Name | Chen, Chia-Mei |
---|---|
Title | Professor |
Research Interests | Network Security, Anomaly Detection, Intelligence Defense, Cyber Threat Intelligence, Big Data Analysis |
Office | 管(CM) 4050 |
Phone | 4726 |
cmchen@mis.nsysu.edu.tw |
Education | 1995, Ph.D., Computer Science, University of Maryland 1991, Master, Computer Science, University of Maryland 1986, Master, Computer Science, National Chiao-Tung University 1984, Bachelor, Computer Science, National Chiao-Tung University |
---|---|
Academic Services | ~ , , ~ , SCIE[], 審查委員 ~ , [管理評論,TSSCI], 審查委員 ~ , [資訊管理學報,TSSCI], 審查委員 2020-10-12 ~ 2022-10-11, Taiwan Institute of Ethical Business and Forensics, 理事 2018-10-12 ~ 2020-10-11, Taiwan Institute of Ethical Business and Forensics, 理事 2018-05-24 ~ 2021-05-23, 中華民國資訊安全學會, 理事 2018-03-16 ~ 2018-12-31, 國家中山科學研究院, 顧問 |
Category | Year | Title |
---|---|---|
Journal Article | 2024 | Chia-Mei Chen, Z. Y. Lin, Y. H. Ou, and J. Lin (2024). A hybrid malware analysis approach for identifying process-injection malware based on machine learning.. International Journal of Security and Networks. (EI) |
Journal Article | 2023 | Chia-Mei Chen, J. J. Fang, Z. X. Cai, B. Lee, D. W. Wen (2023). Emergent Cybersecurity Information Discovery in Support of Cyber Threat Prevention. International Journal of Network Security. (EI) |
Journal Article | 2022 | Albert Guan, Chia-Mei Chen (2022). A Novel Verification Scheme to Resist Online Password Guessing Attacks. IEEE Transactions on Dependable and Secure Computing. (SCI) |
Journal Article | 2022 | W. C. Juang, M. H. Hsu, Z. X. Cai, and Chia-Mei Chen (2022). Developing an AI-assisted Clinical Decision Support System to Enhance In-patient Holistic Health Care. PLOS One. (SCIE) |
Journal Article | 2022 | Chia-Mei Chen, Z-X Cai, and D-W Wen (2022). Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-border E-commerce Security Incidents. Journal of Global Information Management. (SSCI) |
Journal Article | 2021 | Chia-Mei Chen, Gu-Hsin Lai, Zheng-Xun Cai, Tzu-Ching Chang, Boyi Lee, (2021). Detecting PE-Infection Based Malware. International Journal of Security and Networks. (EI) |
Journal Article | 2021 | Chia-Mei Chen, D-W Wen, Y-H Ou, W-C Chao, and Z-X Cai (2021). Retrieving Potential Cybersecurity Information from Hacker Forums. International Journal of Network Security. (EI) |
Journal Article | 2021 | Li-Chu Wu, Chia-Mei Chen, Zheng-Xun Cai, Ming Hsia Hsu, Wang-Chuan Juang (2021). Machine Learning-based Detection of Internet of Thing Attacks in Healthcare Environments. Information Technology in Industry.. Information Technology in Industry.. (其他期刊) |
Journal Article | 2020 | Chia-Mei Chen, Y-H Liu, Z-X Cai, and G-H Lai (2020). A Power-efficient Approach to Detect Mobile Threats on the Emergent Network Environment. IEEE Access. (SCIE, EI) |
Journal Article | 2020 | J. C. Chuang, Y. C. Hu, Chia-Mei Chen, Z. Yin. (2020). Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding. Multimedia Tools and Applications. (SCI) |
Journal Article | 2020 | Chia-Mei Chen, G. H. Syu, Z. X. Cai (2020). Analyzing System Log based on Machine Learning Model. International Journal of Network Security. (EI) |
