photo
Name Chen, Chia-Mei
Title Professor
Research Interests Network Security, Intrusion Detection, Wireless Networks, Sensor Networks, Distributed Systems
Office 管(CM) 4050
Phone 4726
Email cmchen@mis.nsysu.edu.tw


Education 1995, Ph.D., Computer Science, University of Maryland
1991, Master, Computer Science, University of Maryland
1986, Master, Computer Science, National Chiao-Tung University
1984, Bachelor, Computer Science, National Chiao-Tung University
Experience
Administrative Positions
Academic Services ~ , ,
~ , SCIE[], 審查委員
~ , [管理評論,TSSCI], 審查委員
~ , [資訊管理學報,TSSCI], 審查委員
Category Year Title
Journal Article 0 G. H. Lai, C. W. Chou, Chia-Mei Chen (0). Anti-Spam Filter Based on Data Mining and Statistical TestJournal of e-Business, (), . (TSSCI)
Journal Article 0 Y. T. Hou, Chia-Mei Chen, and B. C. Jeng (0). An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor NetworksWireless Networks, (), . (其他期刊)
Journal Article 0 J. L. Liu and Chia-Mei Chen (0). Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization DesignEngineering Optimization, (), . (其他期刊)
Journal Article 2014 Chen, CM; Guan, DJ; Su, QK (2014). Feature set identification for detecting suspicious URLs using Bayesian classification in social networksINFORMATION SCIENCES, 289(289), 133-147. (SCIE)
Journal Article 2013 Chen, Chia-Mei; Cheng, Sheng-Tzong; Zeng, Ruei-Yu (2013). A proactive approach to intrusion detection and malware collectionSECURITY AND COMMUNICATION NETWORKS, 6(6), 844. (SCIE, EI)
Journal Article 2013 Chen, Chia-Mei(1); Huang, Ming-Zong(1); Ou, Ya-Hui(1) (2013). Detecting Web-Based Botnets with Fast-Flux DomainsSmart Innovation, Systems and Technologies, 21(21), 79-89. (EI)
Journal Article 2011 Lai, GH; Ouyang, CS; Chen, CM (2011). A Group-Based Deployment for Wormhole Prevention in Sensor NetworksJOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 27(), 79-93. (SCIE)
Journal Article 2011 Chen,Chia-Mei(1);Ou,Ya-Hui(1) (2011). Secure mechanism for mobile web browsingProceedings of the International Conference on Parallel and Distributed Systems - ICPADS, (), 924-928. (EI)
Journal Article 2010 Hou, YT; Chen, CM; Jeng, B (2010). An optimal new-node placement to enhance the coverage of wireless sensor networksWIRELESS NETWORKS, (), . (SCIE)
Journal Article 2010 Chen,Chia-Mei(1);Chen,Ya-Lin(1);Lin,Hsiao-Chung(1) (2010). An efficient network intrusion detectionComputer Communications, 33(4), 477-484. (EI)
Journal Article 2010 Hou,Yung-Tsung(1);Chang,Yimeng(2);Chen,Tsuhan(2);Laih,Chi-Sung(3);Chen,Chia-Mei(1) (2010). 20094012361809Title:Malicious web content detection by machine learningExpert Systems with Applications, 37(1), 55-60. (SCIE, EI)
