|
¤@¦Ê¹s¤»¾Ç¦~«×²Ä¤@¾Ç´Á |
¤@¦Ê¹s¤¾Ç¦~«×²Ä¤G¾Ç´Á |
06/13 |
¶À³Ó¶¯³Õ¤h |
¸ê¦wºtÁ¿ |
pdf |
|
06/06 |
§B»Í |
ºÓ½×¶i«×³ø§i |
pptx |
³¯±á |
ºÓ½×¶i«×³ø§i |
pptx |
|
05/23 |
©úÀB |
ºÓ½×¶i«×³ø§i |
pptx |
ªôº~ |
ºÓ½×¶i«×³ø§i |
pptx |
|
05/16 |
§B»Í |
ºÓ½×¶i«×³ø§i |
pptx |
³¯±á |
ºÓ½×¶i«×³ø§i |
pptx |
|
05/09 |
©úÀB |
ºÓ½×¶i«×³ø§i |
pptx |
ªôº~ |
ºÓ½×¶i«×³ø§i |
pptx |
|
05/02 |
³¯±á |
Hidden Markov Chain 1 |
pptx |
§B»Í |
Hidden Markov Chain 2 |
pdf |
|
05/02 |
³¯±á |
Hidden Markov Chain 1 |
pptx |
§B»Í |
Hidden Markov Chain 2 |
pdf |
|
04/25 |
øʧ» |
²M¤j²ºÕ´I¦Ñ®v½×¤å¬ã°Q(Big Data in Manufacturing) 1 |
pptx |
¤h®x |
²M¤j²ºÕ´I¦Ñ®v½×¤å¬ã°Q(Big Data in Manufacturing) 2 |
pdf |
ªZ¶© |
·t¶Âºô¸ô |
pdf |
|
04/11 |
ªY©y |
Neural Network (CNN) 1 |
pptx |
©úÀB |
Neural Network (CNN) 2 |
pptx |
|
03/28 |
øʧ» |
Neural Network 1 |
pptx |
¤h®x |
Neural Network 2 |
pptx |
|
03/21 |
ªY©y |
Queueing System 1 |
pptx |
ªôº~ |
Queueing System 2 |
pptx |
|
¤@¦Ê¹s¤¾Ç¦~«×²Ä¤@¾Ç´Á |
12/27 |
øʧ» |
Markov Decision Process (reinforcement learning) 1 |
pptx |
¤h®x |
Markov Decision Process (reinforcement learning) 2 |
pptx |
|
12/20 |
³¯±á |
ºÓ½×¶i«×³ø§i |
pptx |
ªôº~¡B©úÀB |
FY106¬ì§Þ³¡proposal |
pptx |
|
12/13 |
§B»Í |
ºÓ½×¶i«×³ø§i |
pptx |
|
12/06 |
øʧ» |
Markov Decision Process (reinforcement learning) 1 |
pptx |
¤h®x |
Markov Decision Process (reinforcement learning) 2 |
pptx |
|
11/29 |
§B»Í |
ºÓ½×¶i«×³ø§i |
pptx |
³¯±á |
ºÓ½×¶i«×³ø§i |
pptx |
|
11/22 |
øʧ» |
Markov Decision Process 3 |
pptx |
ªôº~ |
Markov Decision Process 4 |
pptx |
|
11/01 |
³¯±á |
Markov Decision Process 1 |
pptx |
¤h®x |
Markov Decision Process 2 |
pptx |
|
10/25 |
§B»Í |
Machine Learning Foundations 7 & 8 |
pdf 7 pdf 8 |
¤h®x |
Machine Learning Foundations 9 & 10 |
pdf 9 pdf 10 |
|
10/18 |
øʧ» |
Machine Learning Foundations 5 & 6 |
pdf 5 pdf 6 |
©úÀB |
ºÓ½×¶i«×³ø§i |
pptx |
|
10/11 |
¤h®x |
Machine Learning Foundations 1 & 2 |
pdf 1 pdf 2 |
³¯±á |
Machine Learning Foundations 3 & 4 |
pdf 3 pdf 4 |
|
10/04 |
§B»Í |
¤j¾Ç¬ã¨s±MÃD |
pdf |
|
¤@¦Ê¹s¥|¾Ç¦~«×²Ä¤G¾Ç´Á |
06/14 |
³¯±á |
The Simplex Method 2 |
pptx |
|
06/07 |
²ú¶² |
ºÓ½×¶i«×³ø§i |
pptx |
|
05/24 |
©úÀB |
ºÓ½×¶i«×³ø§i |
pptx |
§B»Í |
The Simplex Method 1 |
pptx |
|
|
05/10 |
²ú¶² |
Linear Programming 1 |
pptx |
³¯±á |
Linear Programming 2 |
pptx |
|
05/03 |
¥K³ó |
ºÓ½×¶i«×³ø§i |
pptx |
¬f°¶ |
ºÓ½×¶i«×³ø§i |
pptx |
|
04/26 |
²ú¶² |
ºÓ½×¶i«×³ø§i |
pptx |
|
04/12 |
¥K³ó |
Network Flow 1 |
pptx |
§B»Í |
Network Flow 2 |
pptx |
|
03/29 |
§B»Í |
Dynamic Programming 1 |
pptx |
³¯±á |
Dynamic Programming 2 |
pptx |
|
03/22 |
©úÀB |
Divide and Conquer 1 |
pptx |
¬f°¶ |
Divide and Conquer 2 |
pptx |
|
03/15 |
³¯±á |
Greedy Algorithms introduction 3 |
pptx |
²ú¶² |
Greedy Algorithms introduction 4 |
pptx |
|
03/08 |
§B»Í |
Greedy Algorithms introduction 1 |
