研究室
管(CM) 4050

連絡電話
07-5252000 #4726

電子信箱
cmchen (AT) mis.nsysu.edu.tw

個人網站
https://cmchen.mis.nsysu.edu.tw/

研究領域
1.網路安全
2.入侵偵測
3.機器學習
4.文字探勘

學歷

  • 國立交通大學資訊工程學士, 1984/06
  • 國立交通大學資訊工程碩士, 1986/06
  • 美國馬里蘭大學計算機科學碩士, 1991/12
  • 美國馬里蘭大學計算機科學博士, 1995/05

經歷

  • 國立中山大學資訊管理學系主任, 2013/08-2016/07
  • 臺灣學術網路危機處理中心(TACERT)計畫主持人,2009-迄今
  • 國立中山大學圖書與資訊處副處長,2009~2011
  • 國立中山大學網路系統組組長,2009-2011
  • 國立中山大學系統發展組組長,2005-2009
  • 國立中山大學資訊管理學系教授, 2004/02-迄今
  • 臺灣電腦網路危機處理中心(TWCERT/CC)研究發展組組長,1998/9-2011
  • 國立中山大學資訊管理學系副教授, 1996/08-2004/01
  • 中華民國電腦稽核協會高雄分會副會長, 1997/7- 1998/7
  • 美國花旗銀行全球資訊網路研究總部(美國維吉尼亞州)副總經理, 1995/02-1996/07
  • 美國馬里蘭大學計算機科學學系研究助理, 1992/01-1995/01
  • 美國馬里蘭大學研究生入學審查委員會委員, 1992/08-1993/07
  • 美國馬里蘭大學計算機科學學系助教, 1989/08-1991/12
  • 前瞻科技公司計畫專案經理, 1988/06-1989/07
  • 前瞻科技公司副工程師, 1986/06-1989/07

學術榮耀

  • 86-88年度國科會甲種獎助

期刊論文

  1. Chia-Mei Chen, G. H. Lai, J. Lin, Detection of C&C Servers Based on Swarm Intelligence Approach, Journal of Computers, Vol.29, 2018
  2. Chia-Mei Chen, Wen-Ling Lo, Ya-Hui Ou, Gu-Hsin Lai, Network Anomaly Detection Based on Artificial Intelligence, IWSEC, 2018
  3. Chia-Mei Chen, Wen-Ling Lo, Ya-Hui Ou, Gu-Hsin Lai, Tse-Yao Wang, Application of Revised Ant Colony Optimization for Anomaly Detection Systems, IJCEE, 2018
  4. 陳嘉玫、賴谷鑫、張育涵, 雲端開放資料分析運算平台之研究-以資訊安全紀錄檔分析為例, 電子商務研究, 2017
  5. TienHo Chang, Chia-Mei Chen, Hanwei Hsiao, and Gu-Hsin Lai, Cracking of WPA & WPA2 Using GPUs and Rule-based Method, Intelligent automation & Soft Computing, 2017
  6. 王士豪、陳嘉玫, QR Code智慧型藥袋藥物影音查詢系統, 管理資訊計算, 2015
  7. Chia-Mei Chen, G. H. Lai, Research on Classification of Malware Source Code, Journal of Shanghai Jiaotong University, 2014
  8. 陳嘉玫、黃哲諄、歐雅惠, 以信譽機制為基礎之巨量資料偵測可疑網址, 資訊安全通訊, 2014
  9. 陳嘉玫、江玟璟、歐雅惠, 開放資料應用於行動惡意程式分析研究, 電子商務研究期刊, 2014
  10. Chia-Mei Chen, M. Z. Huang, Y. H. Ou, Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain, Journal of Information Hiding and Multimedia Signal Processing(JIHMSP), 2014 (EI)
  11. Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou, Detection Suspicious URL Filtering Based on Reputation, Journal of Information Security and Applications, 2014
  12. Chia-Mei Chen, S. T. Cheng, and J. H. Chou, Detection of Fast-Flux Domains, Journal of Advances in Computer Networks (JACN), Vol.1, No.2, 2013, pp.148-152
  13. Chia-Mei Chen, S.-T. Cheng, and R-Y. Zeng, A Proactive Approach to Intrusion Detection and Malware Collection, Security and Communication Networks, Vol.6, 2013, pp.844-853 (SCI)
  14. 陳嘉玫、楊佳蕙、賴谷鑫, 基於結構相似度之惡意程式原始碼分類研究, 電子商務學報, 2013
  15. 官大智、陳嘉玫、林家賓、王則堯, 以異常為基礎之即時通訊惡意網址偵測, 資訊管理學報, Vol.19, No.3, 2012, pp.567-589 (國科會100-2218-E-110-011)
  16. 陳嘉玫、官大智、陳怡綾, 以行為為基礎偵測異常IRC 流量, 資訊安全通訊 (Communications of the CCISA), Vol.18, No.3, 2012
  17. 侯雍聰、陳嘉玫, 以異常行為為基礎之即時惡意網頁偵測之研究, 電子商務學報(Journal of e-Business), Vol.13, No.1, 2011, pp.117-134
  18. G. H. Lai, C. S. Ouyang, Chia-Mei Chen,, A Group-based Deployment for Wormhole Prevention in Sensor Networks, Journal of Information Science and Engineering, Vol.27, 2011, pp.79-93 (SCI)
  19. Y. Hou, Y. Chang, T. Chen, C. Laih, and Chia-Mei Chen, Malicious Web Content Detection by Machine Learning, Expert Systems with Applications, Vol.37, No.1, 2010, pp.55-60 (SCI)
  20. Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks, Wireless Networks, Vol.14, No.4, 2010, pp.1033-1043 (SCI)
  21. Chia-Mei Chen, Y. L. Chen, H. C. Lin,, An efficient network intrusion detection, Computer Communicatons, Vol.33, No.4, 2010, pp.477-484 (SCIE)
  22. J. L. Liu, C. W. Chou, and Chia-Mei Chen, Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm, International Journal Business Intelligence and Data Mining, Vol.5, No.1, 2010
  23. Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks, Wireless Networks, 2009 (SCI)
  24. Chia-Mei Chen, Y. L. Chen, and H. C. Lin, An efficient network intrusion detection, Computer Communications, 2009 (SCI)
  25. J. L. Liu, C. W. Chou, and Chia-Mei Chen, Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm, accepted by Int. J. Business Intelligence and Data Mining, 2009
  26. J. L. Liu and Chia-Mei Chen, Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization Design, Engineering Optimization, Vol.42, No.2, 2009 (SCI)
  27. G. H. Lai, C. W. Chou, Chia-Mei Chen, and Ya-Hua Ou, Anti-Spam Filter Based on Data Mining and Statistical Test, Studies in Computational Intelligence, Vol.208, 2009
  28. 賴谷鑫,周照偉,陳嘉玫, 結合資料探勘與統計檢定之垃圾郵件過濾器之研究, Accepted by 電子商務學報, 2009, pp.773-791 (TSSCI)
  29. G. H. Lai, Chia-Mei Chen, C. S. Laih, and T. Chen, A Collaborative Anti-Spam System, Expert Systems with Applications, Vol.44, No.1, 2008 (SCI)
  30. G. H. Lai and Chia-Mei Chen, Detecting Denial of Service Attacks in Sensor Networks, Journal of Computers, Vol.18, No.4, 2008
  31. Chia-Mei Chen and C. P. Wei, Efficient Network Monitoring for Large Networks, Journal of Computers, Vol.18, No.4, 2008
  32. Chia-Mei Chen, B. C. Jeng, G. H. Lai, W Chao, Ant-Based IP Traceback, Expert Systems with Applications, Vol.36, No.3, 2007 (SCI)
  33. H. C. Wang, B. C. Jeng, and Chia-Mei Chen, Structural Testing Using a Memetic Algorithm, Journal of Software Engineering Studies, 2007
  34. H. M. Sun, Chia-Mei Chen, and L. C. Shu, Object-based Multimedia Scheduling Based on Bipartite Graphs, IEICE Transaction on Communication, Vol.E88-B, No.1, 2005 (SCI)
  35. Chia-Mei Chen, H. M. Sun, L. C. Shu, Optimizing Object-based Multimedia Delivery Across Bandwidth Constrained Networks, Computer Journal, Vol.47, No.5, 2004
  36. S-T Cheng, C. Chen, C. Li, and Chia-Mei Chen, Network topology management in a mobile-switch ATM network: dynamic partition algorithms, International Journal of Network Management, Vol.12, No.2, 2002, pp.99-115 (EI, Engineering Index)
  37. Sheng-Tzong Cheng, Chia-Mei Chen, and H. T. Liu, Dynamic Round-based Resource Management for On-Demand Multimedia Servers, computer Journal, Vol.43, No.5, 2000, pp.386-395 (SCI)
  38. Sheng-Tzong Cheng, Chia-Mei Chen, and S. K. Tripathi, A Fault-Tolerant Model for Real-Time Systems, Journal of Computer and Systems Sciences, Vol.61, No.3, 2000, pp.457-477 (SCI)
  39. "3. Sheng-Tzong Cheng, Chia-Mei Chen, and Cheng-Jeng Peng", Topological Network Design subject to 1-Fault Tolerance, accepted by IJCA International Journal of Computers and Their Applications, 1999
  40. S. Cheng, Chia-Mei Chen, and S. K. Tripathi, Priority-Based Synchronization Protocols for Real-Time Multiprocessor Systems, submitted to the Journal of Parallel and Distributed Computing, 1999
  41. Sheng-Tzong Cheng, Chia-Mei Chen, and Jing-Wen Hwang, Low Power Design for Real-Time Systems, Real-Time Systems, 1998 (SCI)
  42. Sheng-Tzong Cheng and Chia-Mei Chen, Temporal Analysis and Algorithms for Real-Time Scheduling and Allocation, IJCA International Journal of Computers and Their Applications, 1998
  43. Chia-Mei Chen, Shyh-In Hwang, and Satish K. Tripathi, A Performance Study of Real-Time Optimistic Concurrency Control with the Knowledge of Execution Time, ISCA International Journal of Computers and Their Applications, 1995
  44. Chia-Mei Chen and W. H. Tsai, Automatic Identification of Chinese Seal Imprints with Arbitrary or Partial Shapes, Computer Processing of Chinese and Oriental Languages, 1986