Journal Article 2010 Chen,Chia-Mei(1);Ou,Ya-Hui(1);Tsai,Yu-Chou(1) (2010). 20110713664044Title:Web botnet detection based on flow informationICS 2010 - International Computer Symposium, (), 381-384. (EI)
Journal Article 2009 Lee, TF; Liu, JL; Sung, MJ; Yang, SB; Chen, CM (2009). Communication-efficient three-party protocols for authentication and key agreementCOMPUTERS & MATHEMATICS WITH APPLICATIONS, (), 641-648. (SCIE)
Journal Article 2009 Chen,C.M.(1);Ding,S.X.(1);Chang,C.P.(1);Kao,P.W.(1) (2009). Plane strain deformation microstructure of warm-worked aluminumMaterials Science and Engineering A, 512(1-2), 126-131. (EI)
Journal Article 2009 Lai,Gu-Hsin(1);Chen,Chia-Mei(1);Laih,Chi-Sung(2);Chen,Tsuhan(3) (2009). A collaborative anti-spam systemExpert Systems with Applications, 36(), 6645-6653. (SCIE, EI)
Journal Article 2009 Liu,Jenn-Long(1);Chen,Chia-Mei(1) (2009). Improved intelligent genetic algorithm applied to long-endurance airfoil optimization designEngineering Optimization, 41(2), 137-154. (EI)
Journal Article 2008 G. H. Lai, Chia-Mei Chen, C. S. Laih, and T. Chen (2008). A Collaborative Anti-Spam SystemExpert Systems with Applications, 44(1), . (其他期刊)
Journal Article 2008 G. H. Lai and Chia-Mei Chen (2008). Detecting Denial of Service Attacks in Sensor NetworksJournal of Computers, 18(4), . (其他期刊)
Journal Article 2008 Chia-Mei Chen and C. P. Wei (2008). Efficient Network Monitoring for Large NetworksJournal of Computers, 18(4), . (其他期刊)
Journal Article 2008 Cheng,Sheng-Tzong(1);Li,Szu-Yun(1);Chen,Chia-Mei(2) (2008). Distributed detection in wireless sensor networksProceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008, (), 401-406. (EI)
Journal Article 2008 Lai,GuHsin;Chen,Chia-Mei;Jeng,Bing-Chiang;Chao,Willams (2008). Ant-based IP tracebackExpert Systems with Applications, v 34(n 4), p 3071-3080. (SCIE, EI)
Journal Article 2008 Cheng,Yu-Chin(1);Laih,Chi-Sung(1);Lai,Gu-Hsin(2);Chen,Chia-Mei(2);Chen,Tsuhan(3) (2008). Defending on-line web application security with user-behavior surveillanceARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, (), 410-415. (EI)
Journal Article 2008 Lin,W.-M.;Huang,C.-H.;Lin,C.-H.;Chen,C.-M.;Wang,L.-W. (2008). Restoration strategy for secondary power network with grey relational analysisIET Generation, Transmission and Distribution, v 2(n 2), p 167-174. (EI)
Journal Article 2007 H. C. Wang, B. C. Jeng, Chia-Mei Chen (2007). Structural Testing Using a Memetic AlgorithmJournal of Software Engineering Studies, 2(4), . (其他期刊)
Journal Article 2007 Chia-Mei Chen, B. C. Jeng, G. H. Lai, W Chao (2007). Ant-Based IP TracebackExpert Systems with Applications, 36(3), . (其他期刊)
Journal Article 2006 Hou,Yung-Tsung;Lee,Tzu-Chen;Chen,Chia-Mei;Jeng,Bingchiang\par[311,資管系,陳嘉玫] (2006). Node placement for optimal coverage in sensor networks\parProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing\par, v 2006 II\par(), p 352-357\par. (EI)