pptx |
³¯±á |
Greedy Algorithms introduction 2 |
pptx |
|
¤@¦Ê¹s¥|¾Ç¦~«×²Ä¤@¾Ç´Á |
12/29 |
©úÀB |
ºÓ½×¶i«×³ø§i |
pptx |
|
12/22 |
¬f°¶ |
ºÓ½×¶i«×³ø§i |
pptx |
¥K³ó |
ºÓ½×¶i«×³ø§i |
pptx |
|
12/08 |
·ß¶¶ |
¶i«×³ø§i |
pptx |
²ú¶² |
ºÓ½×¶i«×³ø§i |
pptx |
|
|
11/24 |
¥K³ó |
Mitigating-starvation-in-Wireless-Ad-hoc-Networks |
pptx |
©úÀB |
ºÓ½×¬ã¨s¶i«×³ø§i |
pptx |
|
|
11/03 |
²ú¶² |
Performance-Evaluation-of-Mobile-Hotspots-in-Densely-Deployed-WLAN-Environments |
pptx |
¬f°¶ |
Association and deployment considerations in dense wireless LANs |
pptx |
|
10/27 |
©úÀB |
ºÓ½×¶i«×³ø§i |
pptx |
|
10/20 |
·ß¶¶ |
¶i«×³ø§i |
pptx |
è®»y |
¶i«×³ø§i |
pptx |
|
|
¤@¦Ê¹s¤T¾Ç¦~«×²Ä¤G¾Ç´Á |
|
06/09 |
¬f°¶ |
Improving UE SINR and networks energy efficiency based on femtocell self-optimization capability |
pptx |
¥K³ó |
Lightweight-Selforganizing-Reconfiguration-of-Opportunistic-Infrastructuremode-WiFi-Networks |
pptx |
|
06/02 |
²ú¶² |
A-New-Handover-Mechanism-for-Femtocell-to-Femtocell |
pptx |
|
05/26 |
©úÀB |
CoBRA Cooperative Beamforming-Based Resource Allocation for Self-Healing in SON-Based Indoor Mobile Communication System |
pptx |
|
05/19 |
¥K³ó |
Self-Management-of-Rate-Power-and-Carrier-Sense-Threshold-for-Interference-Mitigation-in-IEEE-802.11-Networks |
pptx |
|
05/12 |
¬f°¶ |
Self-configuration Scheme to Alleviate Interference among APs in IEEE 802.11 WLAN |
pptx |
|
05/05 |
²ú¶² |
Optimal-placement-of-Femto-Base-Stations-in-Enterprise-Femtocell-Networks |
pptx |
|
04/28 |
·ß¶¶ |
¬ã¨s¶i«×³ø§i |
pptx |
|
04/14 |
¥K³ó |
Placement of WiFi Access Points for Efficient WiFi Offloading in an Overlay Network |
pptx |
©úÀB |
Fairness-Aware Cooperative Resource Allocation for Self-Healing in SON-based Indoor System |
pptx |
|
04/07 |
౶² |
¥_¨Ê¤j¾Ç¬ã¨s¶i«×³ø§i |
pptx |
|
03/31 |
¥ß¥Á |
¶i«×³ø§i |
pptx |
ªZ¶© |
¤ß±o¤À¨É |
pptx |
|
03/24 |
¬f°¶ |
Interference coordination in wireless networks |
pptx |
|
03/17 |
ªôº~ |
4GÁͶյ²®×³ø§i |
pptx |
|
03/10 |
²ú¶² |
Femtocell-Base-Station-Deployment |
pptx |
|
¤@¦Ê¹s¤T¾Ç¦~«×²Ä¤@¾Ç´Á |
12/16 |
¥ß¥Á |
A review of biometric technology along with trends and prospects |
pptx |
|
12/09 |
౶² |
¥_¨Ê¤j¾Ç¬ã¨s¶i«×³ø§i |
pptx |
|
|
11/18 |
¿Pªâ |
Defending and attacking a network of two arcs subject to traffic congestion |
pptx |
®aºa |
Improving System Reliability Against Rational Attacks Under Given Resources |
pptx |
|
11/04 |
¥ß¥Á |
Predictive models for multi-biometric systems |
pptx |
|
10/14 |
౶² |
¥_¨Ê¤j¾Ç¬ã¨s¶i«×³ø§i |
pptx |
|
09/30 |
®aºa |
Network Survivability Against Region Failure |
pptx |
౶² |
Optimal Voting Strategy Against Rational Attackers |
pptx |
|
¤@¦Ê¹s¤G¾Ç¦~«×²Ä¤G¾Ç´Á |
|
05/06 |
¤HµØ |
¶i«×³ø§i |
pptx |
©É㸠|
¶i«×³ø§i |
pptx |
|
|
|
|
05/06 |
ºû¤å¡B©É´Å |
¶i«×³ø§i |
pptx |
©ú©v |
¶i«×³ø§i |
pptx |
|
|
04/22 |
