photo
Name Chen, Chia-Mei
Title Professor
Research Interests Network Security, Anomaly Detection, Intelligence Defense, Cyber Threat Intelligence, Big Data Analysis
Office 管(CM) 4050
Phone 4726
Email cmchen@mis.nsysu.edu.tw


Education 1995, Ph.D., Computer Science, University of Maryland
1991, Master, Computer Science, University of Maryland
1986, Master, Computer Science, National Chiao-Tung University
1984, Bachelor, Computer Science, National Chiao-Tung University
Academic Services ~ , ,
~ , SCIE[], 審查委員
~ , [管理評論,TSSCI], 審查委員
~ , [資訊管理學報,TSSCI], 審查委員
2020-10-12 ~ 2022-10-11, Taiwan Institute of Ethical Business and Forensics, 理事
2018-10-12 ~ 2020-10-11, Taiwan Institute of Ethical Business and Forensics, 理事
2018-05-24 ~ 2021-05-23, 中華民國資訊安全學會, 理事
2018-03-16 ~ 2018-12-31, 國家中山科學研究院, 顧問
Category Year Title
Journal Article 2024 Chia-Mei Chen, Z. Y. Lin, Y. H. Ou, and J. Lin (2024). A hybrid malware analysis approach for identifying process-injection malware based on machine learning.. International Journal of Security and Networks. (EI)
Journal Article 2023 Chia-Mei Chen, J. J. Fang, Z. X. Cai, B. Lee, D. W. Wen (2023). Emergent Cybersecurity Information Discovery in Support of Cyber Threat Prevention. International Journal of Network Security. (EI)
Journal Article 2022 Albert Guan, Chia-Mei Chen (2022). A Novel Verification Scheme to Resist Online Password Guessing Attacks. IEEE Transactions on Dependable and Secure Computing. (SCI)
Journal Article 2022 W. C. Juang, M. H. Hsu, Z. X. Cai, and Chia-Mei Chen (2022). Developing an AI-assisted Clinical Decision Support System to Enhance In-patient Holistic Health Care. PLOS One. (SCIE)
Journal Article 2022 Chia-Mei Chen, Z-X Cai, and D-W Wen (2022). Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-border E-commerce Security Incidents. Journal of Global Information Management. (SSCI)
Journal Article 2021 Chia-Mei Chen, Gu-Hsin Lai, Zheng-Xun Cai, Tzu-Ching Chang, Boyi Lee, (2021). Detecting PE-Infection Based Malware. International Journal of Security and Networks. (EI)
Journal Article 2021 Chia-Mei Chen, D-W Wen, Y-H Ou, W-C Chao, and Z-X Cai (2021). Retrieving Potential Cybersecurity Information from Hacker Forums. International Journal of Network Security. (EI)
Journal Article 2021 Li-Chu Wu, Chia-Mei Chen, Zheng-Xun Cai, Ming Hsia Hsu, Wang-Chuan Juang (2021). Machine Learning-based Detection of Internet of Thing Attacks in Healthcare Environments. Information Technology in Industry.. Information Technology in Industry.. (其他期刊)
Journal Article 2020 Chia-Mei Chen, Y-H Liu, Z-X Cai, and G-H Lai (2020). A Power-efficient Approach to Detect Mobile Threats on the Emergent Network Environment. IEEE Access. (SCIE, EI)
Journal Article 2020 J. C. Chuang, Y. C. Hu, Chia-Mei Chen, Z. Yin. (2020). Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding. Multimedia Tools and Applications. (SCI)
Journal Article 2020 Chia-Mei Chen, G. H. Syu, Z. X. Cai (2020). Analyzing System Log based on Machine Learning Model. International Journal of Network Security. (EI)
Journal Article 2019 Chuang, JC; Hu, YC; Chen, CM; Lin, YH; Chen, Y (2019). Joint index coding and reversible data hiding methods for color image quantization. Multimedia Tools and Applications, 78(24), 35537-35558. (SCI)
Journal Article 2019 Chang, TH; Chen, CM; Hsiao, HW; Lai, GH (2019). Cracking of WPA & WPA2 Using GPUs and Rule-based Method. Intelligent Automation and Soft Computing, 25(1), 183-192. (SCIE)
Journal Article 2018 Chia-Mei Chen, W. L. Lo, Y. H. Ou, G. H. Lai, T. Y. Wang (2018). Application of Revised Ant Colony Optimization for Anomaly Detection Systems. International Journal of Computer and Electrical Engineering. (EI)
Journal Article 2018 Chia-Mei Chen, G. H. Lai, J. Lin (2018). Detection of C&C Servers Based on Swarm Intelligence Approach. Journal of Computers. ()
Journal Article 2014 Chen, CM; Guan, DJ; Su, QK (2014). Feature set identification for detecting suspicious URLs using Bayesian classification in social networks. INFORMATION SCIENCES, 289(289), 133-147. (SCIE)
Journal Article 2013 Chen, Chia-Mei; Cheng, Sheng-Tzong; Zeng, Ruei-Yu (2013). A proactive approach to intrusion detection and malware collection. SECURITY AND COMMUNICATION NETWORKS, 6(6), 844. (SCIE, EI)
Journal Article 2013 Chen, Chia-Mei(1); Huang, Ming-Zong(1); Ou, Ya-Hui(1) (2013). Detecting Web-Based Botnets with Fast-Flux Domains. Smart Innovation, Systems and Technologies, 21(21), 79-89. (EI)
Journal Article 2011 Lai, GH; Ouyang, CS; Chen, CM (2011). A Group-Based Deployment for Wormhole Prevention in Sensor Networks. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 27, 79-93. (SCIE)
Journal Article 2011 Chen,Chia-Mei(1);Ou,Ya-Hui(1) (2011). Secure mechanism for mobile web browsing. Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 924-928. (EI)
Journal Article 2010 Jenn-Long Liu, Chao-Wei Chou, Chai-Mei Chen (2010). Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm. International Journal of Business Intelligence and Data Mining. (SCIE)
Journal Article 2010 Hou, YT; Chen, CM; Jeng, B (2010). An optimal new-node placement to enhance the coverage of wireless sensor networks. WIRELESS NETWORKS. (SCIE)