研討會論文

  1. Chia-Mei Chen and Z.-X. Tsai , Integrated Digital Forensic for Cyber Attacks , International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018), 2018
  2. D. W. Wen, Chia-Mei Chen, Evolution of Advanced Persistent Threat (APT) Attacks and Actors, Internatinonal Computer Symposium 2018 , 2018
  3. Chia-Mei Chen, W. L. Lo, G. H. Lai, Y. C. Hu, Network Anomaly Detection Based on Artificial Intelligence, The Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2018
  4. T. H. Chang, Chia-Mei Chen, G. H. Lai, J. Lin, The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic, IEEE Dependable and Secure Computing 2018, 2018
  5. 李柏毅、蔡一郎、陳嘉玫, 從網路威脅情資分享探討我國關鍵資訊基礎設施防護策略, 2018第二十四屆國際資訊管理暨實務研討會, 2018
  6. 富榮光 陳嘉玫, 應用程式對資料庫的存取安全與防護, 臺灣網際網路研討會, 2018
  7. Chia-Mei Chen, Wen-Ling Lo, Ya-Hui Ou, Gu-Hsin Lai, Tse-Yao Wang, Application of Revised Ant Colony Optimization for Anomaly Detection Systems, ICCCS2018, Japan, 2018
  8. 陳嘉玫、莊旺川、歐雅惠、黃新智、萬樹人、黃豐締, 有效率暨公平之急診人員排班管理系統, 第17屆離島資訊技術與應用研討會(ITAOI), 2018
  9. 歐雅惠、陳嘉玫、王則堯 , 選擇最適過濾法則偵測目標式攻擊, 第二十八屆全國資訊安全會議(CISC 2018), 2018
  10. Tienho Chang, Ilsun You, Chia-Mei Chen and Han Wei Hsiao, The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs, Springer Communications in Computer and Information Science (CCIS), 2017
  11. Chia-Mei Chen, Gu-Hsin Lai, Tienho Chang, and Kuo Yen-Chih, Improving Alert Accuracy for Smart Vehicles, LNCS, 2017
  12. Chia-Mei Chen, Gu-Hsin Lai, Tienho Chang, and Kuo Yen-Chih, Improving Alert Accuracy for Smart Vehicles, SecIoE-2017 (2nd International Workshop on Security of the Internet of Everything), 2017
  13. 陳嘉玫,曾昭銘,陳怡靜,張明達,吳惠麟, 利用物聯網裝置漏洞之攻擊行為研究, 全國資訊安全會議 (CISC 2017), 2017
  14. 陳嘉玫、賴谷鑫、張天河, 偵測車載通訊網路警報真實性, 全國資訊安全會議 (CISC 2017), 2017
  15. 陳嘉玫,歐雅惠, 賴谷鑫, 張育涵, 運用雲端運算技術改善偵測網路攻擊之效能, 全國資訊安全會議 (CISC 2017), 2017
  16. Tienho Chang, Ilsun You, Chia-Mei Chen and Han Wei Hsiao, The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs, MobiSec 2016, 2016
  17. Tienho Chang, Chia-Mei Chen, Han Wei Hsiao and Lai Gu-Hsin, Cracking of WPA & WPA2 Using GPUs and Rule-based Method, AIMS-FSS 2016, 2016
  18. Chia-Mei Chen, Han Wei Hsiao and Tienho Chang , The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs , The 2016 International Symposium on Mobile Internet Security (MobiSec 2016), 2016
  19. Chia-Mei Chen, Gu-Hsin Lai, Detecting Command and Control Servers Using Ant Colony Optimization, The International Conference on Computer Science and Information Technology (ICCSIT 2016), 2016
  20. 王士豪、陳嘉玫, 漸進式惡意程式分類方法, 第二十五屆全國資訊安全會議, 2015
  21. 陳嘉枚、王則堯、羅文翎, 智慧型僵屍網路偵測, 第二十五屆全國資訊安全會議, 2015
  22. 郭振忠、歐雅惠、劉奕賢、王子夏、郭鎮穎、陳嘉玫、李忠憲、林輝堂、楊竹星, 網路威脅搜捕、分析、追蹤與過濾技術之研究, 2014Cyberspace「雲端服務應用、安全與稽核」研討會, 2015
  23. Chiamei Chen and Tienho Chang, The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, AsiaJCIS 2015, 2015
  24. 陳嘉玫、賴谷鑫、歐雅惠, IPv6 網路環境威脅以及偵測工具之研究, 第四屆網路智能與應用研討會, 2014
  25. 陳嘉玫、賴谷鑫、黃僑偉, 基於漸增式分群法之惡意程式自動分類研究, 第二十四屆全國資訊安全會議, 2014
  26. G. H. Lai and Chia-Mei Chen, An Efficient Honeypot Based Malware Classification System, ICS2014, 2014
  27. Chia-Mei Chen, J. M. Lin and G. H. Lai, Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code, 1st International Conference on Trustworthy Systems and Their Applications, 2014
  28. Chia-Mei Chen, P. Y. Yang, Y. H. Ou, H. W. Hsia, Targeted Attack Prevention at Early Stage, SMPE 2014, 2014
  29. 曾琳銘、林孝忠、陳嘉玫, 植基於SVM之惡意軟體分析機制, 全國計算機會議(NCS2013), 2013
  30. 陳嘉玫、張哲誠、歐雅惠、林俊吾、賴谷鑫, 使用隱藏馬可夫模型偵測持續性滲透攻擊之研究, 全國計算機會議(NCS2013), 台灣台中, 2013
  31. 陳嘉玫、林蕙君、王則堯, 惡意郵件社交工程防範作業有效性之研究, 第十九屆資訊管理暨實務研討會(IMP2013), 2013
  32. 陳嘉玫、江玟璟、歐雅惠, 開放資料應用於行動惡意程式分析研究, 2013 Open data 學術研討會, 2013
  33. 陳嘉玫、江玟璟、吳惠麟、陳怡靜、曾昭明, 基於資料外洩的行動惡意程式行為分析, 台灣網際網路研討會(TANET2013), 2013
  34. 陳嘉玫、李玉雲、賴谷鑫, 以螞蟻演算法為基礎之殭屍網路命令與控制伺服器朔源研究, 第23屆資訊安全會議(CISC2013), 2013
  35. 陳嘉玫、楊佳蕙、賴谷鑫, 惡意程式原始碼分類研究, 第二屆海峽兩岸資安研討會, 2013
  36. Gu-Hsin Lai, Chia-Mei Chen, Yu-Yun Le, Botnet Server Detection Using Ant Algorithm, 全國計算機會議(NCS2013), 2013
  37. Chia-Mei Chen, G. H. Lai, Y. Y. Le, and J. C. Fan, Botnet Threat Traceback for Open Network Environments, 第十九屆海峽兩岸訊息管理發展, 2013
  38. Chia-Mei Chen, H. W. Hsiao, P. Y. Yang, and Y. H. Ou, Defending Malicious Attacks in Cyber Physical Systems, Cyber-Physical Systems, Networks, and Applications (CPSNA2013), 2013
  39. Chia-Mei Chen, J. J. Huang, Y. H. Ou, Detecting Web Attacks Based on Domain Statistics, Pacific Asia on Intelligence and Security Informatics( PAISI2013), 中國北京, 2013