¥ß¥Á |
Contact qualitybasedforwardingstrategyfordelaytolerantnetwork |
pptx |
¿Pªâ |
Robustness of complex networks with the local protection strategy against |
pptx |
|
04/01 |
®aºa |
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack |
pptx |
౶² |
Optimal Anti-Jamming Strategy in Sensor Networks |
pptx |
|
03/25 |
¿Pªâ |
Tunable QoS-Aware Network Survivability print |
pptx |
|
03/18 |
ªôº~ |
¬ã¨s³ø§i |
pptx |
¥ß¥Á |
Maximal covering with network survivability requirements in wireless mesh networks |
pptx |
|
|
03/04 |
ºû¤å |
¶i«×³ø§i |
pptx |
©É㸠|
¶i«×³ø§i |
pptx |
|
|
¤@¦Ê¹s¤G¾Ç¦~«×²Ä¤@¾Ç´Á |
12/03 |
©É´Å |
¶i«×³ø§i |
pptx |
¤HµØ |
Computing Optimal Randomized Resource Allocations for Massive Security Games |
pptx |
|
|
11/12 |
©É㸠|
Paper Reading |
pptx |
|
10/29 |
©É´Å |
Optimal Placement of Virtual Machine with Different Placement Constraints in IAAS Clouds |
pptx |
|
10/22 |
ºû¤å |
Network Survivability under Disaster Propagation |
pptx |
¤HµØ |
Network Games with Many Attackers and Defenders |
pptx |
|
|
10/01 |
©É´Å |
On the Optimal Allocation of Adversarial Resources |
pptx |
©É㸠|
Robust Allocation of a Defensive Budget Considering an Attacker¡¦s Private Information |
pptx |
|
|
¤@¦Ê¹s¤@¾Ç¦~«×²Ä¤G¾Ç´Á |
06/10 |
©É㸠|
The Model |
pptx |
ºû¤å |
Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach |
pptx |
|
06/03 |
ºÝÂ@ |
¶i«×³ø§i |
pptx |
¤HµØ |
A novel risk assessment and optimization |
pptx |
|
05/27 |
©É´Å |
Determining sink location through Zeroing-In attackers in wireless sensor networks |
pptx |
|
|
05/13 |
ªôº~ |
¬ã¨s³ø§i |
pptx |
ºû¤å |
Maximum Damage Malware Attack |
pptx |
|
05/06 |
©É㸠|
Selection of optimal countermeasure portfolio in IT security planning |
pptx |
|
04/29 |
¦Ö°a |
¶i«×³ø§i |
pptx |
¨Î¬Â |
¶i«×³ø§i |
pptx |
|
04/15 |
¤HµØ |
The economic impact of cyber terrorism |
pptx |
|
03/25 |
©É㸠|
The Model |
pptx |
©É´Å |
Mitigation strategies on scale-free networks against cascading failures |
pptx |
|
03/18 |
ºû¤å |
Robustness of complex networks with the local protection strategy against cascading failures |
pptx |
©É㸠|
Optimal defence of single object with imperfect false targets |
pptx |
|
03/11 |
¤HµØ |
Modeling and Security Analysis of Enterprise Network |
pptx |
©É´Å |
Computing Randomized Security Strategies in Networked Domains |
pptx |
|
03/04 |
ºû¤å |
Improving Cloud Survivability through Dependency based Virtual Machine Placement |
pptx |
©É㸠|
Resource Distribution in Multiple Attacks Against a Single Targe |
ppt |
|
¤@¦Ê¹s¤@¾Ç¦~«×²Ä¤@¾Ç´Á |
|
12/20 |
¦Ö°a |
¬ã¨s¶i«×³ø§i |
pptx |
¨Î¬Â |
¬ã¨s¶i«×³ø§i |
pptx |
|
12/06 |
¦Ö°a |
Optimal Replacement and Protection Strategy for Parallel Systems |
pptx |
¨Î¬Â |
¬ã¨s¶i«×³ø§i |
pdf |
|
|
|
11/01 |
ªôº~ |
¬ã¨s¶i«×³ø§i |
pdf |
¨Î¬Â |
¬ã¨s¶i«×³ø§i |
pdf |
|
|