Journal Article 2010 Chen, CM; Chen, YL; Lin, HC (2010). An efficient network intrusion detection. COMPUTER COMMUNICATIONS. (SCIE)
Journal Article 2010 Hou, YT; Chang, YM; Chen, TH; Laih, CS; Chen, CM (2010). Malicious web content detection by machine learning. EXPERT SYSTEMS WITH APPLICATIONS. (SCIE)
Journal Article 2010 Chen,Chia-Mei(1);Chen,Ya-Lin(1);Lin,Hsiao-Chung(1) (2010). An efficient network intrusion detection. Computer Communications, 33(4), 477-484. (EI)
Journal Article 2010 Hou,Yung-Tsung(1);Chang,Yimeng(2);Chen,Tsuhan(2);Laih,Chi-Sung(3);Chen,Chia-Mei(1) (2010). 20094012361809Title:Malicious web content detection by machine learning. Expert Systems with Applications, 37(1), 55-60. (SCIE, EI)
Journal Article 2010 Chen,Chia-Mei(1);Ou,Ya-Hui(1);Tsai,Yu-Chou(1) (2010). 20110713664044Title:Web botnet detection based on flow information. ICS 2010 - International Computer Symposium, 381-384. (EI)
Journal Article 2010 Y. T. Hou, Chia-Mei Chen, and B. C. Jeng (2010). An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks. Wireless Networks. (其他期刊)
Journal Article 2010 Hou,Yung-Tsung(1);Chen,Chia-Mei(1);Jeng,Bingchiang(1) (2010). 20102613047215Title:An optimal new-node placement to enhance the coverage of wireless sensor networks. Wireless Networks, 16(4), 1033-1043. (EI)
Journal Article 2010 Hou,Yung-Tsung(1);Chang,Yimeng(2);Chen,Tsuhan(2);Laih,Chi-Sung(3);Chen,Chia-Mei(1) (2010). Malicious web content detection by machine learning. Expert Systems with Applications, 37, 55-60. (EI)
Journal Article 2009 Lee, TF; Liu, JL; Sung, MJ; Yang, SB; Chen, CM (2009). Communication-efficient three-party protocols for authentication and key agreement. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 641-648. (SCIE)
Journal Article 2009 Liu, JL; Chen, CM (2009). Improved intelligent genetic algorithm applied to long-endurance airfoil optimization design. ENGINEERING OPTIMIZATION, 137-154. (SCIE)
Journal Article 2009 Lai, GH; Chen, CM; Laih, CS; Chen, T (2009). A collaborative anti-spam system. EXPERT SYSTEMS WITH APPLICATIONS, 6645-6653. (SCIE)
Journal Article 2009 Chen,C.M.(1);Ding,S.X.(1);Chang,C.P.(1);Kao,P.W.(1) (2009). Plane strain deformation microstructure of warm-worked aluminum. Materials Science and Engineering A, 512(1-2), 126-131. (EI)
Journal Article 2009 Lai,Gu-Hsin(1);Chen,Chia-Mei(1);Laih,Chi-Sung(2);Chen,Tsuhan(3) (2009). A collaborative anti-spam system. Expert Systems with Applications, 36, 6645-6653. (SCIE, EI)
Journal Article 2009 G. H. Lai, C. W. Chou, Chia-Mei Chen (2009). Anti-Spam Filter Based on Data Mining and Statistical Test. Journal of e-Business. (TSSCI)
Journal Article 2009 J. L. Liu and Chia-Mei Chen (2009). Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization Design. Engineering Optimization. (SCIE)
Journal Article 2009 Liu,Jenn-Long(1);Chen,Chia-Mei(1) (2009). Improved intelligent genetic algorithm applied to long-endurance airfoil optimization design. Engineering Optimization, 41(2), 137-154. (EI)
Journal Article 2008 G. H. Lai, Chia-Mei Chen, C. S. Laih, and T. Chen (2008). A Collaborative Anti-Spam System. Expert Systems with Applications, 44(1). (其他期刊)
Journal Article 2008 G. H. Lai and Chia-Mei Chen (2008). Detecting Denial of Service Attacks in Sensor Networks. Journal of Computers, 18(4). (其他期刊)
Journal Article 2008 Chia-Mei Chen and C. P. Wei (2008). Efficient Network Monitoring for Large Networks. Journal of Computers, 18(4). (其他期刊)
Journal Article 2008 Cheng,Sheng-Tzong(1);Li,Szu-Yun(1);Chen,Chia-Mei(2) (2008). Distributed detection in wireless sensor networks. Proceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008, 401-406. (EI)
Journal Article 2008 Lai,GuHsin;Chen,Chia-Mei;Jeng,Bing-Chiang;Chao,Willams (2008). Ant-based IP traceback. Expert Systems with Applications, v 34(n 4), p 3071-3080. (SCIE, EI)
Journal Article 2008 Cheng,Yu-Chin(1);Laih,Chi-Sung(1);Lai,Gu-Hsin(2);Chen,Chia-Mei(2);Chen,Tsuhan(3) (2008). Defending on-line web application security with user-behavior surveillance. ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, 410-415. (EI)
Journal Article 2008 Lin,W.-M.;Huang,C.-H.;Lin,C.-H.;Chen,C.-M.;Wang,L.-W. (2008). Restoration strategy for secondary power network with grey relational analysis. IET Generation, Transmission and Distribution, v 2(n 2), p 167-174. (EI)
Journal Article 2007 H. C. Wang, B. C. Jeng, Chia-Mei Chen (2007). Structural Testing Using a Memetic Algorithm. Journal of Software Engineering Studies, 2(4). (其他期刊)
Journal Article 2007 Chia-Mei Chen, B. C. Jeng, G. H. Lai, W Chao (2007). Ant-Based IP Traceback. Expert Systems with Applications, 36(3). (其他期刊)
Journal Article 2006 Hou,Yung-Tsung;Lee,Tzu-Chen;Chen,Chia-Mei;Jeng,Bingchiang\par[311,資管系,陳嘉玫] (2006). Node placement for optimal coverage in sensor networks\par. Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing\par, v 2006 II\par, p 352-357\par. (EI)
Journal Article 2006 Chen, CM; Jeng, BC; Yang, CR; Lai, GH (2006). Tracing denial of service origin: Ant colony approach. APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, p 286-295. (EI)
Journal Article 2006 Chen,Chia-Mei;Jeng,BingChiang;Yang,ChiaRu;Lai,GuHsin\par[311,資管系,陳嘉玫|324,資管系,鄭炳強] (2006). Tracing denial of service origin: Ant colony approach\par. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)\par, v 3907 LNCS\par, p 286-295\par. (EI)