  40. Chia-Mei Chen, S. T. Cheng, J. H. Chou, Efficient Detection of Fast-Flux Domains, 2013 The 5th International Conference on Computer Engineering and Technology(ICCET 2013), 2013
  41. Chia-Mei Chen, D.J. Guan, Y. Z. Huang, and Y. H Ou, State-based Attack Detection for Cloud. International Symposium on Next-Generation Electronics (ISNE2013), 2013
  42. H. Lin and Chia-Mei Chen, Centralized Botnet Detection Using Network Analysis, 2013 International Conference on Electronic Engineering and Computer Science (EECS 2013), 2013
  43. 陳嘉玫、李玉雲、賴谷鑫, 以螞蟻演算法偵測殭屍網路之命令與控制伺服器, 2012資訊安全技術創新應用研討會, 2012
  44. 陳嘉玫、蔡旻螢、曾瑞瑜、陳怡靜、張明達、吳惠麟, 多功能惡意程式行為研究, 台灣網際網路研討會(TANET 2012), 2012 (國科會:100-2218-E-110-011)
  45. 陳嘉玫、蔡旻螢, 多節點異常警告之關聯研究, 第二十二屆資訊安全會議 (CISC 2012), 2012 (國科會:100-2218-E-110-011)
  46. 陳嘉玫、蕭漢威、李宗南、楊中皇、楊鵬宇, 偵測聯合攻擊之研究, 第二十三屆國際資訊管理學術研討會 (ICIM 2012), 2012 (國科會:100-2218-E-110-011)
  47. 陳嘉玫、王則堯、蔡閎亘, 簡潔化惡意軟體行為分析, 第二十三屆國際資訊管理學術研討會 (ICIM 2012), 2012 (國科會:100-2218-E-100-004-MY3)
  48. Chia-Mei Chen, M. Z. Huang, Y. H. Ou, Detecting Web-Based Botnets with Fast-flux Domains, International Computer Symposium (ICS2012), Taiwan, 2012
  49. Chia-Mei Chen, S. T. Cheng, J. H. Chou, Y. H. Ou, Formulistic detection of Malicious Fast-Flux Domains, IEEE International Symposium on Parallel Architectures, Algorithms and Programming (PAAP 2012), 2012
  50. Chia-Mei Chen, D. J. Guan, Y. Z. Huang, and Y. H. Ou, Attack Sequence Detection in Cloud Using Hidden Markov Model, The Asia JointConference on Information Security(AsiaJCIS 2012), 日本東京, 2012
  51. Chia-Mei Chen, D. J. Guan, Y.-Z. Huang, and Y.-H. Ou, Attack Sequence Detection in Cloud Using Hidden Markov Model, The Asia Joint Conference on Information Security (AsiaJCIS 2012), 2012
  52. Chia-Mei Chen, D. J. Guan, Q.-K. Su, and S.-T. Cheng, Detecting Suspicious URLs in Social Network Service, The 2012 IEEE International Conference on Computing and Security (ICCS), 2012
  53. Chia-Mei Chen, Y.-H. Ou, J.-J. Huang, Detecting Web Attacks Based on Domain Reputation, The 2012 IEEE International Conference on Computing and Security (ICCS), 2012
  54. Chia-Mei Chen, Detecting Anomaly Mobile Web Page through Template Classification, The 11th Emerging Information and Technology Conference (EITC 2011), 28~ 29 2011
  55. 陳嘉玫、歐雅惠、黃銘宗, 偵測具有動態網域特性的殭屍網路, 第二十一屆資訊安全會議, 2011
  56. Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, Web Botnet Detection Based on Flow Information, ICS 2010 International Computer Symposium, 16~ 18 2010
  57. 陳嘉玫、吳惠麟、王則堯, 惡意網站軟體誘捕系統, 2010資訊安全技術創新應用研討會, 2010
  58. 陳嘉玫、歐雅惠、林士棻, 行動裝置安全瀏覽網頁之機制, IMP 2010 第十六屆資訊管理暨實務研討會, 2010
  59. 陳嘉玫、洪瑞麟、林孝忠、吳惠麟, 以Linux 系統為基礎之日誌檔樣式化研究, TANET 2010 台灣網際網路研討會, 2010
  60. Chia-Mei Chen, Wan-Yi Tsai, Yung-Tsung Hou, Malicious Webpage Detection, FIRST 2009, Kyoto, Japan, 26~ 3 2009
  61. Gu-Hsin Lai, Chao-Wei Chou, Chia-Mei Chen, Ya-Hua Ou, Anti-Spam Filter Based on Data Mining and Statistical Test, 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009), Shanghai, China, 1~ 3 2009
  62. H.C. Lin, Chia-Mei Chen, J. Y. Tzeng, “Flow Based Botnet Detection”, Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009), 7~ 9 2009
  63. Chia-Mei Chen, W. Y. Tsai., H. C. Lin, Anomaly Behavior Analysis for Web Page Inspection, The First International Conference on Networks & Communications (NetCoM-2009), 27~ 29 2009
  64. 蔡育洲, 林孝忠, 陳嘉玫, “植基於Flow 資訊之網頁為基礎之殭屍網路偵測”, 全國計算機會議 (NCS 2009), 27~ 28 2009
  65. M. Wu, Chia-Mei Chen, and C. H. Wang, “CPDCF for IEEE 802,11 WLANs”, The Fourth International Conference on Communications and Networking in China (CHINACOM 2009), 2009
  66. D. J. Guan, Chia-Mei Chen, J. S. Luo, and Y. T. Hou, “Malicious Web Page Detection based on Anomaly Semantics”, The fourth Joint Workshop on Information Security (JWIS 2009), 2009
  67. D. J. Guan, Chia-Mei Chen, and J. B. Lin, “Anomaly Based Malicious URL Detection in Instant Messaging”, The fourth Joint Workshop on Information Security (JWIS 2009), 2009
  68. G. H. Lai, Chia-Mei Chen, R. Y. Tzeng, C. S. Laih, and C. Faloutsos, “Botnet Detection by Abnormal IRC Traffic Analysis”, The fourth Joint Workshop on Information Security (JWIS 2009), 2009
  69. 林士強, 陳嘉玫, 林孝忠, “在行動P2P 網路環境中的集購資訊散播率之研究”, ICIM 第20 屆國際資訊管理學術研討會─資訊科技與創新, 23 2009
  70. G. H. Lai, Chia-Mei Chen, Y. F. Chiu, C. S. Laih, and T. Chen, “A Collaborative Approach to Anti-Spam”, 20th Annual FIRST Conference, 22~ 27 2008
