Author:
Chang Tien-Ho,Chen Chia-Mei,Hsiao Han-Wei,Lai Gu-Hsin
Publisher
Computers, Materials and Continua (Tech Science Press)
Subject
Artificial Intelligence,Computational Theory and Mathematics,Theoretical Computer Science,Software
Reference25 articles.
1. M. Agarwal, Biswas, S., and Nandi, S. (2016). Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach. In Proceedings - 2015 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2015 (pp. 246–251). https://doi.org/10.1109/SMC.2015.55
2. S. Aram, Shirvani, R. A., Pasero, E. G., and Chouikha, M. F. (2016). Implantable Medical Devices ; Networking Security Survey. Journal of Internet Services and Information Security (JISIS), 3(August), 40–60. https://doi.org/10.22667/JISIS.2016.08.31.040
3. K. Bollapalli, Wu, Y., Gulati, K., Khatri, S., and Calderbank, A. R. (2009). Highly parallel decoding of space-time codes on graphics processing units. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (pp. 1262–1269). Ieee. https://doi.org/10.1109/ALLERTON.2009.5394528
4. W. Casey, Morales, J. A., and Mishra, B. (2016). Threats from Inside : Dynamic Utility ( Mis ) Alignments in an Agent based Model. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7(1), 97–117. https://doi.org/10.22667/JOWUA.2016.03.31.097
5. C. M. Chen and Chang, T. H. (2015). The Cryptanalysis of WPA & WPA2 in the Rule Based Brute Force Attack, An Advanced and Efficient Method. In Proceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015 (pp. 37–41). https://doi.org/10.1109/AsiaJCIS.2015.14