10/11 |
ºÝÂ@ |
¬ã¨s¶i«×³ø§i |
pdf |
«Ø¦¨ |
¬ã¨s¶i«×³ø§i |
pdf |
¦Ö°a |
An optimal reliability allocation method for digital substation systems |
pptx |
|
|
|
|
¤@¦Ê¹s¤@¾Ç¦~«×²Ä¤G¾Ç´Á |
06/05 |
ªôº~ |
¬ã¨s¶i«×³ø§i |
pdf |
ºÝÂ@ |
A comparison of multi-objective spatial dispersion models |
pptx |
|
06/12 |
«T¨j |
¬ã¨s¶i«×³ø§i |
pdf |
©ú©v |
¬ã¨s¶i«×³ø§i |
pdf |
|
06/05 |
ªôº~ |
¬ã¨s¶i«×³ø§i |
pdf |
ºÝÂ@ |
A comparison of multi-objective spatial dispersion models |
pptx |
|
05/29 |
¿AÀs |
¬ã¨s¶i«×³ø§i |
pdf |
ºÝÂ@ |
A comparison of multi-objective spatial dispersion models |
pptx |
¦Ö°a |
Vulnerability based robust protection strategy selection in service networks |
pptx |
|
|
05/15 |
¨Î¬Â |
paper reading |
pptx |
¦Ö°a |
New insights on multi-state component criticality and importance |
pptx |
|
05/08 |
°·¸Û |
¬ã¨s¶i«×³ø§i |
pdf |
¦Ö°a |
Optimal service task partition and distribution in grid system with star topology |
pptx |
ºÝÂ@ |
Optimal resource assignment to maximize multistate network reliability |
pptx |
|
|
|
¨Î¬Â |
System reliability optimization considering uncertainty Minimization of the coefficient of variation for series-parallel systems |
pptx |
|
03/27 |
ªôº~ |
¬ã¨s¶i«×³ø§i |
pdf |
¿AÀs |
¬ã¨s¶i«×³ø§i |
pdf |
|
|
03/13 |
ºÝÂ@ |
A Set of Measures of Centrality Based on Betweenness |
pptx |
¦Ö°a |
Survivability of systems under multiple factor impact |
pptx |
«Ø¸Û |
Quantifying security risk level from CVSS estimates of frequency and impact |
pdf |
|
03/06 |
¨Î¬Â |
Data survivability vs. security in information systems |
pptx |
ºÝÂ@ |
Decapitation of networks with and without weights and defense |
pptx |
|
¤@¦Ê¾Ç¦~«×²Ä¤@¾Ç´Á |
|
©É¦p |
Research Direction Introduction |
pptx |
|
12/20 |
Ùɵ¾ |
Research Direction Introduction |
pptx |
ïï¦p |
Research Direction Introduction |
pptx |
|
|
¿·¦t |
Research Direction Introduction |
pptx |
|
|
¨|·Á |
Research Direction Introduction |
pptx |
|
11/29 |
©É¦p |
Research Direction Introduction |
pptx |
Ùɵ¾ |
Research Direction Introduction |
pptx |
|
11/22 |
ïï¦p |
Research Direction Introduction |
pptx |
¿·¦t |
Research Direction Introduction |
pptx |
|
11/01 |
¨|·Á |
Research Direction Introduction |
pptx |
©É¦p |
Research Direction Introduction |
pptx |
|
10/11 |
ïï¦p |
A learning-Based Approach to
Reactive Security |
pptx |
Ùɵ¾ |
Research Direction Introduction |
pptx |
|
|
|
¿·¦t |
Research Direction Introduction |
pptx |
|
09/20 |
¨|·Á |
Research Direction Introduction |
pptx |
©É¦p |
Modeling secrecy and deception in a multiple-period attacker¡Vdefender signaling game |
pptx |
|
¤E¤Q¤E¾Ç¦~«×²Ä¤G¾Ç´Á |
06/13 |
ªôº~ |
Project Management Professional&Future
Research |
ppt |
°·¸Û |
Making
Security Measurable and Manageable |
pdf |
¿AÀs |
Cryptanalysis
and Improvement of an Access Control in User Hierarchy