Journal Article 2005 H. M. Sun, Chia-Mei Chen, L. C. Shu (2005). Object-based Multimedia Scheduling Based on Bipartite Graphs. IEICE Transaction on Communication, 23, 533-544. (SCIE)
Journal Article 2005 Sun, HM; Chen, CM; Shu, LC[陳嘉玫[資管系]] (2005). Object-based multimedia scheduling based on bipartite graphs. IEICE TRANSACTIONS ON COMMUNICATIONS, 23, 533-544. (SCIE)
Journal Article 2004 Chen, CM; Sun, HM; Shu, LC[311,陳嘉玫,資管系] (2004). Optimizing object-based multimedia delivery across bandwidth constrained networks. COMPUTER JOURNAL, 47, 579-590. (SCIE)
Journal Article 2000 Cheng, ST; Chen, CM; Tripathi, SK[311,資管系,陳嘉玫] (2000). A fault-tolerance model for multiprocessor real-time systems. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 61, 457-477. (SCIE)
Journal Article 2000 Cheng, ST; Chen, Chia-Mei (2000). Dynamic round-based resource management for on-demand multimedia servers. COMPUTER JOURNAL, 43, 386-395. (SCIE)
Conference Paper 2024 W. C. Juang, J. Lin, Chia-Mei Chen, and Z. X. Cai (2024). An Assessment of Cybersecurity Awareness in a Healthcare Institute. 23rd International Conference on Emergency Medicine (ICEM 2024), Taiwan.
Conference Paper 2023 Chia-Mei Chen, S. Y. Huang, Z. X. Cai, Y. H. Ou, J. Lin (2023). Detecting Supply Chain Attacks with Unsupervised Learning. IEEE International Conference on Applied System Innovation, Japan.
Conference Paper 2023 Chia-Mei Chen, F. H. Hsu, J. N. Hwang (2023). Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. European Interdisciplinary Cybersecurity Conference, Norway.
Conference Paper 2023 Chia-Mei Chen, S. H. Lin, G. H. Lai, Y. H. Ou, Z. X. Cai (2023). Identify Vulnerable Components in IoT Using Machine Learning. The 13th International Conference on Frontier Computing (FC 2023), Japan.
Conference Paper 2023 J. W. Lin, Chia-Mei Chen, Z. X. Cai, and W. C. Juang (2023). Assessment of Information Security Awareness in Healthcare by Social Engineering Exercise. International Society for Quality in Health Care 39th International Conference (ISQua), South Korea.
Conference Paper 2022 C C. Chang, Chia-Mei Chen and H. W. Hsiao (2022). Applying an IoT Analytics Framework in East Asia Area. International Computer Symposium, Taiwan.
Conference Paper 2022 Chia-Mei Chen, Y. X. Wang, Z. X. Cai, B. Lee, and G. H. Lai (2022). Automatic Summarization of Critical Threat Intelligence Using Transfer Learning. International Computer Symposium, Taiwan.
Conference Paper 2022 W. C. Juang, Chia-Mei Chen, Z. X. Cai, M. H. Hsu (2022). Developing an Efficient Clinic Decision Support System Based on Deep Learning. Conference of International Society for Quality in Health Care, Australia.
Conference Paper 2021 Chia-Mei Chen, Z-X Cai, G-H Lai (2021). A Study of Identifying Attacks on Industry Internet of Things using Machine Learning. The International Conference on Artificial Intelligence, Soft Computing, .
Conference Paper 2021 陳嘉玫, 方俊傑,官振傑, 歐雅惠 (2021). 以文字探勘挖掘資安趨勢之研究. 管理觀念與應用研討會, .
Conference Paper 2021 Chia-Mei Chen, J-Y Kan, Y-H Ou, Z-X Cai, and A. Guan (2021). Threat Action Extraction Using Information Retrieval. . The International Conference on Computer Science and Information Technology, .
Conference Paper 2021 Albert Guan, Chia-Mei Chen (2021). A Novel Verification scheme to Resist Password Guessing Attacks. IEEE Conference on Dependable and Secure Computing, .
Conference Paper 2020 Tienho Chang, Chia-Mei Chen, Gu-Hsin Lai and Yu-Che Hu (2020). The Analysis of the Wireless Access Point password with GPU and Rules-Based Method. Computer Information Security Conference, .
Conference Paper 2020 T. Chang, Chia-Mei Chen, G. H. Lai (2020). The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units. The 15th Asia Joint Conference on Information Security, .
Conference Paper 2020 Chia-Mei Chen, G. H. Lai, T. C. Chang, B. Lee (2020). Detecting PE Infection Based Malware. The Future of Information and Communication Conference, .
Conference Paper 2019 Chia-Mei Chen, W. C. Juang, and D. W, Wen (2019). Communication among Distinctive Experts on a System Development Project. 專案管理國際研討會, Taiwan.
Conference Paper 2019 Chia-Mei Chen, D. W. Wen, J. J. Fang, G. H. Lai, Y. H. Liu (2019). A Study on Security Trend based on News Analysis. The 10th IEEE International Conference on Awareness Science and Technology, Japan.
Conference Paper 2019 Chia-Mei Chen, G. H. Lai, J. M. Lin (2019). Detection of mobile malware in IoT Networks Environment.. Future ICT, Taiwan.
Conference Paper 2019 Chia-Mei Chen, S. H. Wang, D. W. Wen, G. H. Lai, M. K. Sun (2019). Applying Convolutional Neural Network for Malware Detection. The 10th IEEE International Conference on Awareness Science and Technology, Japan.
Conference Paper 2019 Chia-Mei Chen, W. C. Juang, S. J. Huang, and D. W. Wen (2019). Telemedicine for rural area in southern Taiwan. International Forum on Quality and Safety in Healthcare, Taiwan.
Conference Paper 2018 Chia-Mei Chen, G.H Lai and Z.-X. Tsai (2018). Integrated Digital Forensic for Cyber Attacks. International Conference on Security with Intelligent Computing and Big-data Services, China.