Journal Article | 2019 | Chuang, JC; Hu, YC; Chen, CM; Lin, YH; Chen, Y (2019). Joint index coding and reversible data hiding methods for color image quantization. Multimedia Tools and Applications, 78(24), 35537-35558. (SCI) |
Journal Article | 2019 | Chang, TH; Chen, CM; Hsiao, HW; Lai, GH (2019). Cracking of WPA & WPA2 Using GPUs and Rule-based Method. Intelligent Automation and Soft Computing, 25(1), 183-192. (SCIE) |
Journal Article | 2018 | Chia-Mei Chen, W. L. Lo, Y. H. Ou, G. H. Lai, T. Y. Wang (2018). Application of Revised Ant Colony Optimization for Anomaly Detection Systems. International Journal of Computer and Electrical Engineering. (EI) |
Journal Article | 2018 | Chia-Mei Chen, G. H. Lai, J. Lin (2018). Detection of C&C Servers Based on Swarm Intelligence Approach. Journal of Computers. () |
Journal Article | 2014 | Chen, CM; Guan, DJ; Su, QK (2014). Feature set identification for detecting suspicious URLs using Bayesian classification in social networks. INFORMATION SCIENCES, 289(289), 133-147. (SCIE) |
Journal Article | 2013 | Chen, Chia-Mei; Cheng, Sheng-Tzong; Zeng, Ruei-Yu (2013). A proactive approach to intrusion detection and malware collection. SECURITY AND COMMUNICATION NETWORKS, 6(6), 844. (SCIE, EI) |
Journal Article | 2013 | Chen, Chia-Mei(1); Huang, Ming-Zong(1); Ou, Ya-Hui(1) (2013). Detecting Web-Based Botnets with Fast-Flux Domains. Smart Innovation, Systems and Technologies, 21(21), 79-89. (EI) |
Journal Article | 2011 | Lai, GH; Ouyang, CS; Chen, CM (2011). A Group-Based Deployment for Wormhole Prevention in Sensor Networks. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 27, 79-93. (SCIE) |
Journal Article | 2011 | Chen,Chia-Mei(1);Ou,Ya-Hui(1) (2011). Secure mechanism for mobile web browsing. Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 924-928. (EI) |
Journal Article | 2010 | Jenn-Long Liu, Chao-Wei Chou, Chai-Mei Chen (2010). Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm. International Journal of Business Intelligence and Data Mining. (SCIE) |
Journal Article | 2010 | Hou, YT; Chen, CM; Jeng, B (2010). An optimal new-node placement to enhance the coverage of wireless sensor networks. WIRELESS NETWORKS. (SCIE) |
Journal Article | 2010 | Chen, CM; Chen, YL; Lin, HC (2010). An efficient network intrusion detection. COMPUTER COMMUNICATIONS. (SCIE) |
Journal Article | 2010 | Hou, YT; Chang, YM; Chen, TH; Laih, CS; Chen, CM (2010). Malicious web content detection by machine learning. EXPERT SYSTEMS WITH APPLICATIONS. (SCIE) |
Journal Article | 2010 | Chen,Chia-Mei(1);Chen,Ya-Lin(1);Lin,Hsiao-Chung(1) (2010). An efficient network intrusion detection. Computer Communications, 33(4), 477-484. (EI) |
Journal Article | 2010 | Hou,Yung-Tsung(1);Chang,Yimeng(2);Chen,Tsuhan(2);Laih,Chi-Sung(3);Chen,Chia-Mei(1) (2010). 20094012361809Title:Malicious web content detection by machine learning. Expert Systems with Applications, 37(1), 55-60. (SCIE, EI) |
Journal Article | 2010 | Chen,Chia-Mei(1);Ou,Ya-Hui(1);Tsai,Yu-Chou(1) (2010). 20110713664044Title:Web botnet detection based on flow information. ICS 2010 - International Computer Symposium, 381-384. (EI) |
Journal Article | 2010 | Y. T. Hou, Chia-Mei Chen, and B. C. Jeng (2010). An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks. Wireless Networks. (其他期刊) |