Journal Article 2006 Chen,Chia-Mei;Jeng,BingChiang;Yang,ChiaRu;Lai,GuHsin (2006). Tracing denial of service origin: Ant colony approach\parLecture Notes in Computer Science, (), p 286-295. (EI)
Journal Article 2005 H. M. Sun, Chia-Mei Chen, L. C. Shu (2005). Object-based Multimedia Scheduling Based on Bipartite GraphsIEICE Transaction on Communication, 23(), . (SCIE)
Journal Article 2004 Chen, CM; Sun, HM; Shu, LC[311,陳嘉玫,資管系] (2004). Optimizing object-based multimedia delivery across bandwidth constrained networksCOMPUTER JOURNAL, 47(), 579-590. (SCIE)
Journal Article 2000 Cheng, ST; Chen, CM[311,資管系,陳嘉玫] (2000). Dynamic round-based resource management for on-demand multimedia serversCOMPUTER JOURNAL, 43(), 386-395. (SCIE)
Journal Article 2000 Cheng, ST; Chen, CM; Tripathi, SK[311,資管系,陳嘉玫] (2000). A fault-tolerance model for multiprocessor real-time systemsJOURNAL OF COMPUTER AND SYSTEM SCIENCES, 61(), 457-477. (SCIE)
Conference Paper 2011 Chia-Mei Chen and Y-H Ou (2011). Secure Mechanism for Mobile Web Browsing. IEEE ICPADS 2011 Joint Workshop on Network and System Security, .
Conference Paper 2011 Chia-Mei Chen, D. J. Guan, Q-K Su, and T-Y Wang (2011). Malicious URL Detection on Facebook. The Sixth Joint Workshop on Information Security (JWIS 2011), .
Conference Paper 2011 Chia-Mei Chen (2011). Detecting Anomaly Mobile Web Page through Template Classification. The 11th Emerging Information and Technology Conference (EITC 2011), .
Conference Paper 2011 陳嘉玫、歐雅惠、黃銘宗 (2011). 偵測具有動態網域特性的殭屍網路. 第二十一屆資訊安全會議, .
Conference Paper 2010 Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, (2010). Web Botnet Detection Based on Flow Information. ICS 2010 International Computer Symposium, .
Conference Paper 2010 陳嘉玫、歐雅惠、林士棻 (2010). 行動裝置安全瀏覽網頁之機制. IMP 2010 第十六屆資訊管理暨實務研討會, .
Conference Paper 2010 陳嘉玫、洪瑞麟、林孝忠、吳惠麟 (2010). 以Linux 系統為基礎之日誌檔樣式化研究. TANET 2010 台灣網際網路研討會, .
Conference Paper 2006 S.T. Cheng, C.Y. Wang, Chia-Mei Chen (2006). An Adaptive Data Broadcasting for Wireless Access. the IASTED International Conference on Wireless Network and Emerging Technologies , .
Conference Paper 2006 Y.T. Hou, T.C. Lee, B.C. Jeng, Chia-Mei Chen (2006). Optimal Coverage Deployment for Wireless Sensor Networds. International Conference on Advances Communication Technology co-sponsored by IEEE Communications Society, .
Conference Paper 2006 Y.T. Hou, T.C. Lee, Chia-Mei Chen, B.C. Jeng (2006). Node Placement for Optimal Coverage in Sensor Networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy, .
Conference Paper 2006 Chia-Mei Chen, B. C. Jeng, C. R. Yang, G. H. Lai (2006). Tracing Denial of Service Origin: Ant Colony Approach. European Workshop on Evolutionary Computation in Communication, Networks and Connected Systems(EcoCOMNET), .
