Office
管(CM) 4050
Phone
07-5252000 #4726
E-Mail
cmchen (AT) mis.nsysu.edu.tw
Homepage
https://cmchen.mis.nsysu.edu.tw/
Research Interests
1.Network Security
2.Intrusion Detection
3.Machine Learning
4.Text Mining

Education
- B.A. of Computer Engineering, National Chiao-Tung University, 1984/06
- M.S. of Computer Engineering, National Chiao-Tung University, 1986/06
- M.S. of Computer Science, University of Maryland, College Park, 1991/12
- Ph.D. of Computer Science, University of Maryland, College Park,, 1995/05
Experiences
- Chairman, 2013/08-2016/07
- Professor, 2004/2 - present
- Associate Professor, 1996/08-2004/01
- Vice President, Global Information Network Research Division, Citi Corp., 1995/02-1996/07
- Associate Engineer, Neotech Inc. 1986/06-1989/07
Journal Articles
- Chia-Mei Chen, G. H. Lai, J. Lin, Detection of C&C Servers Based on Swarm Intelligence Approach, Journal of Computers, Vol.29, 2018
- Chia-Mei Chen, Wen-Ling Lo, Ya-Hui Ou, Gu-Hsin Lai, Network Anomaly Detection Based on Artificial Intelligence, IWSEC, 2018
- Chia-Mei Chen, Wen-Ling Lo, Ya-Hui Ou, Gu-Hsin Lai, Tse-Yao Wang, Application of Revised Ant Colony Optimization for Anomaly Detection Systems, IJCEE, 2018
- 陳嘉玫、賴谷鑫、張育涵, 雲端開放資料分析運算平台之研究-以資訊安全紀錄檔分析為例, 電子商務研究, 2017
- TienHo Chang, Chia-Mei Chen, Hanwei Hsiao, and Gu-Hsin Lai, Cracking of WPA & WPA2 Using GPUs and Rule-based Method, Intelligent automation & Soft Computing, 2017
- 王士豪、陳嘉玫, QR Code智慧型藥袋藥物影音查詢系統, 管理資訊計算, 2015
- Chia-Mei Chen, G. H. Lai, Research on Classification of Malware Source Code, Journal of Shanghai Jiaotong University, 2014
- 陳嘉玫、黃哲諄、歐雅惠, 以信譽機制為基礎之巨量資料偵測可疑網址, 資訊安全通訊, 2014
- 陳嘉玫、江玟璟、歐雅惠, 開放資料應用於行動惡意程式分析研究, 電子商務研究期刊, 2014
- Chia-Mei Chen, M. Z. Huang, Y. H. Ou, Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain, Journal of Information Hiding and Multimedia Signal Processing(JIHMSP), 2014 (EI)
- Chia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou, Detection Suspicious URL Filtering Based on Reputation, Journal of Information Security and Applications, 2014
- Chia-Mei Chen, S. T. Cheng, and J. H. Chou, Detection of Fast-Flux Domains, Journal of Advances in Computer Networks (JACN), Vol.1, No.2, 2013, pp.148-152
- Chia-Mei Chen, S.-T. Cheng, and R-Y. Zeng, A Proactive Approach to Intrusion Detection and Malware Collection, Security and Communication Networks, Vol.6, 2013, pp.844-853 (SCI)
- 陳嘉玫、楊佳蕙、賴谷鑫, 基於結構相似度之惡意程式原始碼分類研究, 電子商務學報, 2013
- 官大智、陳嘉玫、林家賓、王則堯, 以異常為基礎之即時通訊惡意網址偵測, 資訊管理學報, Vol.19, No.3, 2012, pp.567-589 (國科會100-2218-E-110-011)
- 陳嘉玫、官大智、陳怡綾, 以行為為基礎偵測異常IRC 流量, 資訊安全通訊 (Communications of the CCISA), Vol.18, No.3, 2012
- 侯雍聰、陳嘉玫, 以異常行為為基礎之即時惡意網頁偵測之研究, TSSCI, Vol.13, No.1, 2011, pp.117-134
- G. H. Lai, C. S. Ouyang, Chia-Mei Chen,, A Group-based Deployment for Wormhole Prevention in Sensor Networks, Journal of Information Science and Engineering, Vol.27, 2011, pp.79-93 (SCI)
