Obserwuj
Chien-Ting Kuo
Tytuł
Cytowane przez
Cytowane przez
Rok
How to detect a compromised SDN switch
PW Chi, CT Kuo, JW Guo, CL Lei
Proceedings of the 2015 1st IEEE Conference on Network Softwarization …, 2015
1072015
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service
CT Kuo, PW Chi, V Chang, CL Lei
Future Generation Computer Systems 86, 1424-1436, 2018
332018
Methods, systems, electronic devices, and non-transitory computer readable storage medium media for behavior based user interface layout display (build)
W Wen-Nan, CT Kuo, CY Ho, W Feng-Sheng, AT CHANG, S Hsu, ...
US Patent App. 14/220,312, 2015
302015
Method for pre-testing software compatibility and system thereof
SJ Chen, CT Kuo
US Patent 9,146,839, 2015
262015
Phishing processing method and system and computer readable storage medium applying the method
FH Hsu, SJ Chen, CT Kuo, JS Wu, CS Wang
US Patent 8,516,581, 2013
242013
Backup method, pre-testing method for environment updating and system thereof
CT Kuo, SJ Chen
US Patent App. 14/536,745, 2016
132016
An AMI threat detection mechanism based on SDN networks
PW Chi, CT Kuo, HM Ruan, SJ Chen, CL Lei
Proc. SECURWARE, 208-211, 2014
132014
Safeguard intranet using embedded and distributed firewall system
CH Lin, JC Liu, CT Kuo, MC Chou, TC Yang
2008 Second International Conference on Future Generation Communication and …, 2008
112008
Phishing detecting system and method operative to compare web page images to a snapshot of a requested web page
SJ Chen, CT Kuo
US Patent 8,776,220, 2014
92014
An analysis of security patch lifecycle using google trend tool
CT Kuo, HM Ruan, SJ Chen, CL Lei
2012 Seventh Asia Joint Conference on Information Security, 31-34, 2012
92012
A mechanism on risk analysis of information security with dynamic assessment
CT Kuo, HM Ruan, CL Lei, SJ Chen
2011 Third International Conference on Intelligent Networking and …, 2011
82011
An effective priority queue-based scheme to alleviate malicious packet flows from distributed DoS attacks
CH Lin, JC Liu, FC Jiang, CT Kuo
2008 International Conference on Intelligent Information Hiding and …, 2008
82008
Keeping an eye on your security through assurance indicators
M Ouedraogo, CT Kuo, S Tjoa, D Preston, E Dubois, P Simoes, T Cruz
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-8, 2014
62014
Information security audit method, system and computer readable storage medium for storing thereof
CT Kuo, HM Ruan, CL Lei
US Patent App. 13/686,897, 2014
62014
Sensitive data discrimination method and data loss prevention system using the sensitive data discrimination method
JS Wu, S Chong, CT Kuo
US Patent 9,965,646, 2018
42018
A feasibility analysis for edge computing fusion in LPWA IoT environment with SDN structure
CT Kuo, V Chang, CL Lei
2017 International Conference on Engineering and Technology (ICET), 1-6, 2017
42017
Priority Queue-based Scheme to Maintain Quality of Service for Normal Users Suffering from Large DDoS Attacks
CH Lin, JC Liu, CT Kuo
International Journal of Future Generation Communication and Networking 3 (2 …, 2010
32010
System, method and non-transitory computer readable medium for software testing
CT Kuo, SJ Chen
US Patent 9,830,252, 2017
22017
Authentication method and authentication system
FAN Chuan-Yen, CT Kuo
US Patent 10,162,957, 2018
12018
AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM
C Fan, C Kuo
US Patent App. 15/371,176, 2018
1*2018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20