Conference Paper 2006 邱郁芬, 林孝忠, 陳嘉玫 (2006). 以區域聯防為基礎之垃圾郵件防法研究. 2006數位教學暨資訊實務研討會, .
Conference Paper 2005 Y.L. Chen, Chia-Mei Chen, C. Ravishankar (2005). a lightweight network intrusion detection. 2005 international forensic science symposium, .
Conference Paper 2005 Chia-Mei Chen, N.S. Chen, J.S. Cheng, I.L. Lin (2005). localization on network auditing system. 2005 international forensic science symposium, .
Conference Paper 2005 Chia-Mei Chen, S.P. We, J.S. Cheng (2005). effective network monitot based on flow traffic. first computer security incident handing conference, .
Conference Paper 2005 陳嘉玫,楊鴻鈞,賴谷鑫 (2005). 滿足服務品質需求之資源管理研究. 第16屆國際資訊管理學術研討會, .
Conference Paper 2005 陳嘉玫,賴谷鑫,羅哲峰 (2005). 客戶需求傳輸之動態資源管理研究. 資通技術管理與應用研討會, .
Conference Paper 2005 陳嘉玫, 賴谷鑫, 羅哲峰 (2005). 客戶需求傳輸之動態資源管理研究. 資通技術管理與應用研討會, .
Conference Paper 2005 陳雅玲, 陳嘉玫, 鄭炳強 (2005). LINIDS:輕型網路入侵偵測研究. 第16屆國際資訊管理學術研討會, .
Conference Paper 2005 陳嘉玫, 楊鴻鈞, 賴谷鑫 (2005). 滿足服務品質需求之資源管理研究. 第16屆國際資訊管理學術研討會, .
Conference Paper 2005 曾仲強, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以支援向量機為基礎之後門程式入侵偵測. 第16屆人工智慧與應用研討會, .
Conference Paper 2005 曾漠益, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以約略集合理論為基礎之垃圾郵件過濾研究. 第16屆人工智慧與應用研討會, .
Conference Paper 2005 Chia-Mei Chen, S. P. We, J. S. Cheng (2005). Effective Network Monitor Based on Flow Traffic. The 1st Computer Security Incident Handling Conference, .
Conference Paper 2005 邱郁芬, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以區域聯防為基礎之垃圾郵件防法研究. 2005年網際空間:資安, 犯罪與法律社會, .
Conference Paper 2005 Y. L. Chen, Chia-Mei Chen, C. Ravishankar (2005). A Lightweight Network Intrusion Detection. 2005 International Forensic Science Symposium(IFSS), .
Conference Paper 2005 Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin (2005). Localization on Network Auditing Systems. 2005 International Forensic Science Symposium(IFSS), .
Conference Paper 2003 HM Sun, CM Chen, LC Shu (2003). Optimizing multimedia delivery over bandwidth limited networks. The 13th International Conference on Pacific Rim Management, .
Conference Paper 2003 陳嘉玫, 吳啟常, 鄭進興, 陳年興 (2003). Code Automation for Vulnerability Scanner. 網際空間:資訊, 法律與社會學術研究暨實務研討會, .
Conference Paper 2003 陳嘉玫, 鄭偉成, 鄭進興, 陳年興 (2003). Intrusion Detection on Distribution Attacks. 網際空間:資訊, 法律與社會學術研究暨實務研討會, .
Conference Paper 2003 陳嘉玫, 吳啟常, 鄭進興, 陳年興  (2003). Code Automation for Vulnerability Scanner . 網際空間:資訊, 法律與社會學術研究暨實務研討會 , .
Conference Paper 2003 陳嘉玫, 鄭偉成, 鄭進興, 陳年興  (2003). Intrusion Detection on Distribution Attacks . 網際空間:資訊, 法律與社會學術研究暨實務研討會 , .
Conference Paper 2003 HM Sun, CM Chen, LC Shu  (2003). Optimizing multimedia delivery over bandwidth limited networks . The 13th International Conference on Pacific Rim Management , .
Book and Chapter 2014