Conference Paper 2018 Chia-Mei Chen, W. L. Lo, G. H. Lai, Y. C. Hu (2018). Network Anomaly Detection Based on Artificial Intelligence. The Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Japan.
Conference Paper 2018 T. H. Chang, Chia-Mei Chen, G. H. Lai, J. Lin (2018). The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic. IEEE Dependable and Secure Computing, Taiwan.
Conference Paper 2018 D. W. Wen, Chia-Mei Chen (2018). Evolution of Advanced Persistent Threat (APT) Attacks and Actors. International Computer Symposium, Taiwan.
Conference Paper 2011 Chia-Mei Chen and Y-H Ou (2011). Secure Mechanism for Mobile Web Browsing. IEEE ICPADS 2011 Joint Workshop on Network and System Security, Taiwan.
Conference Paper 2011 Chia-Mei Chen, D. J. Guan, Q-K Su, and T-Y Wang (2011). Malicious URL Detection on Facebook. The Sixth Joint Workshop on Information Security , Taiwan.
Conference Paper 2011 Chia-Mei Chen (2011). Detecting Anomaly Mobile Web Page through Template Classification. The 11th Emerging Information and Technology Conference, United States.
Conference Paper 2011 陳嘉玫、歐雅惠、黃銘宗 (2011). 偵測具有動態網域特性的殭屍網路. 第二十一屆資訊安全會議, Taiwan.
Conference Paper 2010 Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, (2010). Web Botnet Detection Based on Flow Information. International Computer Symposium, Taiwan.
Conference Paper 2010 陳嘉玫、歐雅惠、林士棻 (2010). 行動裝置安全瀏覽網頁之機制. 第十六屆資訊管理暨實務研討會, Taiwan.
Conference Paper 2010 陳嘉玫、洪瑞麟、林孝忠、吳惠麟 (2010). 以Linux 系統為基礎之日誌檔樣式化研究. TANET 2010 台灣網際網路研討會, Taiwan.
Conference Paper 2006 S.T. Cheng, C.Y. Wang, Chia-Mei Chen (2006). An Adaptive Data Broadcasting for Wireless Access. The IASTED International Conference on Wireless Network and Emerging Technologies , Canada.
Conference Paper 2006 Y.T. Hou, T.C. Lee, B.C. Jeng, Chia-Mei Chen (2006). Optimal Coverage Deployment for Wireless Sensor Networds. International Conference on Advances Communication Technology co-sponsored by IEEE Communications Society, South Korea.
Conference Paper 2006 Y.T. Hou, T.C. Lee, Chia-Mei Chen, B.C. Jeng (2006). Node Placement for Optimal Coverage in Sensor Networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy, Taiwan.
Conference Paper 2006 Chia-Mei Chen, B. C. Jeng, C. R. Yang, G. H. Lai (2006). Tracing Denial of Service Origin: Ant Colony Approach. European Workshop on Evolutionary Computation in Communication, Networks and Connected Systems (EcoCOMNET), Hungary.
Conference Paper 2006 邱郁芬, 林孝忠, 陳嘉玫 (2006). 以區域聯防為基礎之垃圾郵件防法研究. 2006數位教學暨資訊實務研討會, Taiwan.
Conference Paper 2005 Y.L. Chen, Chia-Mei Chen, C. Ravishankar (2005). a lightweight network intrusion detection. 2005 international forensic science symposium, 中華民國.
Conference Paper 2005 Chia-Mei Chen, N.S. Chen, J.S. Cheng, I.L. Lin (2005). localization on network auditing system. 2005 international forensic science symposium, 中華民國.
Conference Paper 2005 Chia-Mei Chen, S.P. We, J.S. Cheng (2005). effective network monitot based on flow traffic. first computer security incident handing conference, 中華民國.
Conference Paper 2005 陳嘉玫,楊鴻鈞,賴谷鑫 (2005). 滿足服務品質需求之資源管理研究. 第16屆國際資訊管理學術研討會, 中華民國.
Conference Paper 2005 陳嘉玫, 賴谷鑫, 羅哲峰 (2005). 客戶需求傳輸之動態資源管理研究. 資通技術管理與應用研討會, 中華民國.
Conference Paper 2005 陳嘉玫,賴谷鑫,羅哲峰 (2005). 客戶需求傳輸之動態資源管理研究. 資通技術管理與應用研討會, Taiwan.
Conference Paper 2005 陳雅玲, 陳嘉玫, 鄭炳強 (2005). LINIDS:輕型網路入侵偵測研究. 第16屆國際資訊管理學術研討會, Taiwan.
Conference Paper 2005 陳嘉玫, 楊鴻鈞, 賴谷鑫 (2005). 滿足服務品質需求之資源管理研究. 第16屆國際資訊管理學術研討會, Taiwan.
Conference Paper 2005 曾仲強, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以支援向量機為基礎之後門程式入侵偵測. 第16屆人工智慧與應用研討會, Taiwan.
Conference Paper 2005 曾漠益, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以約略集合理論為基礎之垃圾郵件過濾研究. 第16屆人工智慧與應用研討會, Taiwan.
Conference Paper 2005 Chia-Mei Chen, S. P. We, J. S. Cheng (2005). Effective Network Monitor Based on Flow Traffic. The 1st Computer Security Incident Handling Conference, Singapore.
Conference Paper 2005 邱郁芬, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以區域聯防為基礎之垃圾郵件防法研究. 2005年網際空間:資安, 犯罪與法律社會, Taiwan.
Conference Paper 2005 Y. L. Chen, Chia-Mei Chen, C. Ravishankar (2005). A Lightweight Network Intrusion Detection. 2005 International Forensic Science Symposium (IFSS), Taiwan.
Conference Paper 2005 Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin (2005). Localization on Network Auditing Systems. 2005 International Forensic Science Symposium (IFSS), Taiwan.
Conference Paper 2003 HM Sun, CM Chen, LC Shu (2003). Optimizing multimedia delivery over bandwidth limited networks. The 13th International Conference on Pacific Rim Management, 中華民國.
Conference Paper 2003 陳嘉玫, 吳啟常, 鄭進興, 陳年興 (2003). Code Automation for Vulnerability Scanner. 網際空間:資訊, 法律與社會學術研究暨實務研討會, 中華民國.
Conference Paper 2003 陳嘉玫, 鄭偉成, 鄭進興, 陳年興 (2003). Intrusion Detection on Distribution Attacks. 網際空間:資訊, 法律與社會學術研究暨實務研討會, Taiwan.
Conference Paper 2003 陳嘉玫, 吳啟常, 鄭進興, 陳年興  (2003). Code Automation for Vulnerability Scanner . 網際空間:資訊, 法律與社會學術研究暨實務研討會 , Taiwan.
Conference Paper 2003 陳嘉玫, 鄭偉成, 鄭進興, 陳年興  (2003). Intrusion Detection on Distribution Attacks . 網際空間:資訊, 法律與社會學術研究暨實務研討會 , Taiwan.
Conference Paper 2003 HM Sun, CM Chen, LC Shu  (2003). Optimizing multimedia delivery over bandwidth limited networks . The 13th International Conference on Pacific Rim Management , Japan.
Book and Chapter 2014