Journal Article | 2010 | Hou,Yung-Tsung(1);Chen,Chia-Mei(1);Jeng,Bingchiang(1) (2010). 20102613047215Title:An optimal new-node placement to enhance the coverage of wireless sensor networks. Wireless Networks, 16(4), 1033-1043. (EI) |
Journal Article | 2010 | Hou,Yung-Tsung(1);Chang,Yimeng(2);Chen,Tsuhan(2);Laih,Chi-Sung(3);Chen,Chia-Mei(1) (2010). Malicious web content detection by machine learning. Expert Systems with Applications, 37, 55-60. (EI) |
Journal Article | 2009 | Lee, TF; Liu, JL; Sung, MJ; Yang, SB; Chen, CM (2009). Communication-efficient three-party protocols for authentication and key agreement. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 641-648. (SCIE) |
Journal Article | 2009 | Liu, JL; Chen, CM (2009). Improved intelligent genetic algorithm applied to long-endurance airfoil optimization design. ENGINEERING OPTIMIZATION, 137-154. (SCIE) |
Journal Article | 2009 | Lai, GH; Chen, CM; Laih, CS; Chen, T (2009). A collaborative anti-spam system. EXPERT SYSTEMS WITH APPLICATIONS, 6645-6653. (SCIE) |
Journal Article | 2009 | Chen,C.M.(1);Ding,S.X.(1);Chang,C.P.(1);Kao,P.W.(1) (2009). Plane strain deformation microstructure of warm-worked aluminum. Materials Science and Engineering A, 512(1-2), 126-131. (EI) |
Journal Article | 2009 | Lai,Gu-Hsin(1);Chen,Chia-Mei(1);Laih,Chi-Sung(2);Chen,Tsuhan(3) (2009). A collaborative anti-spam system. Expert Systems with Applications, 36, 6645-6653. (SCIE, EI) |
Journal Article | 2009 | G. H. Lai, C. W. Chou, Chia-Mei Chen (2009). Anti-Spam Filter Based on Data Mining and Statistical Test. Journal of e-Business. (TSSCI) |
Journal Article | 2009 | J. L. Liu and Chia-Mei Chen (2009). Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization Design. Engineering Optimization. (SCIE) |
Journal Article | 2009 | Liu,Jenn-Long(1);Chen,Chia-Mei(1) (2009). Improved intelligent genetic algorithm applied to long-endurance airfoil optimization design. Engineering Optimization, 41(2), 137-154. (EI) |
Journal Article | 2008 | G. H. Lai, Chia-Mei Chen, C. S. Laih, and T. Chen (2008). A Collaborative Anti-Spam System. Expert Systems with Applications, 44(1). (其他期刊) |
Journal Article | 2008 | G. H. Lai and Chia-Mei Chen (2008). Detecting Denial of Service Attacks in Sensor Networks. Journal of Computers, 18(4). (其他期刊) |
Journal Article | 2008 | Chia-Mei Chen and C. P. Wei (2008). Efficient Network Monitoring for Large Networks. Journal of Computers, 18(4). (其他期刊) |
Journal Article | 2008 | Cheng,Sheng-Tzong(1);Li,Szu-Yun(1);Chen,Chia-Mei(2) (2008). Distributed detection in wireless sensor networks. Proceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008, 401-406. (EI) |
Journal Article | 2008 | Lai,GuHsin;Chen,Chia-Mei;Jeng,Bing-Chiang;Chao,Willams (2008). Ant-based IP traceback. Expert Systems with Applications, v 34(n 4), p 3071-3080. (SCIE, EI) |
Journal Article | 2008 | Cheng,Yu-Chin(1);Laih,Chi-Sung(1);Lai,Gu-Hsin(2);Chen,Chia-Mei(2);Chen,Tsuhan(3) (2008). Defending on-line web application security with user-behavior surveillance. ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, 410-415. (EI) |
Journal Article | 2008 | Lin,W.-M.;Huang,C.-H.;Lin,C.-H.;Chen,C.-M.;Wang,L.-W. (2008). Restoration strategy for secondary power network with grey relational analysis. IET Generation, Transmission and Distribution, v 2(n 2), p 167-174. (EI) |
