教師個人簡歷
現職
國立中央大學
管理學院資訊管理學系
教授
國立中央大學
電子計算機中心
中心主任
專長
分散式資訊系統
電腦網路安全
資訊系統安全
Distributed information system
computer network security
information system security
專長簡述
分散式資訊系統、電腦網路安全、資訊系統安全
最高學歷
國立成功大學
電機工程學系
博士
科技部學門領域
- E - 工程及應用科學
- E08 - 資訊工程/智慧計算
- E0801 - 計算機結構與計算機系統
- E0802 - 程式語言與軟體工程
- E0804 - 計算機網路與網際網路
- E0810 - 人工智慧與仿生計算
- E0813 - 資訊系統管理
- E0818 - 資訊安全
- E40 - 資訊工程(資訊)
- E4002 - 程式語言與軟體工程
- E4097 - 雲端實務應用專案
- E4098 - 資訊安全實務應用專案
- E92 - 電信國家型計畫
- E9203 - 國家實驗網路(國家型)
- E93 - 網路通訊國家型計畫
- E9302 - 通訊軟體及平台(網通國家型)
- S - 科學教育
- S43 - 電腦輔助教學
- S4305 - 電腦輔助教學一地球科學
- S430504 - 電腦輔助教學一地球科學一高中
- SBA - 資訊教育一資訊教育
- SBA43 - 資訊教育一電腦輔助教學
- SBA430504 - 資訊教育一電腦輔助教學一地球科學一高中
政府GRB研究專長領域
教育部學門領域
高教深耕計畫
-
校務資訊系統開發暨維運作業
1150101~1151231
-
購置教學研究設備(機房伺服器、儲存、資訊安全、網路、電腦)
1140101~1141231
-
校務資訊系統開發暨維運作業
1140101~1141231
-
國際、國內電路租用、校園軟體授權
1140101~1141231
-
主冊專章-學校推動資安強化
1140101~1141231
-
購置教學研究設備(機房伺服器、儲存、資訊安全、網路、電腦)
1140101~1141231
-
主冊專章-學校推動資安強化
1130101~1131231
[資安韌性 , Cyber Resilience] -
校務資訊系統開發暨維運作業
1130101~1131231
[校務資訊系統 , school administration system] -
購置教學研究設備
1130101~1131231
-
購置教學研究設備(機房伺服器、儲存、資訊安全、網路、電腦)
1130101~1141231
-
購置教學研究設備(機房伺服器、儲存、資訊安全、網路、電腦)
1130101~1141231
-
電腦網路安全
1120801~1121231
[網路安全 , cybersecurity] -
電算中心開發研發系統費用
1120101~1121231
-
計中(國際、國內電路租用、校園軟體授權)
1120101~1121231
-
主冊專章-學校推動資安強化
1120101~1121231
[資安韌性,數位永續 ] -
113年購置教學研究設備(機房伺服器、儲存、資訊安全、網路、電腦)
1120101~1131231
[教學研究設備 , Teaching and research equipment] -
電算中心開發研發系統費用
1110101~1111231
-
計中(國際、國內電路租用、校園軟體授權)
1110101~1111231
-
研發系統優化及後續維護方案
1100101~1101231
-
計中(國際、國內電路租用、校園軟體授權)
1100101~1101231
-
電算中心開發學研人才庫費用
1100101~1101231
-
研發系統優化及後續維護方案
1090101~1091231
-
計中(國際、國內電路租用、校園軟體授權)
1090101~1091231
其他補助
-
臺灣學術網路(TANet)區域網路中心 114 年度基礎維運與資安人員計畫
1140101~1141231
[學術研究網路,資安韌性 , TANet,Cyber Resilience] -
臺灣學術網路(TANet)區域網路中心 113 年度基礎維運與資安人員計畫
1130101~1131231
[學術研究網路 , TANet] -
臺灣學術網路(TANet)區域網路中心112年度基礎維運與資安人員計畫
1120101~1121231
[學研網路 , TANet] -
臺灣學術網路(TANet)區域網路中心111年度基礎維運與資安人員計畫
1110101~1111231
[學研網路 , TANet] -
臺灣學術網路(TANet)區域網路中心110年度基礎維運與資安人員計畫
1100101~1101231
[學研網路 , TANet] -
臺灣學術網路(TANet)區域網路中心109年度基礎維運與資安人員計畫
1090101~1091231
[桃園區域網路中心,區網中心 , TANet,TYRC] -
臺灣學術網路(TANet)區域網路中心108年度基礎維運與資安人員計畫
1080101~1081231
-
106年度教育部補助大學校院辦理新型態資安實務課程計畫
1060201~1070131
推廣教育
-
資訊管理學系碩士在職專班學分班
1050201~1050731
-
資訊管理學系碩士在職專班學分班
1040801~1050131
-
資訊管理學系碩士在職專班學分班
1040201~1040930
在職專班
-
資訊管理學系碩士在職專班
1050201~1050731
-
資訊管理學系碩士在職專班
1040801~1050131
-
資訊管理碩士在職專班
1040201~1040731
國科會計畫統計
-
基於穩健雲端系統之行動應用安全性提升研究-子計畫二:利用圖結構特徵工程微調CodeLLaMA以建立Android惡意程式原始碼檢測系統
1140801~1150731
-
基於穩健雲端系統之行動應用安全性提升研究-子計畫二:利用圖結構特徵工程微調CodeLLaMA以建立Android惡意程式原始碼檢測系統
1130801~1140731
-
基於雲端容錯系統之智慧行動應用穩健性提升研究-以人工智慧可解釋性技術提升行動惡意程式檢測效能之研究
1120801~1130731
[惡意軟體偵測,可解釋性技術,對抗式攻擊,第三方函式庫 , Android] -
基於雲端容錯系統之智慧行動應用惡意行為檢測與身分驗證技術提升研究-以深度學習為基底之抗混淆、抗少量樣本並具行為解讀能力之惡意行動程式檢測技術研究
1110801~1120731
[Android惡意軟體偵測,混淆技術,機器學習,汙點分析,域適應 , Android Malware Detection,Obfuscation Techniques,Machine Learning,Taint Analysis,Domain Adaptation] -
高安全等級智慧型行動應用惡意行為分析架構之技術研發-子計畫二: 具使用者環境感知與自動進化能力之深度學習惡意行動程式檢測平台
1100801~1110731
[環境感知,自動進化,深度學習,惡意APP偵測,長短期記憶神經網路,捲積神經網路,生成對抗網路 , Environment awareness,auto evolution,deep learning,malicious APP detection,CNN,GAN,LSTM] -
