关注
Bo-Chao  Cheng
Bo-Chao Cheng
在 ccu.edu.tw 的电子邮件经过验证
标题
引用次数
年份
A Codebook-based Redundancy Suppression Mechanism with Lifetime Prediction in Cluster-based WSN
H Chen, BC Cheng, CC Cheng, YG Chen, YL Chou
International Journal of Electronics and Communication Engineering 3 (8 …, 2009
2009
A Competent Traffic Classification Mechanism Using Packet Size Distribution and Cumulation
BC Cheng, GT Liao, MT Yu, TC Yin, H Chen, KP Fan
International Information Institute (Tokyo). Information 17 (5), 1837, 2014
2014
A Competent Traffic Classification Mechanism Using Packet Size Distribution and Cumulation
BC Cheng, GT Liao, MT Yu, TC Yin, H Chen, KP Fan
International Information Institute (Tokyo). Information 17 (5), 1837, 2014
2014
A context adaptive intrusion detection system for MANET
BC Cheng, RY Tseng
Computer Communications 34 (3), 310-318, 2011
262011
A Context Aware Gateway for SIP-based Services in Ubiquitous Smart Homes
BC Cheng, H Chen, RY Tseng
International Journal of Smart Home 2 (1), 1-14, 2008
32008
A Context Aware Gateway for SIP-based Services in Ubiquitous Smart Homes
BC Cheng, H Chen, RY Tseng
International Journal of Smart Home 2 (1), 1-14, 2008
32008
A fog-based collusion detection system
PY Hsiung, CH Li, SH Chang, BC Cheng
Security with Intelligent Computing and Big-data Services: Proceedings of …, 2020
12020
A good IDS response protocol of MANET containment strategies
BC Cheng, H Chen, RY Tseng
IEICE transactions on communications 91 (11), 3657-3666, 2008
22008
A multi-level fuzzy comprehensive evaluation approach for message verification in VANETs
BC Cheng, GT Liao, CY Chen, H Chen
2012 Third FTRA International Conference on Mobile, Ubiquitous, and …, 2012
32012
A Novel Approach to Identify Confidential Data in Data Leakage Prevention Systems
WZ Wu, BC Cheng
A Novel Defense Mechanism Against Label-Flipping Attacks for Support Vector Machines
MY Kuo, BC Cheng
2021 International Conference on Security and Information Technologies with …, 2022
2022
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN
BC Cheng, H Chen, GT Liao
Information Security and Cryptology: 4th International Conference, Inscrypt …, 2009
2009
A novel probabilistic matching algorithm for multi-stage attack forecasts
BC Cheng, GT Liao, CC Huang, MT Yu
IEEE Journal on selected areas in communications 29 (7), 1438-1448, 2011
442011
A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks
BC Cheng, H Chen, YJ Li, RY Tseng
Computer Communications 31 (18), 4352-4359, 2008
192008
A platform for complex real-time applications
AD Stoyenko, LR Welch, PA Laplante, TJ Marlowe, C Amaro, BC Cheng, ...
The Complex Systems Engineering Synthesis and Assessment Technology Workshop, 1993
51993
A privacy-preserved analytical method for eHealth database with minimized information loss
YL Chen, BC Cheng, HL Chen, CI Lin, GT Liao, BY Hou, SC Hsu
BioMed Research International 2012, 2012
92012
A restoration methodology based on pre-planned source routing in ATM networks
DPK Hsing, BC Cheng, G Goncu, L Kant
Proceedings of ICC'97-International Conference on Communications 1, 277-282, 1997
211997
A restoration system for ATM networks
DPK Hsing, L Kant, BC Cheng
Proceedings of MILCOM'96 IEEE Military Communications Conference 2, 483-489, 1996
51996
A Secure and Practical Key Management for Smart Meter Networks
BC Cheng, GT Liao, YJ Lin, PH Hsu
International Information Institute (Tokyo). Information 17 (5), 1741, 2014
2014
A system-awareness decision classifier to automated MSN forensics
YTT Chu, KP Fan, YW Cheng, PK Tseng
Broadband Access Communication Technologies II 6776, 178-186, 2007
12007
系统目前无法执行此操作,请稍后再试。
文章 1–20