陳嘉玫、吳惠麟 (2014). 網路安全概論與實務. 碁峰資訊

Year Title
2023

112年臺南市ISAC區域聯防服務. 中華資安國際股份有限公司 (N112151)

2023

運用深度學習自動化萃取威脅情資. Ministry of Science and Techonology (112-2221-E-110-028-MY3)

2022

探討醫護人員之資安意識與改善措施. 高雄榮民總醫院 (29)

2021

企業資安防護及案例分享研討會. 財團法人台灣網路資訊中心 (5)

2021

110年度疑似我國金融機構網站及行動應用程式偵測系統概念性驗證案. 財金資訊股份有限公司 (14)

2020

「高雄市政府109年前瞻計畫資安區域聯防產學合作」研究計畫專案. 中華資安國際股份有限公司 (N109139)

2020

疑似我國金融機構網站及行動應用程式偵測機制研究案. 財金資訊股份有限公司 (N109104)

2020

Defensing Targeted Attacks by Real-time Monitoring and Threat Intelligence. Ministry of Science and Techonology (109-2221-E-110-042-MY3)

2020

精實醫療內化與實踐. 高雄榮民總醫院 (109019.1)

2019

物聯網資安情資分享. 中華資安國際股份有限公司 (N109164)

2019

物聯網資安情資分享. 中華資安國際股份有限公司 (N108202)

2018

護理排班與遠距醫療系統之研發. 高雄榮民總醫院 (107034)

2018

通訊協定模糊測試模組開發. 安華聯網科技股份有限公司 (N107060)

2018

107年前瞻計畫資安區域聯防平台系統(K-ISAC)建置暨維運案. 中華電信股份有限公司企業客戶分公司 (N107111)

2017

Hisams: Hadoop Intelligent Security Analysis and Management System. MOST (106-2221-E-110-017-MY3)

2017

醫事人員排班系統研究. 高雄榮民總醫院 (106040)

2016

金融科技外匯研究. 匯智通訊股份有限公司 (N105145)

2015

雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究. MOST (103-2221-E-110-049-MY3)

2015

Binary Hack快速偵測以及行為分析. 安碁資訊股份有限公司 (N104103)