高安全等級智慧型行動應用惡意行為分析架構之技術研發-子計畫二: 具使用者環境感知與自動進化能力之深度學習惡意行動程式檢測平台
1090801~1100731
[環境感知,自動進化,深度學習,惡意APP偵測,長短期記憶神經網路,捲積神經網路,生成對抗網路 , Environment awareness,auto evolution,deep learning,malicious APP detection,CNN,GAN,LSTM] -
高安全等級智慧型行動應用惡意行為分析架構之技術研發-子計畫二: 具使用者環境感知與自動進化能力之深度學習惡意行動程式檢測平台
1080801~1090731
[環境感知,自動進化,深度學習,惡意APP偵測,長短期記憶神經網路,捲積神經網路,生成對抗網路 , Environment awareness,auto evolution,deep learning,malicious APP detection,CNN,GAN,LSTM] -
行動應用之惡意行為分析技術研發及平台建置研究-子計畫二:一種具情境察覺能力之用戶友善智慧型行動應用惡意行為分析平台之研究
1070801~1080831
[情境察覺,用戶友善,行動應用,惡意行為分析,深度學習 , Situation Awareness, User Friendly, Mobile Application, Malicious Behavior Analysis, Deep Learing] -
支援行動應用APP之惡意風險分析及使用者認證技術研發-子計畫二:一種創新的雲端隱匿聚合並評估Android可疑APP之惡意風險研究
1060801~1070731
-
支援行動應用APP之惡意風險分析及使用者認證技術研發-子計畫二:一種創新的雲端隱匿聚合並評估Android可疑APP之惡意風險研究
1050801~1060731
-
支援在企業雲環境BYOD應用之資訊安全技術研發-基於雲端的 BYOD安全技術研究
1040801~1050731
產學合作計畫統計
-
2025第3屆亞洲技能競賽暨第48屆國際技能競賽網路安全職類青年組國手訓練計畫
1140922~1141130
[網路安全,技能競賽 , Internet Security,International Skills Competition] -
114年第2次原住民族語言能力認證測驗試務經費
1140903~1141231
[語言測驗 , test] -
114年第2次原住民族語言能力認證測驗試務經費(特殊試場)
1140903~1141231
[語言測驗 , test] -
114-115 年度 TWAREN GigaPOPs 委辦維護案
1140801~1150805
[無 , 無] -
114年8月教育部臺灣台語認證考試試務經費
1140505~1140831
[語言測驗 , test] -
114年第1次原住民族語言能力認證測驗試務經費
1140401~1140430
[語言測驗 , test] -
114年3月臺灣台語認證考試試務經費
1140101~1140331
[語言測驗 , test] -
113年第2次原住民族語言能力認證試務經費
1131001~1131231
[語言測驗 , test] -
113-114年度TWAREN GigaPOPs 委辦維護案
1130801~1140805
[學術研究網路 , TWAREN GigaPOPs] -
113年閩南語語言能力認證試務經費
1130601~1130831
[語言測驗 , test] -
113年第1次原住民族語言能力認證試務經費
1130301~1130531
[語言測驗 , test] -
113年閩南語語言能力認證試務經費
1130101~1130331
[語言測驗 , test] -
第47屆國際技能競賽網路安全職類國手訓練計畫
1121001~1130908
[國際技能競賽 , international skills competition] -
2023(第2屆)亞洲技能競賽及第47屆國際技能競賽網路安全職類青年組國手訓練計畫
1121001~1121231
[國際技能競賽,網路安全 , international skills competition,Internet security] -
112年第2次原住民族語言能力認證試務經費
1120901~1121231
[語言測驗 , test] -
112-113 年度 TWAREN GigaPOPs 委辦維護案
1120801~1130805
[(本計畫無中文關鍵詞) , (本計畫無英文關鍵詞)] -
112年閩南語語言能力認證考試試務經費
1120515~1120831
[語言測驗 , test] -
112-113年臺灣學術網路內容傳遞網路維運及建置計畫
1120501~1131231
[內容傳遞網路 , Content Delivery Network] -
112年度第1次原住民族語言能力認證測驗試務經費
1120214~1120522
[語言測驗 , test] -
111年度第2次原住民族語言能力認證測驗試務經費
1111101~1111231
[語言測驗 , test] -
111-112 年度 TWAREN GigaPOPs 委辦維護案
1110801~1120731
[學術研究網路 , TWAREN] -
111年閩南語語言能力認證考試試務經費
1110701~1110831
[語言測驗 , test] -
臺灣學術網路(TANet)內容傳遞網路建置計畫-第2期
1110601~1120331
[內容傳遞網路 , Content Delivery Network] -
111年度第1次原住民族語言能力認證測驗試務經費
1110301~1110531
[語言測驗 , test] -
第46屆國際技能競賽網路安全職類國手111年加強訓練計畫
1110101~1110930
[網路安全,國際技能競賽 , World Skills,Cyber Security] -
110-111 年度 TWAREN GigaPOPs 委辦維護案
1100801~1110731
[學研網路 , TWAREN Network] -
第46屆國際技能競賽網路安全職類國手一般訓練計畫
1100301~1101231
[網路安全,國際技能競賽 ] -
109-110 年度 TWAREN GigaPOPs 委辦維護案
1090801~1100731
[學研網路 , TWAREN Network] -
108-109年度TWAREN GigaPOPs委辦維護案
1080801~1090731
-
可疑網址潛在風險與惡意排名之研究
1040612~1050611
期刊著作
-
Using Explainability Techniques to Assist Android Malware Detection Models in Resisting Adversarial Attacks
Proceedings of the International Conference on Soft Computing and Machine Intelligence, ISCMI, 2024, 277-281, 2024-01-01
[ adversarial attacks,Android malware detection,deep learning,XAI ] -
Cloud computing for malicious encrypted traffic analysis and collaboration