(2014). 網路安全概論與實務. 碁峰資訊

Year Title
2018

護理排班與遠距醫療系統之研發. 高雄榮民總醫院 (107034)

2018

通訊協定模糊測試模組開發. 安華聯網科技股份有限公司 (N107060)

2018

107年前瞻計畫資安區域聯防平台系統(K-ISAC)建置暨維運案. 中華電信股份有限公司企業客戶分公司 (N107111)

2017

以雲端平台為基礎之智慧型安全分析與管理系統-總計畫暨子計畫一:以Hadoop雲端平台為基礎之智慧型安. 科技部 (106-2221-E-110-017-MY3)

2017

醫事人員排班系統研究. 高雄榮民總醫院 (106040)

2016

雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究. 科技部 (103-2221-E-110-049-MY3)

2016

金融科技外匯研究. 匯智通訊股份有限公司 (N105145)

2015

雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究. 科技部 (103-2221-E-110-049-MY3)

2015

Binary Hack快速偵測以及行為分析. 安碁資訊股份有限公司 (N104103)

2013

網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究. 科技部 (100-2218-E-110-004-MY3)

2013

以雲端科技結合Android平台之即時性個人化服務研究. 科技部 (102-2815-C-110-005-H)

2013

TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 (N102001)

2012

網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究. 科技部 (NSC100-2218-E-110-004-MY3)

2011

端資安監控平台之研發-子計畫三:安全的上網環境之研究. 科技部 (NSC100-2218-E-110-011)

2011

TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 (N100118)

2010

有主動防禦機制的誘捕系統研究(開放軟體元件開發分項). 科技部 (NSC99-2220-E-110-002-)

2009

智慧行動裝置瀏覽網頁之安全機制(開放軟體元件開發分項). 科技部 (NSC98-2220-E-110-011)

2009

網路威脅搜捕分析與追蹤技術研究─子計畫一:分散式網路威脅搜捕技術研究. 科技部 (NSC98-2218-E-110-007)

2008

結合資料探勘與統計檢定之垃圾郵件過濾器之研究(自由軟體產業關鍵技術開發分項). 科技部 (NSC97-2218-E-110-004)

2007

智慧家庭監控系統之研究(自由軟體產業關鍵技術開發分項). 科技部 (NSC96-2218-E-110-005)

2007

3G行動通訊系統之資訊安全監控與管理. 台灣大哥大股份有限公司 (96068)

2006

無線感測網路之覆蓋研究. 科技部 (NSC95-2221-E-110-083)

2006

Linux開放架構下數位生活家用網路安全之嵌入式平台開發. 科技部 (NSC95-3113-P-110-001)

2005

以螞蟻演算法為基礎之來源追蹤之研究. 科技部 (NSC94-2213-E-110-049)

2004

以使用者行為特徵為基礎安全機制. 科技部 (NSC93-2213-E-110-045)

2004

網路入侵事件回報自動化與分析. 科技部 (93-2815-C-110 -022 -H)

2004

DNS安全檢測及事件紀錄分析機制實作研究(TWNIC︱NS︱093︱001). 財團法人台灣網路資訊中心 (93136)

2003

DNS Security 資源網站建置維護暨DNSSEC之研究(計畫編號︰TWNIC-NC-092-. 財團法人台灣網路資訊中心 (1485)

2002

位置衍生之服務與應用技術-子計畫二:位置認知下資訊安全機制與服務(I). 科技部 (NSC91-2219-E-110-002)

2002

無線網路遊戲平台與魔法卡交易遊戲之研究開發. 科技部 (NSC91-2622-E-110-014-CC3)

2002

DNS伺服器安全檢測與防護體系之建置與運作. 財團法人台灣網路資訊中心 (1255)