- Y. Hou, Y. Chang, T. Chen, C. Laih, and Chia-Mei Chen, Malicious Web Content Detection by Machine Learning, Expert Systems with Applications, Vol.37, No.1, 2010, pp.55-60 (SCI)
- Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks, Wireless Networks, Vol.14, No.4, 2010, pp.1033-1043 (SCI)
- Chia-Mei Chen, Y. L. Chen, H. C. Lin,, An efficient network intrusion detection, Computer Communicatons, Vol.33, No.4, 2010, pp.477-484 (SCIE)
- J. L. Liu, C. W. Chou, and Chia-Mei Chen, Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm, International Journal Business Intelligence and Data Mining, Vol.5, No.1, 2010
- Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks, Wireless Networks, 2009 (SCI)
- Chia-Mei Chen, Y. L. Chen, and H. C. Lin, An efficient network intrusion detection, Computer Communications, 2009 (SCI)
- J. L. Liu, C. W. Chou, and Chia-Mei Chen, Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm, accepted by Int. J. Business Intelligence and Data Mining, 2009
- J. L. Liu and Chia-Mei Chen, Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization Design, Engineering Optimization, Vol.42, No.2, 2009 (SCI)
- G. H. Lai, C. W. Chou, Chia-Mei Chen, and Ya-Hua Ou, Anti-Spam Filter Based on Data Mining and Statistical Test, Studies in Computational Intelligence, Vol.208, 2009
- 賴谷鑫,周照偉,陳嘉玫, 結合資料探勘與統計檢定之垃圾郵件過濾器之研究, Accepted by 電子商務學報, 2009, pp.773-791 (TSSCI)
- G. H. Lai, Chia-Mei Chen, C. S. Laih, and T. Chen, A Collaborative Anti-Spam System, Expert Systems with Applications, Vol.44, No.1, 2008 (SCI)
- G. H. Lai and Chia-Mei Chen, Detecting Denial of Service Attacks in Sensor Networks, Journal of Computers, Vol.18, No.4, 2008
- Chia-Mei Chen and C. P. Wei, Efficient Network Monitoring for Large Networks, Journal of Computers, Vol.18, No.4, 2008
- Chia-Mei Chen, B. C. Jeng, G. H. Lai, W Chao, Ant-Based IP Traceback, Expert Systems with Applications, Vol.36, No.3, 2007 (SCI)
- H. C. Wang, B. C. Jeng, and Chia-Mei Chen, Structural Testing Using a Memetic Algorithm, Journal of Software Engineering Studies, 2007
- H. M. Sun, Chia-Mei Chen, and L. C. Shu, Object-based Multimedia Scheduling Based on Bipartite Graphs, IEICE Transaction on Communication, Vol.E88-B, No.1, 2005 (SCI)
- Chia-Mei Chen, H. M. Sun, L. C. Shu, Optimizing Object-based Multimedia Delivery Across Bandwidth Constrained Networks, Computer Journal, Vol.47, No.5, 2004
- S-T Cheng, C. Chen, C. Li, and Chia-Mei Chen, Network topology management in a mobile-switch ATM network: dynamic partition algorithms, International Journal of Network Management, Vol.12, No.2, 2002, pp.99-115 (EI, Engineering Index)
- Sheng-Tzong Cheng, Chia-Mei Chen, and H. T. Liu, Dynamic Round-based Resource Management for On-Demand Multimedia Servers, computer Journal, Vol.43, No.5, 2000, pp.386-395 (SCI)
- Sheng-Tzong Cheng, Chia-Mei Chen, and S. K. Tripathi, A Fault-Tolerant Model for Real-Time Systems, Journal of Computer and Systems Sciences, Vol.61, No.3, 2000, pp.457-477 (SCI)
