公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2010 | Securities Regulation in Taiwan(2010) | 林仁光 | Oxford University | | | |
2006 | Securities Regulation in Taiwan(International Securities Regulation) | 林仁光 | | | | |
2001 | Securitisation of Insurance Risk and Relevant Regulatory Issues | 汪信君 | 第二屆風險管理理論研討會 | | | |
2006 | Security Analysts’ Competence in Value and Glamour | Lin, Hsiou-wei; Wu, Ray-hsuan | Journal of Accounting Business and Economics | | | |
1999 | Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies | Lin, Hsiou-wei W | International Journal of Accounting Studies | | | |
2014 | Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations | Wu R.-S.; HSIOU-WEI W. LIN | Asia-Pacific Journal of Accounting and Economics | | | |
1998 | Security and Auditing in VPN and its Trends | Lei, C. L. | Proceedings of the 1998 Computer Communications Technologies conference | | | |
2021 | Security assessment of taiwan solid wood product supply | CHYI-RONG CHIOU ; Chan W.-H; Wu M.-S; Lin J.-C. | Sustainability (Switzerland) | | | |
2016 | Security concerns for automotive communication and software architecture. | Yu, Huafeng; CHUNG-WEI LIN | IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2016, San Francisco, CA, USA, April 10-14, 2016 | 6 | 0 | |
1990 | Security Constrained Unit Commitment | Hsu, Yuan-Yih | | | | |
2013 | Security Event Handling Framework For Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | International Conference on Applied and Theoretical Information Systems Research | | | |
2017 | Security implications of redirection trail in popular websites worldwide | Chang, Li; HSU-CHUN HSIAO ; Jeng, Wei ; Kim, Tiffany Hyun Jin | 26th International World Wide Web Conference | 10 | 0 | |
1997 | Security Management for ATM Networks | Lei, C. L. | | | | |
2015 | Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems. | CHUNG-WEI LIN | | | | |
2005 | The Security of Mobile E-Commerce | Lei, C. L.; Fan, Chun-I | | | | |
2019 | Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective | Yang X.; Wang X.; Yue W.T.; CHOON LING SIA ; Luo X. | Journal of Organizational Computing and Electronic Commerce | | | |
2011 | Security Threats in Advanced Metering Infrastructure | He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; CHIN-LAUNG LEI | The 6th Joint Workshop on Information Security | | | |
1989 | Security Valuation Models and the Accounting Data | Wang, Tay-Chang | 第1屆會計學理論與實務研討會 | | | |
2015 | Security-Aware Design Methodology and Optimization for Automotive Systems. | Lin, Chung-Wei; Zheng, Bowen; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN | ACM Trans. Design Autom. Electr. Syst. | | | |
2013 | Security-aware mapping for CAN-based real-time distributed automotive systems. | CHUNG-WEI LIN ; Zhu, Qi; Phung, Calvin; Sangiovanni-Vincentelli, Alberto L. | The IEEE/ACM International Conference on Computer-Aided Design, ICCAD'13, San Jose, CA, USA, November 18-21, 2013 | 67 | 0 | |