  71. S. T. Cheng, S. Y. Li, and Chia-Mei Chen, “Distributed Detection in Wireless Sensor Networks”, Seventh IEEE/ACIS International Conference on Computer and Information Science (ICIS 08), 14~ 16 2008
  72. Y. C. Cheng, C. S. Laih, G. H. Lai, Chia-Mei Chen, T. Chen, “Defending On-Line Web Application Security with User-Behavior Surveillance”, Third International Conference on Availability, Reliability and Security, 4~ 7 2008
  73. S. F. Lin, Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “Malicious Webpage Detection by Semantics-Aware Reasoning”, IEEE Intelligent System Design and Application (ISDA) Conference, 2008
  74. G. H. Lai, C. S. Ouyang, Chia-Mei Chen, “A Group-based Deployment for Wormhole Prevention in Sensor Networks”, The 14th International Conference on Distributed Multimedia Systems, 2008
  75. C. Y. Lee, Chia-Mei Chen, H. C. Lin, “Buffer Overflow Prevention Based on Binary Exploit Code”, International Conference on Information Management, 2008
  76. Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept”, International Conference on Network-Based Information Systems (NBiS2007), Regensburg, Germany, 3~ 7 2007
  77. G. H. Lai, Chia-Mei Chen, B. C. Jeng, “DoS Detection in Cluster-based Sensor Networks”, IASTED International Conference on Communication,Network and Information Security (CNIS 2007), Berkeley, USA, 24~ 26 2007
  78. Y. T. Hou, Chia-Mei Chen, B. C. Jeng, “Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks”, IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), 26~ 28 2007
  79. W. Y. Lai, Chia-Mei Chen, B. C. Jeng, G. H. Lai, and H. C. Lin, “Information Exchange Mechanism Based on Reputation in Mobile P2P Networks”, IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), 26~ 28 2007
  80. Chia-Mei Chen, B. C. Jeng, G. H. Lai, C. L. Wang, “Adaptive Clustering for Sensor Network” , International Conference in IT and Application (ICITA) sponsored by IEEE NSW Section, Harbin, China, 15~ 18 2007
  81. Y. F. Chiu, Chia-Mei Chen, B. C. Jeng, and H. C. Lin, “An Alliance-based Anti-Spam Approach”, International Conference on Natural Computation, Haikou, China, 2007
  82. Y. T. Hou, Chia-Mei Chen and B. C. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept”, Lecture Notes in Computer Science, 2007
  83. 李常友、陳嘉玫、鄭炳強、趙善中、林孝忠, 「以關聯規則法分析攻擊探測程式之緩衝區溢位防治研究」, TANET 2007, 2007
  84. 林士棻、陳嘉玫、鄭炳強, 「以模式基礎推論用於偵測惡意動態網頁之研究」, Information Security Conference (ISC 2007), 2007
  85. 陳嘉玫、侯雍聰, 「Linux 開放架構下數位生活家用網路安全之嵌入式平台開發」, 2007 開放原始碼技術與應用研討會, 2007
  86. Y. T. Hou, T. C. Lee, Chia-Mei Chen, and B. C. Jeng, “Node Placement for Optimal Coverage in Sensor Networks”, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 5~ 7 2006
  87. Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach”, European Workshop on Evolutionary Computation in Communication Networks and Connected Systems (EvoCOMNET) 2006, Budapest, Hungary, 10~ 12 2006
  88. Y. T. Hou, T. C. Lee, B. C. Jeng, and Chia-Mei Chen, “Optimal Coverage Deployment for Wireless Sensor Networks”, International Conference on Advanced Communication Technology co-sponsored by IEEE Communications Society, Phoenix Park, Korea, 20~ 22 2006
  89. Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach”, Lecture Notes in Computer Science:Applications of Evolutionary Computing, 2006
  90. S. T. Cheng, C. Y. Wang, and Chia-Mei Chen, “An Adaptive Data Broadcasting for Wireless Access” , the IASTED International Conference on Wireless Network and Emerging Technologies , Banff, Canada, 2006
  91. 邱郁芬、林孝忠、陳嘉玫, 「以區域聯防為基礎之垃圾郵件防治研究」, 2006 數位教學暨資訊實務研討會, 2006
  92. Y. L. Chen, Chia-Mei Chen, and C. Ravishankar, “A Lightweight Network Intrusion Detection”, 2005 International Forensic Science Symposium (IFSS), 2005
  93. Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin, “Localization on Network Auditing System”, 2005 International Forensic Science Symposium (IFSS), 2005
  94. Chia-Mei Chen, S.-P. We, and J. S. Cheng, “Effective Network Monitor Based on Flow Traffic”, FIRST Computer Security Incident Handling Conference, Singapore, 2005
  95. 曾漠益、 賴谷鑫、 陳嘉玫、 鄭炳強, 「以約略集合理論為基礎之垃圾郵件過濾研究」, 第十一屆資訊管理暨實務研討會 (IMP), 2005
  96. 曾仲強、 賴谷鑫、 陳嘉玫、 鄭炳強, 「以支援向量機為基礎之後門程式入侵偵測」, 第十屆人工智慧與應用研討會 (TAAI), 2005
  97. 陳雅玲、陳嘉玫、 鄭炳強, 「LINIDS:輕型網路入侵偵測系統」, 第十六屆國際資訊管理學術研討會 (ICIM), 2005