Journal Article | 2007 | H. C. Wang, B. C. Jeng, Chia-Mei Chen (2007). Structural Testing Using a Memetic Algorithm. Journal of Software Engineering Studies, 2(4). (其他期刊) |
Journal Article | 2007 | Chia-Mei Chen, B. C. Jeng, G. H. Lai, W Chao (2007). Ant-Based IP Traceback. Expert Systems with Applications, 36(3). (其他期刊) |
Journal Article | 2006 | Hou,Yung-Tsung;Lee,Tzu-Chen;Chen,Chia-Mei;Jeng,Bingchiang\par[311,資管系,陳嘉玫] (2006). Node placement for optimal coverage in sensor networks\par. Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing\par, v 2006 II\par, p 352-357\par. (EI) |
Journal Article | 2006 | Chen, CM; Jeng, BC; Yang, CR; Lai, GH (2006). Tracing denial of service origin: Ant colony approach. APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, p 286-295. (EI) |
Journal Article | 2006 | Chen,Chia-Mei;Jeng,BingChiang;Yang,ChiaRu;Lai,GuHsin\par[311,資管系,陳嘉玫|324,資管系,鄭炳強] (2006). Tracing denial of service origin: Ant colony approach\par. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)\par, v 3907 LNCS\par, p 286-295\par. (EI) |
Journal Article | 2005 | H. M. Sun, Chia-Mei Chen, L. C. Shu (2005). Object-based Multimedia Scheduling Based on Bipartite Graphs. IEICE Transaction on Communication, 23, 533-544. (SCIE) |
Journal Article | 2005 | Sun, HM; Chen, CM; Shu, LC[陳嘉玫[資管系]] (2005). Object-based multimedia scheduling based on bipartite graphs. IEICE TRANSACTIONS ON COMMUNICATIONS, 23, 533-544. (SCIE) |
Journal Article | 2004 | Chen, CM; Sun, HM; Shu, LC[311,陳嘉玫,資管系] (2004). Optimizing object-based multimedia delivery across bandwidth constrained networks. COMPUTER JOURNAL, 47, 579-590. (SCIE) |
Journal Article | 2000 | Cheng, ST; Chen, CM; Tripathi, SK[311,資管系,陳嘉玫] (2000). A fault-tolerance model for multiprocessor real-time systems. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 61, 457-477. (SCIE) |
Journal Article | 2000 | Cheng, ST; Chen, Chia-Mei (2000). Dynamic round-based resource management for on-demand multimedia servers. COMPUTER JOURNAL, 43, 386-395. (SCIE) |
Conference Paper | 2024 | W. C. Juang, J. Lin, Chia-Mei Chen, and Z. X. Cai (2024). An Assessment of Cybersecurity Awareness in a Healthcare Institute. 23rd International Conference on Emergency Medicine (ICEM 2024), Taiwan. |
Conference Paper | 2023 | Chia-Mei Chen, S. Y. Huang, Z. X. Cai, Y. H. Ou, J. Lin (2023). Detecting Supply Chain Attacks with Unsupervised Learning. IEEE International Conference on Applied System Innovation, Japan. |
Conference Paper | 2023 | Chia-Mei Chen, F. H. Hsu, J. N. Hwang (2023). Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. European Interdisciplinary Cybersecurity Conference, Norway. |
Conference Paper | 2023 | Chia-Mei Chen, S. H. Lin, G. H. Lai, Y. H. Ou, Z. X. Cai (2023). Identify Vulnerable Components in IoT Using Machine Learning. The 13th International Conference on Frontier Computing (FC 2023), Japan. |
Conference Paper | 2023 | J. W. Lin, Chia-Mei Chen, Z. X. Cai, and W. C. Juang (2023). Assessment of Information Security Awareness in Healthcare by Social Engineering Exercise. International Society for Quality in Health Care 39th International Conference (ISQua), South Korea. |