International Journal of Grid and High Performance Computing, 13, 3, 12-29, 2021-07-01
[ JA3,MapReduce,Microservice,Serverless,SSL/TLS Fingerprinting,TF-IDF,Threat Intelligent ] -
A Game Theory Approach for Assessment of Risk and Deployment of Police Patrols in Response to Criminal Activity in San Francisco
Risk Analysis, 40, 3, 534-549, 2020-03-01
[ Nash equilibrium , patrol deployment , risk value , Shapley value ] -
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection
Security and Communication Networks, 2020, 2020-01-01 -
Autonomic Navigation System Based on Predicted Traffic and VANETs
Wireless Personal Communications, 92, 2, 515-546, 2017-01-01
[ Autonomous , Car navigation , Dynamic , Traffic management , Vehicle navigation ] -
A Bipolar Traffic Density Awareness Routing Protocol for Vehicular Ad Hoc Networks
Mobile Information Systems, 2015, 2015-01-22 -
Energy efficient min delay-based geocast routing protocol for the internet of vehicles
Journal of Information Science and Engineering, 31, 6, 1903-1918, 2015-01-01
[ Energy efficient , Green networking , Internet of Vehicles , Routing , Vanets ] -
Improving the authentication scheme and access control protocol for VANETs
Entropy, 16, 11, 6152-6165, 2014-01-01
[ Access control , Authentication , Cryptanalysis , Privacy , Vehicular ad hoc networks (VANETs) ] -
A hybrid economic indices based short-term load forecasting system
International Journal of Electrical Power and Energy Systems, 54, 293-305, 2014-01-01
[ Business indicator , Short-term load forecasting , Socio-economic indices , Stock index , Support vector regression ] -
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications, 69, 3, 1041-1065, 2014-01-01
[ Anonymity , Digital content sharing , DRM , Group key , P2P ] -
Selective timestamp-nonce based authentication scheme
International Journal of Security and its Applications, 7, 1, 95-104, 2013-05-10
[ Adaptive timestamp-nonce , Authentication , Portable storage device , Security , Session key ] -
A beacon-based trust management system for enhancing user centric location privacy in VANETs
Journal of Communications and Networks, 15, 2, 153-163, 2013-04-01
[ Privacy , safety , trust management , vehicle ad-hoc network (VANET) ] -
SafeAnon: A safe location privacy scheme for vehicular networks
Telecommunication Systems, 50, 4, 339-354, 2012-08-01
[ Anonymity , Location privacy , Safety , Tracking , VANET ] -
A seamless broadcasting scheme with live video support
International Journal of Digital Multimedia Broadcasting, 2012, 2012-05-21 -
Cryptanalysis of a paacp: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
Applied Mathematics and Information Sciences, 6, 2 SUPPL., 463s-469s, 2012-04-01
[ Access control,Authentication,Cryptanalysis,VANET ] -
MalPEFinder: Fast and retrospective assessment of data breaches in malware attacks
Security and Communication Networks, 5, 8, 899-915, 2012-01-01
[ Data breach assessment , Malware detection , Retrospective detection ] -
On the design of an global intrusion tolerance network architecture against the internet catastrophes
Journal of Systems and Software, 82, 8, 1313-1325, 2009-08-01
[ Fatal attack , Intrusion tolerance , Survivability , Virtual machine , Worm ] -