Year Name Degree Title
2018 Chien-An Hou Master Improving the Availability of Cloud Storage using Machine Learning
2018 Heng-Yi Cheng Master Improvement of Automatic Temperature Control Strategy for Slab Reheating Furnace in Hot Strip Mill
2017 Pan-Jo Chuang Master Ransomware Detection by Monitoring I/O Requests
2017 Zheng-Xun Tsai Master An Automatic Forensic System for Incident Response
2017 Ze-yu Lin Master Detecting Malicious Behavior of Process Injection
2017 Shi-Hao Wang Ph.D Applying Convolutional Neural Network for Malware Detection
2016 Ya-Hui Ou Ph.D Detecting Targeted Attacks by Risk Evaluation
2016 Yen-chih Kuo Master Detecting the Accuracy of Highway Incident Warnings in VANETs
2016 Yu-han Chang Master Improving Detection Efficiency using Cloud Computing
2015 Tse-yao Wang Ph.D The study of data preprocessing difference to impact the botnet detection performance
2015 Wen-Ling Lo Master Botnet Detection Based on HTTP Header Anomaly
2015 Sung-Chien Hsu Master Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks
2015 I-Kai Wang Master Multi-layer Incremental Clustering for Malware Analysis
2015 CHIPING LAI Master Detecting Intrusions Using Social Network Analysis And Bayesian Network
2015 Yu-Hsuan Tsai Master Fast Mobile Malware Detection Based on Hybrid Analysis Method
2015 Jung-Kuang Fu Master The Design of Monitoring Distributed Systems in Cloud
2015 Tzu-Ching Chang Master Detecting Malware with DLL Injection And PE Infection
2014 WEI-JEN YU Master Implementation of Disaster Risk Avoidance Mobile Application
2013 Wen-yung LIN Master A Study of Reengineering for Information Systems - The Case of Taxation Information System
2012 Che-cheng Chang Master Persistent Threat Detection Using Hidden Markov Model
2012 Je-Ming Lin Master Detecting Mobile Application Malicious Behavior Based on Taint Propagation
2012 Hsiao-Chung Lin Ph.D Detecting Centralized Botnets based on Anomaly Traffic Behaviors
2012 Hui-chun Lin Master Study of Effectiveness of Social Engineering Spam Prevention Operation
2012 Wen-Ching Chiang Master Behavior Analysis of Mobile Malware Based on Information Leakage
2012 Tun-Jui Yuan Master Study of Information Security in Semi-Open Network: Case Study of Marine Container Vessel
2012 Liang-Chung Yuan Master Study of Personal Privacy Information Protection Operation In Government Agencies
2012 Jui-hsiang Kuo Master Study on the Integration of Information Security Management System and Personal Information Management System
2012 Chiao-Wei Huang Master Incremental Clustering Malware from Honeypots
2011 Jhe-Jhun Huang Master Detecting Drive-by Download Based on Reputation System
2011 Peng Yu Yang Master Detecting Botnet-based Joint Attacks by Hidden Markov Model
2011 Ling-Ming Zeng Master Malware Classification Based on File and Registry Activities
2011 Yu-Yun Li Master Botnet Detection Based on Ant Colony
2011 Min-ying Tsai Master Mutilple Sensor Anomaly Correlation
2011 Chia-hui Yang Master Code Classification Based on Structure Similarity
2011 Hung-Shiuan Tsai Master Concise Analysis of Malware Behavior
2009 Jui-lin Hung Master A Study of Log Patternization for Linux-based Systems
2009 Ming-Zong Huang Master Hybrid Botnet Detection
2008 Wan-yi Tsai Master Malicious Web Page Detection Based on Anomaly Behavior
2008 Yung-tsung Hou Ph.D The Worst-case and Best-case Coverage Problems in Wireless Sensor Networks
2008 Shih-chiang Lin Master An Group-Buying Message Distribution Rate Research in Mobile P2P Network Environment
2008 Jun-jie Liu Master A Effect of Time to Group-Buying in Mobile P2P Network Environment
2008 Gu-Hsin Lai Ph.D An Adaptive Server-Side Anti-Spam System
2008 Shao-Chuan Huang Master Network Security Planning for New Generation Network Service Providers