  98. 陳嘉玫、楊鴻鈞、賴谷鑫, 「滿足服務品質需求之資源管理研究」, 第十六屆國際資訊管理學術研討會 (ICIM), 2005
  99. 陳嘉玫、賴谷鑫、羅哲峰, 「客戶需求傳輸之動態資源管理研究」, 資通技術管理與應用研討會 (SAICT), 2005
  100. 邱郁芬、 賴谷鑫、 陳嘉玫、 鄭炳強, 「以區域聯防為基礎之垃圾郵件防治研究」, 「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會, 2005
  101. 陳嘉玫、魏川弼, 「大型網路上的網路監控」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2004
  102. 陳嘉玫、王辭寒, 「遠端攻擊入侵偵測」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2004
  103. 賴昆宜、陳嘉玫, 「弱點掃描之區域化研究」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2004
  104. 鄭進興、陳威安、陳嘉玫、林敬皇, 「DNSSEC 安全機制實作研究」, TANET 2004, 2004
  105. Chia-Mei Chen, Analysis and Trend of Security Crime in Taiwan, Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT), 2004
  106. H. M. Sun, Chia-Mei Chen, L. C. Shu, “Optimizing multimedia delivery over bandwidth limited networks”, The 13th International Conference on Pacific Rim Management, Association for Chinese Management Educators (ACME 2003), 2003
  107. 陳嘉玫、吳啟常、鄭進興、陳年興, 「Code Automation for Vulnerability Scanner」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2003
  108. 陳嘉玫、鄭偉成、鄭進興、陳年興, 「Intrusion Detection on Distribution Attacks」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2003
  109. 鄭進興、沈志昌、古東明、陳嘉玫, 「DNS 網域安全稽核防護系統之建置」, TANET 2003, 2003
  110. H. M. Sun, Chia-Mei Chen, L. C. Shu, “Real-Time Scheduling for Multimedia Streams Over Resource-Constrained Networks”, The 8th International Conference on Real-Time Computing Systems and Applications (RTCSA), Tokyo, Japan, 2002
  111. S. T Cheng, J. P. Liu, J. L. Kao, and C. M. Chen, “A New Framework for Mobile Web Services”, Symposium on Applications and the Internet (SAINT), Nara, Japan, 2002
  112. 鄭進興、林柏宇、陳嘉玫、陳年興, 「DNS 安全檢測系統」, TANET 2002, 2002
  113. 陳嘉玫、鄭進興等, 「校園網路安全性之評估」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2001
  114. H. M. Sun, Chia-Mei Chen, L. C. Shu, “Real-Time Multimedia Delivery Over Wireless Networks”, The 7th International Conference on Distributed Multimedia System (DMS), 2001
  115. S. T. Cheng and Chia-Mei Chen, “Security in Personal Area Networks”, The 13th Annual FIRST Computer Security Incident Handling Conference, Toulouse, France, 2001
  116. 黃世昆、陳嘉玫、陳年興、賴冠州, 「政府網路安全性之評估」, 第十一屆全國資訊安全會議, 台灣, 2001
  117. S. K. Huang, N. S. Chen, Chia-Mei Chen, and B. J. Lin, “Survival Acceptability Evaluation and Incident Case Report in Taiwan”, The 12th Annual FIRST Computer Security Incident Handling Conference, Chicago, 2000
  118. 林秉忠、陳嘉玫、陳年興、黃世昆, 「台灣網路安全性之評估」, 第十屆全國資訊安全會議, 台灣, 2000
  119. 張平河、陳嘉玫、王貴英, 「大型企業分散式資訊系統之安全管理」, 第十屆國際資訊管理學識研討會, 1999
  120. Chia-Mei Chen and S. T. Cheng, "A Simple Web-Based Single Sign-On Solution", The National Information Security Conference, Taiwan, 1998
  121. Chia-Mei Chen , S. T. Cheng, and Y. C. Lee, "Secure Bank Account Purchasing in the Web", The National Information Security Conference, Taiwan, 1998
  122. "Sheng-Tzong Cheng,Chia-Mei Chen,and Jing-Wen Hwang", Low-Power Design for Real-Time Systems, "Proc,of the 1st International Conference on Information,Communications & Signal Processing (ICICS'97)", Signapore, 1997
  123. "Shyh-In Hwang,Chia-Mei Chen,and Ashok K. Agrawala", Scheduling an Overloaded Real-Time System, Procs of the IEEE International Phoenix Conference on Computers and Communications, Arizona, ~ 1996
  124. Chia-Mei Chen and Satish K. Tripathi, An Analytical Model for the Reliability of Real-Time Systems, "Procs. of the International Association of Science and Technology for Development (IASTED) International Conference on Applied Modelling,Simulation and Optimization", 1995
  125. "Chia-Mei Chen,and Satish K. Tripathi", Fault-Tolerance Scheduling in Real-Time Systems, Procs. of the International Society for Computers and Their Applications (ISCA) International Conference on Computer Applications in Industry and Engineering, 1995
  126. "Chia-Mei Chen,Satish K. Tripathi,and S. Cheng", A Fault-Tolerance Model for Real-Time Systems, Procs. of the 1994 IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, 1994
  127. "Chia-Mei Chen,Satish K. Tripathi,and Alex Blackmore", A Resource Synchronization Protocol for Multiprocessor Real-Time Systems, Procs. of the 1994 International Conference on Parallel Processing, 1994
  128. Chia-Mei Chen and Satish K. Tripathi, An Optimistic Concurrency Control Algorithm in Real-Time Database Systems, Procc. of the ISCA International Conference on Parallel and Distributed Computing, 1993