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
Expert Systems with Applications, 36, 3 PART 1, 4672-4679, 2009-01-01
[ Polymorphic worm , Rough set theory , Zero-day attack ] -
Dynamic web page protection based on content integrity
International Journal of Services and Standards, 3, 1, 120-135, 2007-01-01
[ Content integrity , Hash , Honeypot , Intrusion detection , Services , Standards , Web protection ] -
A smooth broadcasting scheme for VBR-encoded hot videos
Computer Communications, 29, 15, 2904-2916, 2006-09-05
[ Hot-video broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VOD) ] -
An adjustable hot-video broadcasting scheme
WSEAS Transactions on Communications, 5, 5, 832-839, 2006-05-01
[ Buffer requirements , Client bandwidth requirements , Hot video broadcasting , VoD , Waiting time ] -
The enhanced staircase broadcasting for VBR videos
Computer Communications, 28, 17, 1903-1909, 2005-10-17
[ Cable TV , Hot-video broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VOD) ] -
A smooth recursive frequency-splitting scheme for broadcasting VBR-encoded hot videos
Lecture Notes in Computer Science, 3079, 950-960, 2004-01-01 -
Smooth fast broadcasting (SFB) for compressed videos
Lecture Notes in Computer Science, 2957, 272-283, 2004-01-01 -
Archive knowledge discovery by proxy cache
Internet Research, 14, 1, 34-47, 2004-01-01
[ Archives , Internet , Worldwide web ] -
Improving Internet archive service through proxy cache
Internet Research, 13, 1, 61-71, 2003-03-01
[ Archives , Internet , World Wide Web ] -
A scheduling system for exploiting data and task parallelism on PC laboratory clusters
Campus-Wide Information Systems, 20, 1, 4-16, 2003-03-01
[ Clusters , Data processing , Personal computers , Process innovation ]
研討會著作
-
Scalable AI Pipeline for Specified Colour Transfer from Concept Sketches into Static Animation Frames
159-164, 2025-01-01
[ 2D animation characters,AI colour filling pipeline,automatic colouring,CGAN,image processing ] -
Comparison of Interaction Profiling Bipartite Graph Mining and Graph Neural Network for Malware-Control Domain Detection
12-19, 2024-05-22
[ Cybersecurity,Deep Graph Infomax,Graph Neural Networks,Malicious Domain Detection,Network Traffic Analysis,Unsupervised Learning ] -
A Novel Deep Learning Based Attention Mechanism for Android Malware Detection and Explanation
226-232, 2022-07-29
[ Android Malware Classification,Attention Mechanism,CNN,Deep Learning,Model Interpretation ] -
Enhancing Classification Performance for Android Small Sample Malicious Families Using Hybrid RGB Image Augmentation Method
21-25, 2022-01-01
[ Android,data augmentation,deep learning,hybrid augmentation,malware detection,malware family classification ] -
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection
2021-01-30
[ Android,Data Augmentation,Deep Learning,Generative Adversarial Nets ] -
Android malware detection system integrating block feature extraction and multi-head attention mechanism
408-413, 2020-12-01
[ Android,Deep Learning,LSTM,multi-head attention,Static Analysis,Transformer ] -
Dynamic Android Malware Analysis with De-Identification of Personal Identifiable Information