Conference Paper | 2022 | C C. Chang, Chia-Mei Chen and H. W. Hsiao (2022). Applying an IoT Analytics Framework in East Asia Area. International Computer Symposium, Taiwan. |
Conference Paper | 2022 | Chia-Mei Chen, Y. X. Wang, Z. X. Cai, B. Lee, and G. H. Lai (2022). Automatic Summarization of Critical Threat Intelligence Using Transfer Learning. International Computer Symposium, Taiwan. |
Conference Paper | 2022 | W. C. Juang, Chia-Mei Chen, Z. X. Cai, M. H. Hsu (2022). Developing an Efficient Clinic Decision Support System Based on Deep Learning. Conference of International Society for Quality in Health Care, Australia. |
Conference Paper | 2021 | Chia-Mei Chen, Z-X Cai, G-H Lai (2021). A Study of Identifying Attacks on Industry Internet of Things using Machine Learning. The International Conference on Artificial Intelligence, Soft Computing, . |
Conference Paper | 2021 | 陳嘉玫, 方俊傑,官振傑, 歐雅惠 (2021). 以文字探勘挖掘資安趨勢之研究. 管理觀念與應用研討會, . |
Conference Paper | 2021 | Chia-Mei Chen, J-Y Kan, Y-H Ou, Z-X Cai, and A. Guan (2021). Threat Action Extraction Using Information Retrieval. . The International Conference on Computer Science and Information Technology, . |
Conference Paper | 2021 | Albert Guan, Chia-Mei Chen (2021). A Novel Verification scheme to Resist Password Guessing Attacks. IEEE Conference on Dependable and Secure Computing, . |
Conference Paper | 2020 | Tienho Chang, Chia-Mei Chen, Gu-Hsin Lai and Yu-Che Hu (2020). The Analysis of the Wireless Access Point password with GPU and Rules-Based Method. Computer Information Security Conference, . |
Conference Paper | 2020 | T. Chang, Chia-Mei Chen, G. H. Lai (2020). The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units. The 15th Asia Joint Conference on Information Security, . |
Conference Paper | 2020 | Chia-Mei Chen, G. H. Lai, T. C. Chang, B. Lee (2020). Detecting PE Infection Based Malware. The Future of Information and Communication Conference, . |
Conference Paper | 2019 | Chia-Mei Chen, W. C. Juang, and D. W, Wen (2019). Communication among Distinctive Experts on a System Development Project. 專案管理國際研討會, Taiwan. |
Conference Paper | 2019 | Chia-Mei Chen, D. W. Wen, J. J. Fang, G. H. Lai, Y. H. Liu (2019). A Study on Security Trend based on News Analysis. The 10th IEEE International Conference on Awareness Science and Technology, Japan. |
Conference Paper | 2019 | Chia-Mei Chen, G. H. Lai, J. M. Lin (2019). Detection of mobile malware in IoT Networks Environment.. Future ICT, Taiwan. |
Conference Paper | 2019 | Chia-Mei Chen, S. H. Wang, D. W. Wen, G. H. Lai, M. K. Sun (2019). Applying Convolutional Neural Network for Malware Detection. The 10th IEEE International Conference on Awareness Science and Technology, Japan. |
Conference Paper | 2019 | Chia-Mei Chen, W. C. Juang, S. J. Huang, and D. W. Wen (2019). Telemedicine for rural area in southern Taiwan. International Forum on Quality and Safety in Healthcare, Taiwan. |
Conference Paper | 2018 | Chia-Mei Chen, G.H Lai and Z.-X. Tsai (2018). Integrated Digital Forensic for Cyber Attacks. International Conference on Security with Intelligent Computing and Big-data Services, China. |
Conference Paper | 2018 | Chia-Mei Chen, W. L. Lo, G. H. Lai, Y. C. Hu (2018). Network Anomaly Detection Based on Artificial Intelligence. The Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Japan. |
