Detecting Remote Attacks
碩士 === 國立中山大學 === 資訊管理學系研究所 === 92 === With the advanced technology, our life has improved, however, it also brings the new model of crime events. Because the intrusion technique and intrusion tools are developed day by day, many computer crimes such as overstep system authority, intrusion events, c...
Main Authors: | Wang-tzu Han, 王辭寒 |
---|---|
Other Authors: | Chen-chia Mei |
Format: | Others |
Language: | zh-TW |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/05525494430963261526 |
Similar Items
-
The Effects of Teacher’s Intervention in Decodable Books Teaching on Fourth-graders’ Word Recognition
by: WANG, TZU-YA, et al.
Published: (2019) -
The Droid Detect Potential Attacks of Ads.
by: CHUN-CHIEH WANG, et al.
Published: (2016) -
Spear and Shield: Attack and Detection for CNN-Based High Spatial Resolution Remote Sensing Images Identification
by: Wenmei Li, et al.
Published: (2019-01-01) -
Effect of Wireless Channels on Detection and Classification of Asthma Attacks in Wireless Remote Health Monitoring Systems
by: Orobah Al-Momani, et al.
Published: (2014-01-01) -
Remotely Exploiting AT Command Attacks on ZigBee Networks
by: Ivan Vaccari, et al.
Published: (2017-01-01)