[1]尹邦嚴、李善誠,以混合式螞蟻族群最佳化解決無線通訊頻道指定問題無線通訊頻道指定問題,國立暨南國際大學資訊管理學系,93。
[2]王美慈、張雍驛,無線網路安全機制傳輸效能之研究,中國文化大學資訊管理研究所,96。
[3]白炳豐、蘇彥暐,結合特徵擷取與分類技術於信用評分與過濾垃圾郵件之應用,國立暨南國際大學資訊管理研究所。
[4]白炳豐、林國平,模糊類神經系統於股市股價預測之應用,大葉大學工業工程研究所。
[5]伍台國、林主雲,無線網狀網路的入侵偵測警訊關聯分析,國防管理學院國防資訊研究所,95。
[6]呂崇富,網路規劃與管理實務,學貫行銷股份有限公司。
[7]李近興、符光恩,SYSLOG與SNMP traps結合的應用,台灣網際網路研討會,2005。
[8]李宗南、簡銘伸,以資源管理為基礎在異質性行動無線網路做分散式路由挑選之機制,國立中山大學資訊工程學系研究所博士論文,95。[9]周鵬程,類神經網路入門,全華科技圖書股份有限公司出版,2006。
[10]林傑斌、秦美惠、羅傑克,WLAN 行動通訊網路,文魁資訊股份有限公司,2003。
[11]林國珍、許健平、曾煜棋,多層無線通訊網路上之資源管理策略,國立中央大學資訊工程研究所博士論文,92。[12]林永松、溫演福,無線網路之效能最佳化演算法,臺灣大學資訊管理學研究所博士論文,95。[13]張文清、張立穎,智慧型類神經演算法在室內無線區域網路估測系統之應用,淡江大學電機工程學系,88。
[14]張可軒、陳昱仁,混合式無線區域網路即時入侵防禦與風險評估之研究,長庚大學資訊管理研究所,95。
[15]陳秋彰、陳彥錚,在無線區域網路上之位置導向效能管理,國立暨南國際大學資訊管理研究所。
[16]陳昱仁、黃國瑋,結合無線通訊技術發展智慧型遠距居家照護系統之研究,長庚大學資訊管理研究所博士論文,94。[17]陳彥錚、詹曜榕,在無線區域網路上以位置為基礎的對等式計算之研究,暨南國際大學資訊管理學系,91。
[18]梁馨科、詹曉苓,應用類神經網路與分散式搜尋法於室內無線區域網路傳輸品質評估系統之研究,運籌研究集刊第九期,2006年6月。[19]張江南、鄭又新,仿螞蟻群聚最佳化神經網路於非線性迴歸之初步探討,國立中央大學光機電工程研究所。
[20]張榮昇、賴源正,提供比例式延遲差別服務之新排程機制,國立臺灣科技大學資訊管理系博士論文,95。[21]葉怡成,應用類神經網路,儒林圖書有限公司出版,2002。
[22]葉怡成,類神經網路模式應用與實作,儒林圖書有限公司出版,2004。
[23]劉育昌,類神經網路快速學習之研究探討,義守大學電機工程學系研就所,2006。
[24]Andy Ward, Alan Jones, and Andy Hopper, “A new location technique for the active office”, IEEE Personal Communications, October 1997.
[25]A.S. Ahluwalia and E.H. Modiano, "On the complexity and distributed construction of energy-efficient broadcast trees in wireless ad hoc networks," IEEE Transactions on Wireless Communications, 4(5), Sept. 2005.
[26]Chakraborty, K., Mehrotra K. and Mohan C.K., “Forecasting the behavior of multivariate time series using neural networks,” Neural Networks, 5, pp.961-970, 1992.
[27]Cisco IOS Software Releases http://www.cisco.com/en/US/products/sw/iosswrel/products_ios_cisco_ios_software_releases.html
[28]C. Lonvick, Cisco Systems, “The BSD syslog Protocol” RFC3164, August 2001.
[29]D. New, M. Rose, Dover Beach Consulting, Inc. “Reliable Delivery for syslog” RFC3195, November 2001.
[30]Eric Hsiao-KuangWu, Yi-Zhan Huang, and Jui-Hao Chiang. Dynamic Adaptive Routing for Heterogeneous Wireless Network. In Global Telecommunications Conference, 2001.
[31]Hal Berghel, “Wireless Infidelity I: War Driving,” Communications of the ACM, Vol. 47, Issue 9, September 2004.
[32]Hornik, K., Stinchcombe, M. & White, H. (1989). Multilayer feedforward networks are universal approximations. Neural Networks, 2, 336–359.