30-36, 2020-08-05
[ Android,Application Classification,De-Identification,Dynamic Analysis,Network Packet ] -
Combining Static Permissions and Dynamic Packet Analysis to Improve Android Malware Detection
75-81, 2020-06-01
[ Android malware detection,application family classification,dynamic analysis,static analysis ] -
NetflowTotal: A cloud service integration platform for malicious traffic analysis and collaboration
154-160, 2019-10-18
[ Cyber Threat Intelligence , MapReduce , Microservice , Serverless ] -
A novel preprocessing method for solving long sequence problem in android malware detection
12-17, 2019-08-01
[ Android malware detection , Dalvik opcode , LSTM , Preprocessing , Static analysis ] -
CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection
2019-01-23
[ Botnet , Hadoop , MapReduce , Spark ] -
The Novel SDN Testbed with Virtual Network Functions Placement
2016-06-29
[ Network Testbed , Network Virtualization , NFV , OpenFlow , SDN , Virtual Machine Placement ] -
Adaptive Smart Power Control Algorithm for LTE downlink cross-tier interference avoidance
24-30, 2015-11-19
[ CSG , femtocell , ICIC , interference , LTE , macrocell ] -
Adaptive decision making for improving trust establishment in VANET
2014-01-01
[ Beacon , Detection delay , Event , Trust , VANET ] -
Evaluation of collusion resistance on trust management systems for VANETs
356-360, 2012-12-01
[ collusion attack , security , trust management , VANETs ] -
An efficient trust management system for balancing the safety and location privacy in VANETs
393-400, 2012-11-05
[ RSU-aided , Safety , Trust , VANET ] -
Beacon-based trust management for location privacy enhancement VANETs
2011-12-15
[ Privacy , Reputation System , Safety , Trust , VANET ] -
Combining density-based clustering and wavelet methods for internal systems anomaly detection
2011-12-15
[ anomaly detection , system anomaly , wavelet transform ] -
A system call analysis method with MapReduce for malware detection
631-637, 2011-12-01
[ Behavior-based , Malware detection , MapReduce , System calls ] -
Retrospective detection of malware attacks by cloud computing
510-517, 2010-12-13
[ Cloud computing , Hadoop , Malware , Retrospective detection ] -
Safe distance based location privacy in vehicular networks
2010-01-01
[ Anonymity,Location Privacy,Traffic Safety,VANET ] -
TLMS: A novel DRM scheme for multimedia sharing in P2P networks
873-876, 2009-12-01
[ Digital content sharing , DRM , Group key , P2P , Threshold scheme ] -
Combining incremental hidden Markov model and Adaboost algorithm for anomaly intrusion detection
3-9, 2009-11-23
[ Adaboost , Anomaly intrusion detection , IHMM , Normal profile ] -
A game theory approach for the reallocation of security forces against terrorist diversionary attacks
89-94, 2009-10-22
[ Nash equilibrium , Security forces reallocation , Shapley value , Terrorist attack ] -
A game theory approach for an emergency management security advisory system
116-121, 2008-09-22
[ Homeland security advisory system , Nash equilibrium , Shapley value , Terrorist threat value ] -
An efficient staircase-harmonic scheme for broadcasting popular videos
122-127, 2005-12-01