Basedon Elliptic Curve Cryptosystem |
ppt |
|
05/30 |
ïï¦p |
Evaluating the Damage Associated with Intentional
Network Disintegration |
pptx |
¨|·Á |
Maximizing
Network Security Given a Limited Budget |
pptx |
©É¦p |
Trade-offs
between target hardening and overarching protection |
pptx |
|
05/23 |
Ùɵ¾ |
Level diagrams analysis of Pareto Front
for multiobjective system redundancy allocation |
pptx |
¿·¦t |
A
two-stage approach for multi-objective decision making
with applications to system reliability optimization |
pptx |
|
05/16 |
ïï¦p |
Preventive strike vs. false targets and
protection in defense strategy |
pptx |
¸gºû |
½×¤å¶i«× |
pptx |
|
|
|
04/25 |
¨|·Á |
Meeting a demand vs. enhancing protections
in homogeneous parallel systems |
pptx |
«a§Ê |
½×¤å¶i«× |
pdf |
©ú¶§ |
½×¤å¶i«× |
pptx |
|
|
©É¦p |
Optimal response to attacks
on the open science grid |
pptx |
|
03/28 |
Ùɵ¾ |
Evaluating the Damage Associated with Intentional
Network Disintegration |
pptx |
¿·¦t |
Reliability-Redundancy
Allocation for Multi-State Series-Parallel Systems |
pptx |
ïï¦p |
Dynamic
Topologies for Robust Scale-Free Networks |
pptx |
|
03/21 |
¨|·Á |
A Game Theoretic Investigation of Deception
in Network Security |
pptx |
©É¦p |
Defending
against multiple different attackers |
pptx |
|
|
Ùɵ¾ |
Separation in Homogeneous
Systems with Independent Identical Elements |
pptx |
|
03/07 |
¿·¦t |
Redundancy vs Protection vs False Targets
for Systems Under Attack |
pptx |
ïï¦p |
Critical
infrastructure protection under imperfect attacker perception |
pptx |
|
02/21 |
¨|·Á |
Optimal Network Protection Against Diverse
Interdictor Strategies |
ppt |
©É¦p |
Defending
simple series and parallel systems with imperfect false
targets |
pptx |
|
¤E¤Q¤E¾Ç¦~«×²Ä¤@¾Ç´Á |
01/06 |
¿AÀs |
Novel Efficient Key Assignment Scheme for
Dynamic Access |
pptx |
ªôº~ |
Resource
Allocation for Femtocell Networks A Study of LTE Self-Organization
Networks |
ppt |
|
12/23 |
©ú¶§ |
Research Direction Introduction |
pptx |
«a§Ê |
Research
Direction Introduction |
pdf |
|
12/16 |
¸gºû |
Research Direction Introduction |
pptx |
¨Î§D |
Research
Direction Introduction |
pptx |
|
12/09 |
«a§Ê |
Research Direction Introduction |
pdf |
¹Å¶§ |
Research
Direction Introduction |
pptx |
|
|
¨Î§D |
Research Direction Introduction |
pptx |
|
|
«a§Ê |
Research Direction Introduction |
pdf |
|
11/18 |
©ú¶§ |
Research Direction Introduction |
pptx |
¸gºû |
Research
Direction Introduction |
pptx |
|
|
¹Å¶§ |
Research Direction Introduction |
pptx |
|
10/21 |
¨Î§D |
Research Direction Introduction |
ppt |
«a§Ê |
Research
Direction Introduction |
pdf |
|
10/07 |
©ú¶§ |
Research Direction Introduction |
pptx |
¸gºû |
Research
Direction Introduction |
pptx |
|
|
¹Å¶§ |
Research Direction Introduction |
pptx |
|
|