2008 陳怡綾 Master 在IRC伺服器偵測以IRC為主的殭屍網路
2008 Ming-Yi Wu Master A Security Solution on Availability for Next Generation Telecommunication Networks Management Information Systems
2008 蔡育洲 Master 使用Flow資訊偵測以網頁為基礎之殭屍網路
2008 Yu-Chou Tsai Master Web-based Botnet Detection Based on Flow Information
2008 Yi-ling Chen Master IRC-Based Botnet Detection on IRC Server
2007 Yu-Ping Lin Master Use Genetic Algorithms to Construct Mutual Fund Portfolio Based on Perceived Risk Levels
2007 Chih-Chin Yang Master A Spam Filter Based on Reinforcement and Collaboration
2007 Chih-yang Chao Master Global-fit Clustering for Sensor Network
2007 Pao-Tien Chen Master A Study of Information Security for Computerized Process Control
2007 郭俊昌 新世代電信網路資訊安全防護之研究
2007 Shin-wei Huang Master The Empirical Study of Trend Following Program Trading on Taiwan Stock Market
2007 Chun-Chang Kuo Master A Security Solution for Next Generation Mobile Telecommunication Networks
2006 Leng-yau Cheng Master Automatic test data generation by particle swarm optimization
2006 陳彥邦 Master 網路使用者之資訊隱私顧慮探討-採用行為意向模式
2006 KuongCheong Ieong Master The empirical study of applying Technical Analysis on DJI, HSI and Taiwan Stock Market
2006 黃致弘 Master 利用時間序列分析偵測Java記憶體洩漏
2006 Wei-Cheng Liu Master Applying Resource Usage Analysis to Software Testing
2006 Chang-Yu Li Master Association rules for exploit code analysis to prevent Buffer Overflow
2006 Shih-Fen Lin Master Malicious DHTML Detection by Model-based Reasoning
2006 Tsung-Han Tsai Master A New Combinatorial Strategy to Black-box Testing with Constraints
2006 Chang-ming Hsu Master A Test Data Evolution Strategy under Program Changes
2006 Wei-yu Lai Master Information Exchange Mechanism Based on Reputation in Mobile P2P Networks
2006 Chih-Hung Huang Master Detecting Java Memory Leak by Time Series Analysis
2005 Pai-Hung Hsu Master Empirical study on strategy for Regression Testing
2005 Tzu-Chen Lee Master Straight-line Coverage in Wireless Sensor Networks
2005 Hsiu-Chi Wang Master A hybrid genetic algorithm for automatic test data generation
2005 Wang Chien-Lung Master Adaptive Clustering for Sensor Network
2005 Yu-fen Chiu Master Anti-Spam Study: an Alliance-based Approach
2005 Po-Kai Chen Master An Automated Method for Resource Testing
2004 Zhong-Chiang Tzeng Master Backdoor Detection based on SVM
2004 Mo-yi Tzeng Master A Spam Filter Based on Rough Sets Theory
2004 Chia-Ru Yang Master Denial of Service Traceback: an Ant-Based Approach
2004 Ya-lin Chen Master Lightweight Network Intrusion Detection
2003 Huey-Min Sun Ph.D Multimedia Scheduling in Bandwidth Limited Networks
2003 Wang-tzu Han Master Detecting Remote Attacks
2003 Kun-Ye Lai Master Localization for Vulnerability Scanner
2003 Cheng-yuan Kao Master Detecting Backdoor
2003 Chuan-pi Wei Master Network Monitoring on Large Networks
2002 廖邦彥 Master 台灣網路事件回報之研究
2002 吳啟常 Master 弱點掃描器之攻擊程式碼自動化
2002 Jia-Ching Fang Master Network Security Analysis and Summary in Taiwan
2002 楊鴻鈞 Master 滿足最大化服務品質需求之進入許可控制研究
2002 Wei-Cheng Cheng Master Intrusion Detection on Distributed Attacks
2002 Ching-Chang Wu Master Code Automation for Vulnerability Scanner
2002 Bon-Yen Liaw Master The study of incident response in Taiwan
2002 Hung-Chun Yang Master Admission Control with Maximizing QoS Satisfactions
2001 Char-Ming Lin Master Oversea incident report automatic and analysis
2000 Che-Feng Lo Master Resource Allocation for Multimedia with QoS Requirement in Wireless Network
2000 Chih-Ching Chuang Master An HTML Filter on WAP Gateway
2000 Ching-Shin Tsai Master Architecture for Web Server with Push Capability
1999 Yan-Bang Chen Master Exploring Internet Users ’Information Privacy Concerns -Use the Intention-Based models
Year Title Awarding Organization
Period Activity Description Role