專書

  1. 吳惠麟、 陳嘉玫 , 網路安全概論與實務:開源碼架構之網路安全防禦解密, 碁峰, 2014
  2. Chia-Mei Chen, J. J. Huang, Y. H Ou, Detecting Web Attacks Based on Domain, Lecture Notes in Computer Science, 2013 (Vol.8039, pp. 97-106)
  3. Chia-Mei Chen, M. Z. Huang, and Y. H. Ou, Detecting Web-Based Botnets with Fast-flux Domains, Advances in Intelligent Systems and Applications - Volume 2 , 2013 (Vol. 21, pp. 79-89)
  4. Y. T. Hou, Chia-Mei Chen, B. C. Jeng, A Key Predistribution Scheme for Wireless Sensor Network Using the Small-World Concept, Lecture Notes in Computer Science (LNCS), 2007 (4658, 137-146)
  5. 陳嘉玫, 電子商務理論與實務,梁定彭主編,第四章網路安全, 華泰文化, 2002 (二版)
  6. 陳嘉玫, 電子商務理論與實務,梁定彭主編,第四章網路安全, 華泰文化, 2000 (初版)

研究報告

  1. Chia-Mei Chen, 〝Scheduling Issues in Real-Time Systems〞, Department of Computer Science, University of Maryland, technical report, 1995 (CS-TR-3493, UMIACS-TR-9583)
  2. Chia-Mei Chen, N. Roussopoulos, 〝Evaluation of Transferring Files Through RPC, TCP Approaches〞, Department of Computer Science, University of Maryland, technical report, 1991 (CS-TR-779)
  3. Chia-Mei Chen, Satish K. Tripathi, 〝Multiprocessor Priority Ceiling-Based Protocols〞, Department of Computer Science, University of Maryland, technical report(CS-TR-3253)

其他文章

  1. 陳嘉玫, 漫談網路安全之社交工程, 刊登於科學發展月刊, 2010
  2. 陳嘉玫, 網路安全, 刊登於電子商務理論與實務, 梁定彭所著, 華泰出版社, 2000