[33]http://www.ietf.org/html.charters/syslog-charter.html
[34]Housley, R., & Arbaugh, W. IEEE 802.11 Wireless LAN Security Performance with Multiple Clients, 2003.
[35]H. Zhu, M. Li, I. Chlamtac, and B. Prabhakaran, “A survey of Quality of Service in IEEE 802.11 Networks,” IEEE Wireless Communications, vol. 11, no. 4, Aug. 2004.
[36]J. A. Zoellner and C. L. Beall, “A breakthrough in spectrum conserving frequency assignment technology,” IEEE Transactions on Electromagnetic Compatiblity 19, 1977.
[37]J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, “A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols,” Proc. IEEE/ACM MOBICOM ’98, Oct. 1998.
[38]Juha Parkka, Mark van Gils, Ilkka Korhonen, Raimo Lappalainen and Timo Tuomisto, "A Wireless Wellness Monitor for Personal Weight Management", Information Technology Applications in Biomedicine, 2000
[39]Liam Quinn, “Wireless Communications Technology Landscape”, Dell White Paper, February 2005
[40]Mani Subramanian, “NETWORK MANAGEMENT”ADDISION-WESLEY, 2000.
[41]Mazda Salmanian, Julie H. Lefebvre, Steve Leonard and Scott Knight, “Intrusion Detection in 802.11 Wireless Local Area Networks,” Defence R&D Canada – Ottawa, Technical Memorandum, July 2004.
[42]M. Malli, Q. Ni, T. Turletti, and C. Barakat, “Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 802.11 Wireless LANs,” Proc. IEEE ICC, Paris, France, 2004.
[43]Nguyen The Anh and Rajeev Shorey, “Network Sniffing Tools for WLANs: Merits and Limitations,” 2005 IEEE International Conference on Personal Wireless Communications(ICPWC 2005), No. 556, January 23-25, 2005.
[44]Q. Ni, L. Romdhani, and T. Turletti, “A survey of QoS enhancements for IEEE 802.11 wireless LAN,” Journal of Wireless and Mobile Computing, John Wiley, vol. 4, no. 5, 2004.
[45]Raychaudhuri S., Stuart J.M., and Altman R.B., 2000, “Principal Component Analysis to summarize microarray experiments: application to sporulation time series.”
[46]Roy Want, Andy Hopper, Veronica Falcão, and Jonathan Gibbons, “The Active Badge location system”, ACM Transactions on Information Systems, 10(1): 91-102, January 1992.
[47]S. A. Chen, et al., “Optimal Prediction Tool for Wireless LAN using Genetic Algorithm and Neural Network Concept,” APCC/OECC '99, vol. 1, Oct. 1999.
[48]S. C. Ghosh, B. P. Sinha, N. Das, “Channel Assignment Using Genetic Algorithm Based on Geometric Symmetry.” IEEE Transactions on Vehicular Technology., vol. 52,No. 4, July 2003.
[49]S. H. Yang, et al., “A Wireless LAN Measurement Method based on RSSI and FER,” APCC/OECC '99, vol. 1, Oct. 1999.
[50]Simon G. M. Koo, Catherine Rosenberg, Hoi-Ho Chan, and Yat Chung Lee, “Location Discovery in Enterprise-based Wireless Networks: Implementation and Applications”, IEEE Workshop on Applications and Services in Wireless Networks (ASWN 2002), Paris, France, Jul 3-5, 2002.
[51]Snyder, J., J. Sweat, M. Richardson and D. Pattie, “Developing neural networks to forecast agricultural commodity prices, ” The Twenty-Fifth Hawaii International Conference on System Sciences, 4, pp.516-522, 1992.
[52]S. Roy and J. J. Garcia-Luna-Aceves. Node-Centric Hybrid Routing for Ad-Hoc Wireless Extensions of The Internet. In GlobeCom 2002.
[53]Vasan, A., & Shankar A. U., “An Empirical Characterization of Instantaneous Throughput in 802.11b WLANs”, 2002.
[54]Vellido, A., Lisboa, P. J. G. & Vaughan, J. (1999). Neural networks in business: a survey of applications. Expert Systems With Applications, 17, 51–70.
[55]Wang, J. Performance “Investigation of Secure 802.11 Wireless LANs”, 2003.
[56]W. C. Chang, et. al., “A Novel Prediction System for Wireless LAN Based on the Genetic Algorithm and Neural Network,” Conference on Local Computer Networks, Oct. 1999.
[57]W.Stallings, Wireless Communications and Networks, Prentice Hall, 2002.