Conference Paper | 2018 | T. H. Chang, Chia-Mei Chen, G. H. Lai, J. Lin (2018). The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic. IEEE Dependable and Secure Computing, Taiwan. |
Conference Paper | 2018 | D. W. Wen, Chia-Mei Chen (2018). Evolution of Advanced Persistent Threat (APT) Attacks and Actors. International Computer Symposium, Taiwan. |
Conference Paper | 2011 | Chia-Mei Chen and Y-H Ou (2011). Secure Mechanism for Mobile Web Browsing. IEEE ICPADS 2011 Joint Workshop on Network and System Security, Taiwan. |
Conference Paper | 2011 | Chia-Mei Chen, D. J. Guan, Q-K Su, and T-Y Wang (2011). Malicious URL Detection on Facebook. The Sixth Joint Workshop on Information Security , Taiwan. |
Conference Paper | 2011 | Chia-Mei Chen (2011). Detecting Anomaly Mobile Web Page through Template Classification. The 11th Emerging Information and Technology Conference, United States. |
Conference Paper | 2011 | 陳嘉玫、歐雅惠、黃銘宗 (2011). 偵測具有動態網域特性的殭屍網路. 第二十一屆資訊安全會議, Taiwan. |
Conference Paper | 2010 | Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, (2010). Web Botnet Detection Based on Flow Information. International Computer Symposium, Taiwan. |
Conference Paper | 2010 | 陳嘉玫、歐雅惠、林士棻 (2010). 行動裝置安全瀏覽網頁之機制. 第十六屆資訊管理暨實務研討會, Taiwan. |
Conference Paper | 2010 | 陳嘉玫、洪瑞麟、林孝忠、吳惠麟 (2010). 以Linux 系統為基礎之日誌檔樣式化研究. TANET 2010 台灣網際網路研討會, Taiwan. |
Conference Paper | 2006 | S.T. Cheng, C.Y. Wang, Chia-Mei Chen (2006). An Adaptive Data Broadcasting for Wireless Access. The IASTED International Conference on Wireless Network and Emerging Technologies , Canada. |
Conference Paper | 2006 | Y.T. Hou, T.C. Lee, B.C. Jeng, Chia-Mei Chen (2006). Optimal Coverage Deployment for Wireless Sensor Networds. International Conference on Advances Communication Technology co-sponsored by IEEE Communications Society, South Korea. |
Conference Paper | 2006 | Y.T. Hou, T.C. Lee, Chia-Mei Chen, B.C. Jeng (2006). Node Placement for Optimal Coverage in Sensor Networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy, Taiwan. |
Conference Paper | 2006 | Chia-Mei Chen, B. C. Jeng, C. R. Yang, G. H. Lai (2006). Tracing Denial of Service Origin: Ant Colony Approach. European Workshop on Evolutionary Computation in Communication, Networks and Connected Systems (EcoCOMNET), Hungary. |
Conference Paper | 2006 | 邱郁芬, 林孝忠, 陳嘉玫 (2006). 以區域聯防為基礎之垃圾郵件防法研究. 2006數位教學暨資訊實務研討會, Taiwan. |
Conference Paper | 2005 | Y.L. Chen, Chia-Mei Chen, C. Ravishankar (2005). a lightweight network intrusion detection. 2005 international forensic science symposium, 中華民國. |
Conference Paper | 2005 | Chia-Mei Chen, N.S. Chen, J.S. Cheng, I.L. Lin (2005). localization on network auditing system. 2005 international forensic science symposium, 中華民國. |
Conference Paper | 2005 | Chia-Mei Chen, S.P. We, J.S. Cheng (2005). effective network monitot based on flow traffic. first computer security incident handing conference, 中華民國. |
Conference Paper | 2005 | 陳嘉玫,楊鴻鈞,賴谷鑫 (2005). 滿足服務品質需求之資源管理研究. 第16屆國際資訊管理學術研討會, 中華民國. |
Conference Paper | 2005 | 陳嘉玫, 賴谷鑫, 羅哲峰 (2005). 客戶需求傳輸之動態資源管理研究. 資通技術管理與應用研討會, 中華民國. |
Conference Paper | 2005 | 陳嘉玫,賴谷鑫,羅哲峰 (2005). 客戶需求傳輸之動態資源管理研究. 資通技術管理與應用研討會, Taiwan. |
Conference Paper | 2005 | 陳雅玲, 陳嘉玫, 鄭炳強 (2005). LINIDS:輕型網路入侵偵測研究. 第16屆國際資訊管理學術研討會, Taiwan. |
