
CHYAU
...
”
Get full text
Others
3
Re-routing Cross-Layer Design for SDN Environment
by
YANG, CHAO-CHUNG
,
楊兆中
Published 2018
Other Authors:
“
...
WUU
,
LIH
-
CHYAU
...
”
Get full text
Others
4
Malware Detection and Classification Based on Machine Learning Technology
by
LI, HUEI-TANG
,
李輝堂
Published 2018
Other Authors:
“
...
WUU
,
LIH
-
CHYAU
...
”
Get full text
Others
5
Data Mining Based on MapReduce Technology
by
WU, I-CHUN
,
吳亦鈞
Published 2018
Other Authors:
“
...
WUU
,
LIH
-
CHYAU
...
”
Get full text
Others
6
IP Traceback Scheme for DRDoS Attack
by
Lin, Yu-Jen
,
林昱任
Published 2017
Other Authors:
“
...
Wuu
,
Lih
-
Chyau
...
”
Get full text
Others
7
Scalable Secure Key Management fro Dynamic Multicast Group
by
Wu Shih Ching
,
吳士慶
Published 2002
Other Authors:
“
...
Wuu
Lih
-
Chyau
...
”
Get full text
Others
8
Constructing Delay-bounded Multicase Trees Distributed Computing Environments
by
Shiao, Shing-Chyu
,
蕭興淇
Published 1997
Other Authors:
“
...
Wuu
,
Lih
-
Chyau
...
”
Get full text
Others
9
Malware API Mining Based On MapReduce Technology
by
LAI, JHEN-YOU
,
賴禎佑
Published 2016
Other Authors:
“
...
WUU
,
LIH
-
CHYAU
...
”
Get full text
Others
10
Multi-bit Based Modulo Function Steganography and Its Applications
by
KUO,SHAO-HUNG
,
郭紹宏
Published 2016
Other Authors:
“
...
WUU
,
LIH
-
CHYAU
...
”
Get full text
Others
Search Tools:
Get RSS Feed
—
Email this Search
Loading...