- "3. Sheng-Tzong Cheng, Chia-Mei Chen, and Cheng-Jeng Peng", Topological Network Design subject to 1-Fault Tolerance, accepted by IJCA International Journal of Computers and Their Applications, 1999
- S. Cheng, Chia-Mei Chen, and S. K. Tripathi, Priority-Based Synchronization Protocols for Real-Time Multiprocessor Systems, submitted to the Journal of Parallel and Distributed Computing, 1999
- Sheng-Tzong Cheng, Chia-Mei Chen, and Jing-Wen Hwang, Low Power Design for Real-Time Systems, Real-Time Systems, 1998 (SCI)
- Sheng-Tzong Cheng and Chia-Mei Chen, Temporal Analysis and Algorithms for Real-Time Scheduling and Allocation, IJCA International Journal of Computers and Their Applications, 1998
- Chia-Mei Chen, Shyh-In Hwang, and Satish K. Tripathi, A Performance Study of Real-Time Optimistic Concurrency Control with the Knowledge of Execution Time, ISCA International Journal of Computers and Their Applications, 1995
- Chia-Mei Chen and W. H. Tsai, Automatic Identification of Chinese Seal Imprints with Arbitrary or Partial Shapes, Computer Processing of Chinese and Oriental Languages, 1986
Conference Proceedings
- Chia-Mei Chen and Z.-X. Tsai , Integrated Digital Forensic for Cyber Attacks , International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018), 2018
- D. W. Wen, Chia-Mei Chen, Evolution of Advanced Persistent Threat (APT) Attacks and Actors, Internatinonal Computer Symposium 2018 , 2018
- Chia-Mei Chen, W. L. Lo, G. H. Lai, Y. C. Hu, Network Anomaly Detection Based on Artificial Intelligence, The Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2018
- T. H. Chang, Chia-Mei Chen, G. H. Lai, J. Lin, The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic, IEEE Dependable and Secure Computing 2018, 2018
- 李柏毅、蔡一郎、陳嘉玫, 從網路威脅情資分享探討我國關鍵資訊基礎設施防護策略, 2018第二十四屆國際資訊管理暨實務研討會, 2018
- 富榮光 陳嘉玫, 應用程式對資料庫的存取安全與防護, 臺灣網際網路研討會, 2018
- Chia-Mei Chen, Wen-Ling Lo, Ya-Hui Ou, Gu-Hsin Lai, Tse-Yao Wang, Application of Revised Ant Colony Optimization for Anomaly Detection Systems, ICCCS2018, Japan, 2018
- 陳嘉玫、莊旺川、歐雅惠、黃新智、萬樹人、黃豐締, 有效率暨公平之急診人員排班管理系統, 第17屆離島資訊技術與應用研討會(ITAOI), 2018
- 歐雅惠、陳嘉玫、王則堯 , 選擇最適過濾法則偵測目標式攻擊, 第二十八屆全國資訊安全會議(CISC 2018), 2018
- Tienho Chang, Ilsun You, Chia-Mei Chen and Han Wei Hsiao, The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs, Springer Communications in Computer and Information Science (CCIS), 2017
- Chia-Mei Chen, Gu-Hsin Lai, Tienho Chang, and Kuo Yen-Chih, Improving Alert Accuracy for Smart Vehicles, LNCS, 2017
- Chia-Mei Chen, Gu-Hsin Lai, Tienho Chang, and Kuo Yen-Chih, Improving Alert Accuracy for Smart Vehicles, SecIoE-2017 (2nd International Workshop on Security of the Internet of Everything), 2017
- 陳嘉玫,曾昭銘,陳怡靜,張明達,吳惠麟, 利用物聯網裝置漏洞之攻擊行為研究, 全國資訊安全會議 (CISC 2017), 2017
- 陳嘉玫、賴谷鑫、張天河, 偵測車載通訊網路警報真實性, 全國資訊安全會議 (CISC 2017), 2017
- 陳嘉玫,歐雅惠, 賴谷鑫, 張育涵, 運用雲端運算技術改善偵測網路攻擊之效能, 全國資訊安全會議 (CISC 2017), 2017
- Tienho Chang, Ilsun You, Chia-Mei Chen and Han Wei Hsiao, The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs, MobiSec 2016, 2016