國科會計畫

  1. 基於Hadoop平台之APT攻擊大數據分析研究
    -計劃編號105-2221-E-261 -003 -MY2, 共同主持人, 2016-8-1-2018-8-31
  2. 資安監控與管理技術開發--資安監控與管理技術開發(1/3)
    -計劃編號106-3114-E-006 -003 -, 共同主持人, 2017-6-1-2018-5-31
  3. 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究--雲端環境中持續且目標性攻擊偵測之研究
    -計劃編號103-2221-E-110 -049 -MY3, 主持人, 2014-8-1-2017-7-31
  4. 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究
    -計劃編號MOST 103-2221-E-110 -049 -MY3
    -科技部委托, 主持人, 2014-8-1-2017-7-31
  5. 網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究
    -計劃編號NSC 100-2218-E-110 -004 -MY3, 主持人, 2011-8-1-2014-7-31
  6. 網路威脅搜捕、態樣分析、追蹤與過濾技術研究-總計畫
    -計劃編號NSC100-2218-E-006-028-MY3, 共同主持人, 2011-8-1-2014-7-31
  7. 雲端資安監控平台之研發-子計畫三:安全的上網環境之研究
    -計劃編號NSC100-2218-E-110-011, 主持人, 2011-10-1-2012-7-31
  8. 雲端資安監控平台之研發-總計畫
    -計劃編號NSC100-2218-E-110-009, 共同主持人, 2011-10-1-2012-7-31
  9. 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用(III)
    -計劃編號NSC100-2219-E-006-001, 共同主持人, 2011-1-1-2012-4-30
  10. 府城柑仔店(3/3)
    -計劃編號NSC100-2218-E-006-004, 共同主持人, 2011-11-1-2012-10-31
  11. 府城柑仔店(2/3)
    -計劃編號NSC99-2218-E-006-009, 共同主持人, 2010-11-1-2012-1-31
  12. 有主動防禦機制的誘捕系統研究(開放軟體元件開發分項)
    -計劃編號NSC99-2220-E-110-002, 主持人, 2010-8-1-2011-8-31
  13. 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用(Ⅱ)
    -計劃編號NSE99-2219-E-006-011, 共同主持人, 2010-1-1-2011-1-31
  14. 網宇實體系統 (Cyber-Physical Systems) 之創新資安技術研發
    -計劃編號NSC98-2218-E-006-250, 共同主持人, 2009-10-1-2010-7-31
  15. 網路威脅搜捕分析與追蹤技術研究-子計畫一:分散式網路威脅搜捕技術研究
    -計劃編號NSC98-2218-E-110-007, 主持人, 2009-10-1-2010-7-31
  16. 網路威脅搜捕分析與追蹤技術研究-總計畫
    -計劃編號NSC98-2218-E-006-252, 共同主持人, 2009-10-1-2010-7-31
  17. 智慧行動裝置瀏覽網頁之安全機制(開放軟體元件開發分項)
    -計劃編號NSC98-2220-E-110-011, 主持人, 2009-8-1-2010-7-31
  18. 府城柑仔店(1/3)
    -計劃編號NSC98-2218-E-006-257, 共同主持人, 2009-11-1-2010-11-30
  19. 府城柑仔店(1/3)
    -計劃編號NSC98-2218-E-006-257, 共同主持人, 2009-11-1-2010-11-30
  20. 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用
    -計劃編號NSC98-2219-E-006-001, 共同主持人, 2009-1-1-2010-1-31
  21. 智慧型數位生活空間之無線感測網路技術之研究(3/3)
    -計劃編號NSC97-2218-E-006-003, 共同主持人, 2008-11-1-2009-10-31
  22. 結合資料探勘與統計檢定之垃圾郵件過濾器之研究(自由軟體產業關鍵技術開發分項)
    -計劃編號NSC97-2218-E-110-004, 主持人, 2008-8-1-2009-10-31
  23. 智慧家庭監控系統之研究(自由軟體產業關鍵技術開發分項)
    -計劃編號NSC96-2218-E-110-005, 主持人, 2007-8-1-2008-7-31
  24. 資通安全人才培育計畫-子計畫三:資通安全人才培育-國立成功大學資通安全研究與教學中心
    -計劃編號NSC97-2219-E-006-003, 共同主持人, 2008-5-1-2008-12-31
  25. 智慧型數位生活空間之無線感測網路技術之研究(2/3)
    -計劃編號NSC96-2218-E-006-008, 共同主持人, 2007-11-1-2008-10-31
  26. 無線感測網路之覆蓋研究
    -計劃編號NSC95-2221-E-110-083, 主持人, 2006-8-1-2007-7-31
  27. 智慧型數位生活空間之無線感測網路技術之研究(1/3)
    -計劃編號NSC95-2218-E-006-055, 共同主持人, 2006-1-1-2007-10-31
  28. Linux開放架構下數位生活家用網路安全之嵌入式平台開發
    -計劃編號NSC95-3113-P-110-001, 主持人, 2006-2-1-2007-1-31
  29. 以螞蟻演算法為基礎之來源追蹤之研究
    -計劃編號NSC94-2213-E-110-049, 主持人, 2005-8-1-2006-7-31
  30. 以使用者行為特徵為基礎之安全機制
    -計劃編號NSC93-2213-E-110-045, 主持人, 2004-8-1-2005-7-31
  31. 位置衍生之服務與應用技術-子計劃二:位置認知下資訊安全機制與服務(I)
    -計劃編號NSC91-2219-E-110-002, 主持人, 2002-8-1-2003-7-31
  32. 位置衍生之服務與應用技術-總計劃(I)
    -計劃編號NSC91-2219-E-006-010-, 共同主持人, 2002-8-1-2003-7-31
  33. 無線網路遊戲平台與魔法卡交易遊戲之研究開發
    -計劃編號NSC91-2622-E-110-014-CC3, 主持人, 2002-12-1-2003-11-30
  34. 虛擬攻防系統之建置, 主持人, 2001-08-01-2002-07-31
  35. 行動非同步傳輸模式網路之行動與資源管理研究, 主持人, 2000-08-01-2001-07-31
  36. 台灣電子商務發展之研究—電子商務之資訊安全管理研究(II), 主持人, 1999-08-01-2000-07-31

