跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
吳 育松
教授
資訊安全研究所
h-index
h10-index
h5-index
651
引文
10
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
75
引文
4
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
37
引文
3
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
2003
2025
每年研究成果
概覽
指紋
網路
計畫
(22)
研究成果
(44)
獎項
(3)
類似的個人檔案
(6)
指紋
查看啟用 Yu-Sung Wu 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Computer Science
Intrusion Detection System
100%
Dynamic Information
72%
Intrusion Detection
57%
Security Attack
42%
Malware
41%
Hypervisor
40%
Virtualizations
36%
Network Security
36%
Anomaly Detection
36%
Fuzzing
36%
Machine Learning
36%
Learning System
36%
Adversarial Machine Learning
36%
System Strategy
36%
Evaluation Result
29%
Tolerant System
27%
Data Leakage Prevention
27%
Zero-Day Vulnerability
27%
Virtual Machine
25%
Security Monitoring
25%
Security Policy
24%
Network Service
24%
System Calls
24%
Cloud Computing
22%
Static Information
21%
Tracking System
21%
Network Traffic
21%
Data Encryption
21%
Dynamic Malware Analysis
18%
e-commerce system
18%
Intrusion Response
18%
Web Application
18%
Cloud Infrastructure
18%
Network Simulator
18%
Network Performance
18%
Linux
18%
Performance Bottleneck
18%
spam detection
18%
Execution Time
18%
Perimeter Security
18%
Attack Signature
18%
Research System
18%
Application Security
18%
Variable Mapping
18%
Logic Programming
18%
Cloud Storage Service
18%
Mandatory Security
18%
System Security
18%
Application Execution
18%
vehicular ad-hoc network
18%
Keyphrases
Information Flow Tracking
90%
Intrusion Detection System
51%
Performance Overhead
47%
Voice over Internet Protocol (VoIP)
45%
Malware
45%
Intrusion Detection
45%
Information Flow
39%
Voice-over
36%
Network Security
36%
Software-defined Networking
36%
Semantic Extraction
36%
Hypervisor
36%
Functional Degradation
36%
Fuzzing
30%
Data Leakage Prevention
27%
Virtual Machine
25%
Evaluation Results
25%
Security Monitoring
25%
Query Privacy
24%
Security Services
24%
Interacting Services
24%
Systems-based
24%
Electronic Commerce
24%
Containment
24%
Smartphone
24%
Vulnerability
23%
Memory Introspection
22%
Sensitive Data Leakage
22%
Anomaly Detection
21%
Network Traffic
21%
Data Encryption
21%
Fuzzer
20%
IP System
20%
Popular
19%
Secure Network
18%
Transparent Optical Networks
18%
Micro-application
18%
Cloud Infrastructure
18%
Cloud Computing Environment
18%
Trustworthiness
18%
Intrusion Response
18%
Web Application
18%
Architecting
18%
Offline Communication
18%
Adept
18%
Energy-aware
18%
Simulation of Urban Mobility
18%
Malware Collection
18%
Ns-3
18%
Online Communication
18%