2013

網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究. MOST (100-2218-E-110-004-MY3)

2013

以雲端科技結合Android平台之即時性個人化服務研究. MOST (102-2815-C-110-005-H)

2013

TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 (N102001)

2012

網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究. MOST (NSC100-2218-E-110-004-MY3)

2011

端資安監控平台之研發-子計畫三:安全的上網環境之研究. MOST (NSC100-2218-E-110-011)

2011

TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 (N100118)

2011

TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心

2010

有主動防禦機制的誘捕系統研究(開放軟體元件開發分項). MOST (NSC99-2220-E-110-002-)

2009

智慧行動裝置瀏覽網頁之安全機制(開放軟體元件開發分項). MOST (NSC98-2220-E-110-011)

2009

網路威脅搜捕分析與追蹤技術研究─子計畫一:分散式網路威脅搜捕技術研究. MOST (NSC98-2218-E-110-007)

2008

結合資料探勘與統計檢定之垃圾郵件過濾器之研究(自由軟體產業關鍵技術開發分項). MOST (NSC97-2218-E-110-004)

2007

智慧家庭監控系統之研究(自由軟體產業關鍵技術開發分項). MOST (NSC96-2218-E-110-005)

2007

3G行動通訊系統之資訊安全監控與管理. 台灣大哥大股份有限公司 (96068)

2006

無線感測網路之覆蓋研究. MOST (NSC95-2221-E-110-083)

2006

Linux開放架構下數位生活家用網路安全之嵌入式平台開發. MOST (NSC95-3113-P-110-001)

2005

以螞蟻演算法為基礎之來源追蹤之研究. MOST (NSC94-2213-E-110-049)

2004

以使用者行為特徵為基礎安全機制. MOST (NSC93-2213-E-110-045)

2004

網路入侵事件回報自動化與分析. MOST (93-2815-C-110 -022 -H)

2004

DNS安全檢測及事件紀錄分析機制實作研究(TWNIC︱NS︱093︱001). 財團法人台灣網路資訊中心 (93136)

2003

DNS Security 資源網站建置維護暨DNSSEC之研究(計畫編號︰TWNIC-NC-092-. 財團法人台灣網路資訊中心 (1485)

2002

無線網路遊戲平台與魔法卡交易遊戲之研究開發. MOST (NSC91-2622-E-110-014-CC3)

2002

位置衍生之服務與應用技術-子計畫二:位置認知下資訊安全機制與服務(I). MOST (NSC91-2219-E-110-002)

2002

DNS伺服器安全檢測與防護體系之建置與運作. 財團法人台灣網路資訊中心 (1255)

1970

雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究. MOST (103-2221-E-110-049-MY3)