其他委託計畫

  1. TACERT臺灣學術網路危機處理中心營運計畫
    -教育部委托, 主持人, 2012-1-1-2012-11-30
  2. TACERT台灣學術網路危機處理中心營運計畫
    -教育部委托, 主持人, 2010-6-1-2011-2-28
  3. TACERT臺灣學術網路危機處理中心營運計畫
    -教育部委托, 主持人, 2011-3-1-2011-12-31
  4. 教育機構資安通報應變暨資安人才培訓計畫
    -教育部委托, 主持人, 2009-6-1-2010-5-31
  5. Design Profiling and Security Enhancement in Cloud Computing Environment for TSMC Open Innovation Platform
    -TSMC 台機電, 共同主持人, 2010-2-1-2010-12-31
  6. 3G行動通訊系統之資訊安全監控與管理
    -台灣大哥大委托, 主持人, 2007-2-1-2008-4-30
  7. 網路安全檢測服務
    -宏瞻資訊科技股份有限公司委托, 協同主持人, 2005-2-1-2006-1-31
  8. 大專生參與專題研究計畫(劉威成)
    -計劃編號行政院國家科學委員會, 主持人, 2004-7-1-2005-2-28
  9. DNS安全檢測及事件紀錄分析機制實做研究
    -TWNIC委托, 主持人, 2004-6-1-2005-2-16
  10. 資通安全區域聯防計畫
    -資策會委托, 協同主持人, 2005-7-1-2005-12-31
  11. DNS Security資源網站建置維護暨DNSSEC之研究
    -TWNIC委托, 主持人, 2003-8-23-2004-5-22
  12. DNS伺服器安全檢測與防護體系之建置與運作
    -TWNIC委托, 主持人, 2002-8-1-2003-8-30
  13. 國家寬頻實驗網路(NBEN)網路安全建置與實驗計畫
    -計劃編號NSC, 協同主持人, 2003-3-1-2003-12-31
  14. 建置與運作資安區域聯防機制
    -計劃編號資策會, 協同主持人, 2002-5-1-2003-12-31
  15. 資安區域聯防機制之運作
    -計劃編號資策會, 協同主持人, 2003-5-1-2003-11-30
  16. 駭客入侵防護研究
    -計劃編號資策會, 協同主持人, 2003-5-1-2003-11-30
  17. 研發網路入侵偵測技術並提供系統弱點及解決方案
    -資策會委托, 協同主持人, 2001-9-1-2001-12-31
  18. 微軟網路安全研究計劃
    -台灣微軟股份有限公司委托, 協同主持人, 2001-7-1-2001-12-31
  19. 大規模網路安全檢查系統之研究
    -國推會委托, 協同主持人, 2001-1-1-2001-12-31
  20. 台灣電腦網路危機處理中心90年度工作
    -電信總局委托, 協同主持人, 2001-1-1-2001-12-31

資管系課程

學年度課程名稱學分
106作業系統3
105作業系統3
104作業系統3
103作業系統3
102管理資訊系統專案(二)3
作業系統3
101管理資訊系統專案(一)3
作業系統3
100作業系統3
99作業系統3
98作業系統3
97作業系統3
資料結構3
96企業資料通訊3
作業系統3
資料結構3
95電子商務專案(二)3
作業系統3
資料結構3
94電子商務專案(一)3
作業系統3
資料結構3
93電子商務專案(二)3
92電子商務專案(一)3
作業系統3
電子商務專案(二)3
91電子商務專案(一)3
作業系統3
電子商務專案(二)3
90電子商務專案(一)3
作業系統3
電子商務專案(二)3
89電子商務專案(一)3
作業系統3
電子商務專案(二)3
88電子商務專案(一)3
電子商務專案(二)3
資料結構3
87電子商務專案(一)3
電子商務專案(二)3
資料結構3
86網路安全3
商業資訊系統設計3
85資料庫管理3
C與UNIX程式設計3

資管碩課程

學年度課程名稱學分
106電腦網路專題3
雲端運算導論3
網路安全3
105網路安全3
電腦網路專題3
資訊科技研究3
雲端運算導論3
104網路安全3
資訊科技研究3
雲端運算導論3
103網路安全3
資訊科技研究3
雲端運算導論3
102雲端運算導論3
電腦網路專題3
網路安全3
資訊科技研究3
101電腦網路專題3
網路安全3
資訊科技研究3
無線網路與服務創新---行動網際網路電視3
100資訊科技研究3
電腦網路3
無線網路與服務創新---行動網際網路電視3
網路安全3
99資訊科技研究3
電腦網路3
網路安全3
無線網路與服務創新---行動網際網路電視3
無線網路與服務創新---行動網際網路電視3
98無線網路與服務創新---行動網際網路電視3
網路安全3
資訊科技研究1
電腦網路3
97資訊科技研究3
電腦網路3
網路安全3
96電腦網路專題3
網路安全3
資訊科技研究3
95電腦網路專題3
網路安全3
94網路安全3
電腦網路專題3
92資訊科技研究3
網路安全3
電腦網路專題3
計算機網路專題3
91網路安全3
電腦網路專題3
無線網路3
90網路安全3
電腦網路專題3
無線網路3
89網路安全3
電腦網路專題3
無線網路3
88電腦網路專題3
網路安全3
資訊科技研究3
87網路安全3
86分散式系統專題3
網路安全3
85網路安全3

資管博課程

學年度課程名稱學分
106高等資管專題研討(二)1
高等資管專題研討(四)1
雲端運算導論(併)3
網路安全(併)3
105雲端運算導論(併)3
資訊科技研究(併)3
網路安全(併)3
98網路安全3
97網路安全3
資訊科技研究3
96資訊科技研究3
網路安全3
95網路安全3
92計算機網路專題3
網路安全3
91網路安全3

資管碩專課程

學年度課程名稱學分
106雲端運算導論(併)3
電腦網路專題(併)3
網路安全(併)3
105雲端運算導論(併)3
資訊科技研究(合授)(併)3
電腦網路專題(併)3
網路安全(併)3
104書報討論(一)(合授)3
雲端運算導論(併)3
資訊科技研究(合授)(併)3
網路安全(併)3
103雲端運算導論3
資訊科技研究(合授)(併)3
網路安全(併)3
102資訊科技研究3
網路安全3
電腦網路專題3
98網路安全3
97網路安全3
資訊科技研究3
96網路安全3
94書報討論(一)3
89書報討論(二)3

資管專班課程

學年度課程名稱學分
88資料結構3

夜資管課程

學年度課程名稱學分
87企業資料通訊3
電子商務專案(二)3
電子商務專案(一)3
86企業資料通訊3
電子商務專案(一)3
85資料結構3