Conference Paper | 2005 | 陳嘉玫, 楊鴻鈞, 賴谷鑫 (2005). 滿足服務品質需求之資源管理研究. 第16屆國際資訊管理學術研討會, Taiwan. |
Conference Paper | 2005 | 曾仲強, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以支援向量機為基礎之後門程式入侵偵測. 第16屆人工智慧與應用研討會, Taiwan. |
Conference Paper | 2005 | 曾漠益, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以約略集合理論為基礎之垃圾郵件過濾研究. 第16屆人工智慧與應用研討會, Taiwan. |
Conference Paper | 2005 | Chia-Mei Chen, S. P. We, J. S. Cheng (2005). Effective Network Monitor Based on Flow Traffic. The 1st Computer Security Incident Handling Conference, Singapore. |
Conference Paper | 2005 | 邱郁芬, 賴谷鑫, 陳嘉玫, 鄭炳強 (2005). 以區域聯防為基礎之垃圾郵件防法研究. 2005年網際空間:資安, 犯罪與法律社會, Taiwan. |
Conference Paper | 2005 | Y. L. Chen, Chia-Mei Chen, C. Ravishankar (2005). A Lightweight Network Intrusion Detection. 2005 International Forensic Science Symposium (IFSS), Taiwan. |
Conference Paper | 2005 | Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin (2005). Localization on Network Auditing Systems. 2005 International Forensic Science Symposium (IFSS), Taiwan. |
Conference Paper | 2003 | HM Sun, CM Chen, LC Shu (2003). Optimizing multimedia delivery over bandwidth limited networks. The 13th International Conference on Pacific Rim Management, 中華民國. |
Conference Paper | 2003 | 陳嘉玫, 吳啟常, 鄭進興, 陳年興 (2003). Code Automation for Vulnerability Scanner. 網際空間:資訊, 法律與社會學術研究暨實務研討會, 中華民國. |
Conference Paper | 2003 | 陳嘉玫, 鄭偉成, 鄭進興, 陳年興 (2003). Intrusion Detection on Distribution Attacks. 網際空間:資訊, 法律與社會學術研究暨實務研討會, Taiwan. |
Conference Paper | 2003 | 陳嘉玫, 吳啟常, 鄭進興, 陳年興 (2003). Code Automation for Vulnerability Scanner . 網際空間:資訊, 法律與社會學術研究暨實務研討會 , Taiwan. |
Conference Paper | 2003 | 陳嘉玫, 鄭偉成, 鄭進興, 陳年興 (2003). Intrusion Detection on Distribution Attacks . 網際空間:資訊, 法律與社會學術研究暨實務研討會 , Taiwan. |
Conference Paper | 2003 | HM Sun, CM Chen, LC Shu (2003). Optimizing multimedia delivery over bandwidth limited networks . The 13th International Conference on Pacific Rim Management , Japan. |
Book and Chapter | 2014 | 陳嘉玫、吳惠麟 (2014). 網路安全概論與實務. 碁峰資訊 |
Year | Title |
---|---|
2023 | 112年臺南市ISAC區域聯防服務. 中華資安國際股份有限公司 (N112151) |
2023 | 運用深度學習自動化萃取威脅情資. Ministry of Science and Techonology (112-2221-E-110-028-MY3) |
2022 | 探討醫護人員之資安意識與改善措施. 高雄榮民總醫院 (29) |
2021 | 企業資安防護及案例分享研討會. 財團法人台灣網路資訊中心 (5) |
2021 | 110年度疑似我國金融機構網站及行動應用程式偵測系統概念性驗證案. 財金資訊股份有限公司 (14) |
2020 | 「高雄市政府109年前瞻計畫資安區域聯防產學合作」研究計畫專案. 中華資安國際股份有限公司 (N109139) |
2020 | 疑似我國金融機構網站及行動應用程式偵測機制研究案. 財金資訊股份有限公司 (N109104) |
2020 | Defensing Targeted Attacks by Real-time Monitoring and Threat Intelligence. Ministry of Science and Techonology (109-2221-E-110-042-MY3) |
2020 | 精實醫療內化與實踐. 高雄榮民總醫院 (109019.1) |
2019 | 物聯網資安情資分享. 中華資安國際股份有限公司 (N109164) |
2019 | 物聯網資安情資分享. 中華資安國際股份有限公司 (N108202) |
2018 | 護理排班與遠距醫療系統之研發. 高雄榮民總醫院 (107034) |
2018 | 通訊協定模糊測試模組開發. 安華聯網科技股份有限公司 (N107060) |
2018 | 107年前瞻計畫資安區域聯防平台系統(K-ISAC)建置暨維運案. 中華電信股份有限公司企業客戶分公司 (N107111) |
2017 | Hisams: Hadoop Intelligent Security Analysis and Management System. MOST (106-2221-E-110-017-MY3) |
2017 | 醫事人員排班系統研究. 高雄榮民總醫院 (106040) |
2016 | 金融科技外匯研究. 匯智通訊股份有限公司 (N105145) |
2015 | 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究. MOST (103-2221-E-110-049-MY3) |
2015 | Binary Hack快速偵測以及行為分析. 安碁資訊股份有限公司 (N104103) |
2013 | 網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究. MOST (100-2218-E-110-004-MY3) |