Year Semester Required / Selected Department Course Code Course
112 2 Required Department of Information Management MIS302 OPERATING SYSTEMS
112 2 Selected Department of Information Management MIS538 NETWORK SECURITY
112 2 Selected Department of Information Management MIS602 SPECIAL TOPICS IN COMPUTER NETWORKS
112 2 Required Department of Information Management MIS506 SEMINAR IN INFORMATION MANAGEMENT (II)
111 2 Selected Department of Information Management MIS538 NETWORK SECURITY
111 2 Required Department of Information Management MIS302 OPERATING SYSTEMS
111 1 Selected Department of Information Management MIS570 INTRODUCTION TO CLOUD COMPUTING
111 1 Selected Department of Information Management MIS602 SPECIAL TOPICS IN COMPUTER NETWORKS
110 2 Required Department of Information Management MIS302 OPERATING SYSTEMS
110 2 Selected Department of Information Management MIS538 NETWORK SECURITY
110 1 Selected Department of Information Management MIS602 SPECIAL TOPICS IN COMPUTER NETWORKS
110 1 Selected Department of Information Management MIS570 INTRODUCTION TO CLOUD COMPUTING
Year Name Degree Title
2022 Po-Hsuan Wang Master Improving Overhead Hoist Transport System Scheduling by Congestion Reduction
2022 Yu-Jie Li Master Predicting Out-of-Hospital Cardiac Arrest Cases Based on Machine Learning
2022 Yu-Jie Chen Master Attack Trend Analysis Based on Detection Rules and Incident Reports
2022 Chi-Hsuen Hsu Master Improving the Robustness of Intrusion Detection System of Industrial Control System by Using Generative Adversarial Samples
2022 Sun-Jie Zhang Master A Study of Discovering Emergent Cyber Threat Intelligence Based on Natural Language Processing
2022 Che-Ming Chien Master Attack Trend Analysis Based on Incident Logs
2022 Tzu-Hao Yeh Master A Study on Retailer's Inventory Prediction by Using Machine Learning
2022 Sung-Chih Chou Master Research on the Impact of Buy Now Pay Later Mechanism on Consumer Shopping Behavior
2021 Fang-Hsuan Hsu Master Extracting Cyber Attack Relations by Using Deep Learning
2021 Wei-Jie Kang Master Brute-Force Attack Detection Based on Clustering and Risk Analysis
2021 Zhong-Yi Hong Master A Study of the Procedure of Handling Line Subscriber Incidents
2021 Jin-Wei Liu Master Robustness and Defense of Anomaly Detection Model Against Adversarial Attack
2021 Yu-Chin Chou Master Semi-supervised Cyber Attack Relation Extraction via Self-Training
2021 Tzu-Ching Wang Master Automatic Firmware Vulnerability Detection Based on Deep Learning with Semantic Extraction
2021 Keng-Yao Kuo Master Discussing the Effectiveness of Defending Supply Chain Attacks after Implementing Cyber Security Management Act
2021 CHENG-HSIANG YEH Master Adopting Security Orchestration Automation and Response to Improve the Efficiency of Security Operation Center – a Case Study of C Company
2021 Bo-Chi Shih Master A Study of Analyzing Mixed Reality in 5G
2021 Zi-Jun Xu Master A Study of Adopting Internet of Things on Machine Management for Traditional Industry
2021 Guan-Wun Chen Master A Study of Communication Signal Tuning for Improving Telecommunication Quality of Service
2020 Jing-Yun Kan Master Extracting Cyber Threat Intelligence by Using Information Retrieval
2020 Kuo-Ying Wang Master A Study of Virtualization for IoT Honeypot
2020 Mei-Wen Lin Master A Performance Analysis of Hadoop Clusters on OpenStack Cloud
2020 Ya-Wen Cheng Ph.D Developing a contextual language learning environment for children utilizing robots and IoT-based toys
2020 Hsin-Yu Hsieh Master A Machine Learning Based Analyzing Integrated Forensics
2020 Sung-Yu Huang Master Anomaly Detection Based on Active Directory Log Analysis System
2020 Yu-Xuan Wang Master Abstractive Summarization of Target Attacks Based on Transfer Learning
2020 Sheng-Hao Lin Master Automatic Firmware Vulnerability Detection Based on Machine Learning
2020 Po-Wei Lu Master A Study of Applying SDN to Improve Network Management Operation
2020 Zhi-Wei Chen Master The Business Strategy for the 5G Internet of Things Service : A Case Study of Far EasTone
2020 HongWei Huang Master Defend against botnet attacks based on the Internet of Things-with Raspberry Pi as defense
2019 Hsiu-Min Huang Master Identifying Insider Threats Based on Profiling
2019 Chih-Yuan Hsu Master Profile Based Anomaly Detection Using Cloud Platform
2019 Wei-Chih Chao Master Discovering Cyber Threat Intelligence from Hacker Forums
2019 Jun-Jie Fang Master A Study of Discovering Security Trends from News Analysis
2019 Tien-Ho Chang Ph.D The Study of Wireless Network Security using Password Analysis with Rules and GPUs
2019 Jiunn-Wu Lin Ph.D Host risk assessment platform based on DWT and profile analysis
2018 Hsuan-Ming Chen Master Big Data Intrusion Detection Using Cluster Computing
2018 Jhih-Syong Long Master Defending DLL Injection in Runtime
2018 Ming-Sung Chen Master A Study of the Process of Information Security Incident Handling for Web Servers
2018 Gen-Hong Syu Master A Neural Network based Forensic System by Analyzing System Log
2018 Chen-Han Dai Master Detecting Metamorphic Malware based on Machine Learning
2018 Chien-An Hou Master Improving the Availability of Cloud Storage using Machine Learning
2018 Heng-Yi Cheng Master Improvement of Automatic Temperature Control Strategy for Slab Reheating Furnace in Hot Strip Mill
2017 Pan-Jo Chuang Master Ransomware Detection by Monitoring I/O Requests
2017 Zheng-Xun Tsai Master An Automatic Forensic System for Incident Response
2017 Ze-yu Lin Master Detecting Malicious Behavior of Process Injection
2017 Shi-Hao Wang Ph.D Applying Convolutional Neural Network for Malware Detection
2016 Ya-Hui Ou Ph.D Detecting Targeted Attacks by Risk Evaluation
2016 Yen-chih Kuo Master Detecting the Accuracy of Highway Incident Warnings in VANETs
2016 Yu-han Chang Master Improving Detection Efficiency using Cloud Computing
2015 Tse-yao Wang Ph.D The study of data preprocessing difference to impact the botnet detection performance
2015 Wen-Ling Lo Master Botnet Detection Based on HTTP Header Anomaly
2015 Sung-Chien Hsu Master Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks
2015 I-Kai Wang Master Multi-layer Incremental Clustering for Malware Analysis
2015 CHIPING LAI Master Detecting Intrusions Using Social Network Analysis And Bayesian Network
2015 Yu-Hsuan Tsai Master Fast Mobile Malware Detection Based on Hybrid Analysis Method
