[PDF][PDF] Comparative proteomic approach in differentiating multicentric occurrence and intrahepatic metastasis in multinodular hepatocellular carcinomas

M Su, LQ Li, T Peng, Y Guo, KY Xiao, LM Shang… - Chin J …, 2010 - scholar.archive.org
… found that 琢 enolase expression was significantly increased in hepatitis C virus (HCV)
associated HCC tissues than in the corresponding nontumor liver tissues, and its expression …

社群網路模型與模擬

PN Hsiao - 淡江大學資訊工程學系博士班學位論文, 2008 - airitilibrary.com
… the simulation of epidemiological transmission, rumor spreading, opinion formation, and
the spread of computer viruses in email network. Since social networks can be found in many …

電子郵件過濾系統設計與實作

黃貞云, 蔡文能 - 2004 - ir.lib.nycu.edu.tw
computer viruses enter the network through email. The early anti-virus products mostly execute
on the personal computer … Once we find computer virus embedded in the program to be …

[PDF][PDF] 基于有向网络的Email 病毒传播模型及其震荡吸引子研究

邓奇湘, 贾贞, 谢梦舒, 陈彦飞 - 物理学报, 2013 - wulixb.iphy.ac.cn
Email networks and the spread characteristics of Email virus, we study the behavior of the
virus shock propagation in Email networks … equation model of viral spread. Then, the sufficient …

圓環面網路上的病毒散播

W Huang - 2010 - ir.lib.ncu.edu.tw
… 摘要(中) 把Torus Cordalis Network G看作是一個電腦網路分佈圖,其中每個點代表一台電腦,…
of “computer viruspropagation on G, where computer viruses are small computer programs …

校園網路安全防護機制之建立

袁勤國, 李秋華 - 網際網路技術學刊, 2003 - airitilibrary.com
network services might be interrupted or even down. Understanding the concepts of the
network operation and the attacking techniques of viruses… establish a network protection system …

具有时滞的SIE 计算机网络病毒传播模型稳定性分析

宋磊 - 计算机与现代化, 2016 - cam.org.cn
computer virus propagation model, and considering that the anti-virus software needs a
period to clean viruses … to connect to network, a delayed computer virus propagation model is …

[PDF][PDF] 拓扑相关蠕虫仿真分析

王跃武, 荆继武, 向继, 刘琦 - 2008 - jos.org.cn
e-mail服务逐渐流行,e-mail系统中不同的邮件地址构成了一个巨 大的应用层逻辑网络,为拓扑相关
蠕虫提供了一个有效的传播平台.这段时间内爆发了多种e-mail… of computer network worms. In…

結合防毒與入侵偵測之網路阻斷系統研究

李亮寬 - 2009 - airitilibrary.com
… the wide spread of computer virus and network intrusion events. The use of firewall, anti-virus, …
to control other network equipments to block attacks from internal network. Consequently, …

[引用][C] 以個案研究法探討企業垃圾郵件防堵; Discusses the enterprise's preventing spam mail by the case methodology

陳良文 - 2009 - 國立中央大學圖書館