2013 | 以雲端科技結合Android平台之即時性個人化服務研究. MOST (102-2815-C-110-005-H) |
2013 | TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 (N102001) |
2012 | 網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究. MOST (NSC100-2218-E-110-004-MY3) |
2011 | 端資安監控平台之研發-子計畫三:安全的上網環境之研究. MOST (NSC100-2218-E-110-011) |
2011 | TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 (N100118) |
2011 | TWCERT/CC南部辦公室網站建置及後續維護案. 財團法人台灣網路資訊中心 |
2010 | 有主動防禦機制的誘捕系統研究(開放軟體元件開發分項). MOST (NSC99-2220-E-110-002-) |
2009 | 智慧行動裝置瀏覽網頁之安全機制(開放軟體元件開發分項). MOST (NSC98-2220-E-110-011) |
2009 | 網路威脅搜捕分析與追蹤技術研究─子計畫一:分散式網路威脅搜捕技術研究. MOST (NSC98-2218-E-110-007) |
2008 | 結合資料探勘與統計檢定之垃圾郵件過濾器之研究(自由軟體產業關鍵技術開發分項). MOST (NSC97-2218-E-110-004) |
2007 | 智慧家庭監控系統之研究(自由軟體產業關鍵技術開發分項). MOST (NSC96-2218-E-110-005) |
2007 | 3G行動通訊系統之資訊安全監控與管理. 台灣大哥大股份有限公司 (96068) |
2006 | 無線感測網路之覆蓋研究. MOST (NSC95-2221-E-110-083) |
2006 | Linux開放架構下數位生活家用網路安全之嵌入式平台開發. MOST (NSC95-3113-P-110-001) |
2005 | 以螞蟻演算法為基礎之來源追蹤之研究. MOST (NSC94-2213-E-110-049) |
2004 | 以使用者行為特徵為基礎安全機制. MOST (NSC93-2213-E-110-045) |
2004 | 網路入侵事件回報自動化與分析. MOST (93-2815-C-110 -022 -H) |
2004 | DNS安全檢測及事件紀錄分析機制實作研究(TWNIC︱NS︱093︱001). 財團法人台灣網路資訊中心 (93136) |
2003 | DNS Security 資源網站建置維護暨DNSSEC之研究(計畫編號︰TWNIC-NC-092-. 財團法人台灣網路資訊中心 (1485) |
2002 | 無線網路遊戲平台與魔法卡交易遊戲之研究開發. MOST (NSC91-2622-E-110-014-CC3) |
2002 | 位置衍生之服務與應用技術-子計畫二:位置認知下資訊安全機制與服務(I). MOST (NSC91-2219-E-110-002) |
2002 | DNS伺服器安全檢測與防護體系之建置與運作. 財團法人台灣網路資訊中心 (1255) |
1970 | 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究. MOST (103-2221-E-110-049-MY3) |
Year | Semester | Required / Selected | Department | Course Code | Course |
---|---|---|---|---|---|
112 | 2 | Required | Department of Information Management | MIS302 | OPERATING SYSTEMS |
112 | 2 | Selected | Department of Information Management | MIS538 | NETWORK SECURITY |
112 | 2 | Selected | Department of Information Management | MIS602 | SPECIAL TOPICS IN COMPUTER NETWORKS |
112 | 2 | Required | Department of Information Management | MIS506 | SEMINAR IN INFORMATION MANAGEMENT (II) |
111 | 2 | Selected | Department of Information Management | MIS538 | NETWORK SECURITY |
111 | 2 | Required | Department of Information Management | MIS302 | OPERATING SYSTEMS |
111 | 1 | Selected | Department of Information Management | MIS570 | INTRODUCTION TO CLOUD COMPUTING |
111 | 1 | Selected | Department of Information Management | MIS602 | SPECIAL TOPICS IN COMPUTER NETWORKS |
110 | 2 | Required | Department of Information Management | MIS302 | OPERATING SYSTEMS |
110 | 2 | Selected | Department of Information Management | MIS538 | NETWORK SECURITY |
110 | 1 | Selected | Department of Information Management | MIS602 | SPECIAL TOPICS IN COMPUTER NETWORKS |
110 | 1 | Selected | Department of Information Management | MIS570 | INTRODUCTION TO CLOUD COMPUTING |
Year | Title | Awarding Organization |
---|---|---|
2020 | Best Paper Award | 中華民國資訊安全學會 |
2019 | 教學優良課程 | 中山大學 |
2018 | Super Teaching Award | National Sun Yat-sen University |
2018 | 資安技能金盾獎之嶄露頭角獎 | 行政院國家資通安全會報技術服務中心 |
2017 | Best Paper Award | National Computer Symposium |
2017 | Super Teaching Award | National Sun Yat-sen University |
2016 | Super Teaching Award | National Sun Yat-sen University |
Period | Activity | Description | Role |
---|