2015 Jung-Kuang Fu Master The Design of Monitoring Distributed Systems in Cloud
2015 Tzu-Ching Chang Master Detecting Malware with DLL Injection And PE Infection
2014 WEI-JEN YU Master Implementation of Disaster Risk Avoidance Mobile Application
2013 Wen-yung LIN Master A Study of Reengineering for Information Systems - The Case of Taxation Information System
2012 Che-cheng Chang Master Persistent Threat Detection Using Hidden Markov Model
2012 Je-Ming Lin Master Detecting Mobile Application Malicious Behavior Based on Taint Propagation
2012 Hsiao-Chung Lin Ph.D Detecting Centralized Botnets based on Anomaly Traffic Behaviors
2012 Hui-chun Lin Master Study of Effectiveness of Social Engineering Spam Prevention Operation
2012 Wen-Ching Chiang Master Behavior Analysis of Mobile Malware Based on Information Leakage
2012 Tun-Jui Yuan Master Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel
2012 Liang-Chung Yuan Master Study of Personal Privacy Information Protection Operation In Government Agencies
2012 Jui-hsiang Kuo Master Study on the Integration of Information Security Management System and Personal Information Management System
2012 Chiao-Wei Huang Master Incremental Clustering Malware from Honeypots
2011 Yu-Yun Li Master Botnet Detection Based on Ant Colony
2011 Jhe-Jhun Huang Master Detecting Drive-by Download Based on Reputation System
2011 Peng Yu Yang Master Detecting Botnet-based Joint Attacks by Hidden Markov Model
2011 Ling-Ming Zeng Master Malware Classification Based on File and Registry Activities
2011 Min-ying Tsai Master Mutilple Sensor Anomaly Correlation
2011 Chia-hui Yang Master Code Classification Based on Structure Similarity
2011 Hung-Shiuan Tsai Master Concise Analysis of Malware Behavior
2009 Jui-lin Hung Master A Study of Log Patternization for Linux-based Systems
2009 Ming-Zong Huang Master Hybrid Botnet Detection
2008 Yung-tsung Hou Ph.D The Worst-case and Best-case Coverage Problems in Wireless Sensor Networks
2008 Shih-chiang Lin Master An Group-Buying Message Distribution Rate Research in Mobile P2P Network Environment
2008 Jun-jie Liu Master A Effect of Time to Group-Buying in Mobile P2P Network Environment
2008 Wan-yi Tsai Master Malicious Web Page Detection Based on Anomaly Behavior
2008 Ming-Yi Wu Master A Security Solution on Availability for Next Generation Telecommunication Networks Management Information Systems
2008 Gu-Hsin Lai Ph.D An Adaptive Server-Side Anti-Spam System
2008 Shao-Chuan Huang Master Network Security Planning for New Generation Network Service Providers
2008 Yu-Chou Tsai Master Web-based Botnet Detection Based on Flow Information
2008 Yi-ling Chen Master IRC-Based Botnet Detection on IRC Server
2007 Yu-Ping Lin Master Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels
2007 Chih-Chin Yang Master A Spam Filter Based on Reinforcement and Collaboration
2007 Chih-yang Chao Master Global-fit Clustering for Sensor Network
2007 Pao-Tien Chen Master A Study of Information Security for Computerized Process Control
2007 Shin-wei Huang Master The Empirical Study of Trend Following Program Trading on Taiwan Stock Market
2007 Chun-Chang Kuo Master A Security Solution for Next Generation Mobile Telecommunication Networks
2006 Wei-Cheng Liu Master Applying Resource Usage Analysis to Software Testing
2006 Chang-Yu Li Master Association rules for exploit code analysis to prevent Buffer Overflow
2006 Shih-Fen Lin Master Malicious DHTML Detection by Model-based Reasoning
2006 KuongCheong Ieong Master The empirical study of applying Technical Analysis on DJI, HSI and Taiwan Stock Market
2006 Tsung-Han Tsai Master A New Combinatorial Strategy to Black-box Testing with Constraints
2006 陳彥邦 Master 網路使用者之資訊隱私顧慮探討-採用行為意向模式
2006 Chang-ming Hsu Master A Test Data Evolution Strategy under Program Changes
2006 Wei-yu Lai Master Information Exchange Mechanism Based on Reputation in Mobile P2P Networks
2006 Leng-yau Cheng Master Automatic test data generation by particle swarm optimization
2006 Ching-Chang Wu Master Code Automation for Vulnerability Scanner
2006 Bon-Yen Liaw Master The study of incident response in Taiwan
2006 Hung-Chun Yang Master Admission Control with Maximizing QoS Satisfactions
2006 Chih-Hung Huang Master Detecting Java Memory Leak by Time Series Analysis
2005 Pai-Hung Hsu Master Empirical study on strategy for Regression Testing
2005 Tzu-Chen Lee Master Straight-line Coverage in Wireless Sensor Networks
2005 Hsiu-Chi Wang Master A hybrid genetic algorithm for automatic test data generation
2005 Wang Chien-Lung Master Adaptive Clustering for Sensor Network
2005 Yu-fen Chiu Master Anti-Spam Study: an Alliance-based Approach
2005 Po-Kai Chen Master An Automated Method for Resource Testing
2004 Zhong-Chiang Tzeng Master Backdoor Detection based on SVM
2004 Mo-yi Tzeng Master A Spam Filter Based on Rough Sets Theory
2004 Chia-Ru Yang Master Denial of Service Traceback: an Ant-Based Approach
2004 Ya-lin Chen Master Lightweight Network Intrusion Detection
2003 Huey-Min Sun Ph.D Multimedia Scheduling in Bandwidth Limited Networks
2003 Wang-tzu Han Master Detecting Remote Attacks
2003 Kun-Ye Lai Master Localization for Vulnerability Scanner
2003 Cheng-yuan Kao Master Detecting Backdoor
2003 Chuan-pi Wei Master Network Monitoring on Large Networks
2002 Jia-Ching Fang Master Network Security Analysis and Summary in Taiwan
2002 Wei-Cheng Cheng Master Intrusion Detection on Distributed Attacks
2002 Ching-Chang Wu Master Code Automation for Vulnerability Scanner
2002 Bon-Yen Liaw Master The study of incident response in Taiwan
2002 Hung-Chun Yang Master Admission Control with Maximizing QoS Satisfactions
2001 Char-Ming Lin Master Oversea incident report automatic and analysis
2000 Che-Feng Lo Master Resource Allocation for Multimedia with QoS Requirement in Wireless Network
2000 Chih-Ching Chuang Master An HTML Filter on WAP Gateway
2000 Ching-Shin Tsai Master Architecture for Web Server with Push Capability
1999 Yan-Bang Chen Master Exploring Internet Users ’Information Privacy Concerns -Use the Intention-Based models
Year Title Awarding Organization
2020 Best Paper Award 中華民國資訊安全學會
2019 教學優良課程 中山大學
2018 Super Teaching Award National Sun Yat-sen University
2018 資安技能金盾獎之嶄露頭角獎 行政院國家資通安全會報技術服務中心
2017 Best Paper Award National Computer Symposium
2017 Super Teaching Award National Sun Yat-sen University
2016 Super Teaching Award National Sun Yat-sen University
Period Activity Description Role