[ Buffer requirement , Hot video broadcasting , QoS , Viewers' waiting time , VoD ] -
Recognizing multistage cyber attacks via CPN approach
1-6, 2005-12-01
[ Alert correlation , Attack modeling , Colored Petri Net , Multistage attacks ] -
Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery
600-605, 2004-12-01
[ Fault tolerant , Hot video broadcasting , Loss recovery , Video on demand ] -
Interleaving staircase broadcasting and receiving scheme with loss-anticipation delivery
352-355, 2004-12-01
[ Fault tolerant , Hot video broadcasting , Loss recovery , Video on demand ] -
Fast and lossless broadcasting schemes for VBR-encoded hot videos
165-169, 2004-12-01
[ Hot-video broadcasting , Live video , Lossless broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VoD) ] -
Simple VBR staircase broadcasting (SVSB)
128-133, 2004-07-06
[ Hot-video broadcasting , Variable-bit-rate (VBR) , Video-on-demand (VOD) ] -
A segment-alignment interactive broadcasting scheme
1040-1045, 2004-06-28
[ Hot video broadcasting , VCR functionality , Video on demand service , Video streaming ]
專書
-
Communications in Computer and Information Science
434-446, 2022-01-01
[ Android malware detection,Machine learning,Model aging,Static analysis ] -
Communications in Computer and Information Science
362-373, 2022-01-01
[ Android malware analysis,Deep learning,Dynamic analysis,Sequence relationships,System call sequences ] -
Lecture Notes in Electrical Engineering
1913-1924, 2019-01-01
[ Privacy,Trust management,VANET ] -
Communications in Computer and Information Science
18-30, 2017-01-01
[ Emergency response,Medical resources scheduling,Nash equilibrium,Shapley value ] -
Frontiers in Artificial Intelligence and Applications
651-661, 2015-01-01
[ Cloud Security Experimental Platform,State Feedback,Windows API Hooking ] -
Lecture Notes in Electrical Engineering
259-272, 2015-01-01
[ Access control,Authentication,Cryptanalysis,Privacy,VANET ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
405-416, 2013-12-01
-
Lecture Notes in Electrical Engineering
105-112, 2012-12-13
[ RSU-aided,Safety,Trust,VANET ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
328-344, 2012-01-01
[ Safety,Self-organized,Trust management,VANET ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
226-240, 2012-01-01
[ Advanced persistent threat,Botnet detection,Incident investigation,Malware detection ] -
Communications in Computer and Information Science
65-74, 2011-12-01
[ Agent,Interactivity,Security training,Virtual machine ] -
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
39-51, 2010-12-01
[ Anonymity,Location privacy,Tracking,VANET ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
446-451, 2009-07-17
[ Agent deployment,Nash equilibrium,Shapley value,Threat levels ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
241-251, 2007-01-01
[ Call admission control,Congestion control,Quality of service,Utility function,Wireless network ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
389-404, 2006-01-01
[ Colored petri nets,Information flow,Security policy,SELinux ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
236-246, 2006-01-01
-
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
362-370, 2005-01-01
國立中央大學