- Tienho Chang, Chia-Mei Chen, Han Wei Hsiao and Lai Gu-Hsin, Cracking of WPA & WPA2 Using GPUs and Rule-based Method, AIMS-FSS 2016, 2016
- Chia-Mei Chen, Han Wei Hsiao and Tienho Chang , The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs , The 2016 International Symposium on Mobile Internet Security (MobiSec 2016), 2016
- Chia-Mei Chen, Gu-Hsin Lai, Detecting Command and Control Servers Using Ant Colony Optimization, The International Conference on Computer Science and Information Technology (ICCSIT 2016), 2016
- 王士豪、陳嘉玫, 漸進式惡意程式分類方法, 第二十五屆全國資訊安全會議, 2015
- 陳嘉枚、王則堯、羅文翎, 智慧型僵屍網路偵測, 第二十五屆全國資訊安全會議, 2015
- 郭振忠、歐雅惠、劉奕賢、王子夏、郭鎮穎、陳嘉玫、李忠憲、林輝堂、楊竹星, 網路威脅搜捕、分析、追蹤與過濾技術之研究, 2014Cyberspace「雲端服務應用、安全與稽核」研討會, 2015
- Chiamei Chen and Tienho Chang, The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, AsiaJCIS 2015, 2015
- 陳嘉玫、賴谷鑫、歐雅惠, IPv6 網路環境威脅以及偵測工具之研究, 第四屆網路智能與應用研討會, 2014
- 陳嘉玫、賴谷鑫、黃僑偉, 基於漸增式分群法之惡意程式自動分類研究, 第二十四屆全國資訊安全會議, 2014
- G. H. Lai and Chia-Mei Chen, An Efficient Honeypot Based Malware Classification System, ICS2014, 2014
- Chia-Mei Chen, J. M. Lin and G. H. Lai, Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code, 1st International Conference on Trustworthy Systems and Their Applications, 2014
- Chia-Mei Chen, P. Y. Yang, Y. H. Ou, H. W. Hsia, Targeted Attack Prevention at Early Stage, SMPE 2014, 2014
- 曾琳銘、林孝忠、陳嘉玫, 植基於SVM之惡意軟體分析機制, 全國計算機會議(NCS2013), 2013
- 陳嘉玫、張哲誠、歐雅惠、林俊吾、賴谷鑫, 使用隱藏馬可夫模型偵測持續性滲透攻擊之研究, 全國計算機會議(NCS2013), 台灣台中, 2013
- 陳嘉玫、林蕙君、王則堯, 惡意郵件社交工程防範作業有效性之研究, 第十九屆資訊管理暨實務研討會(IMP2013), 2013
- 陳嘉玫、江玟璟、歐雅惠, 開放資料應用於行動惡意程式分析研究, 2013 Open data 學術研討會, 2013
- 陳嘉玫、江玟璟、吳惠麟、陳怡靜、曾昭明, 基於資料外洩的行動惡意程式行為分析, 台灣網際網路研討會(TANET2013), 2013
- 陳嘉玫、李玉雲、賴谷鑫, 以螞蟻演算法為基礎之殭屍網路命令與控制伺服器朔源研究, 第23屆資訊安全會議(CISC2013), 2013
- 陳嘉玫、楊佳蕙、賴谷鑫, 惡意程式原始碼分類研究, 第二屆海峽兩岸資安研討會, 2013
- Gu-Hsin Lai, Chia-Mei Chen, Yu-Yun Le, Botnet Server Detection Using Ant Algorithm, 全國計算機會議(NCS2013), 2013
- Chia-Mei Chen, G. H. Lai, Y. Y. Le, and J. C. Fan, Botnet Threat Traceback for Open Network Environments, 第十九屆海峽兩岸訊息管理發展, 2013
- Chia-Mei Chen, H. W. Hsiao, P. Y. Yang, and Y. H. Ou, Defending Malicious Attacks in Cyber Physical Systems, Cyber-Physical Systems, Networks, and Applications (CPSNA2013), 2013
- Chia-Mei Chen, J. J. Huang, Y. H. Ou, Detecting Web Attacks Based on Domain Statistics, Pacific Asia on Intelligence and Security Informatics( PAISI2013), 中國北京, 2013
- Chia-Mei Chen, S. T. Cheng, J. H. Chou, Efficient Detection of Fast-Flux Domains, 2013 The 5th International Conference on Computer Engineering and Technology(ICCET 2013), 2013
- Chia-Mei Chen, D.J. Guan, Y. Z. Huang, and Y. H Ou, State-based Attack Detection for Cloud. International Symposium on Next-Generation Electronics (ISNE2013), 2013
- H. Lin and Chia-Mei Chen, Centralized Botnet Detection Using Network Analysis, 2013 International Conference on Electronic Engineering and Computer Science (EECS 2013), 2013
- 陳嘉玫、李玉雲、賴谷鑫, 以螞蟻演算法偵測殭屍網路之命令與控制伺服器, 2012資訊安全技術創新應用研討會, 2012
- 陳嘉玫、蔡旻螢、曾瑞瑜、陳怡靜、張明達、吳惠麟, 多功能惡意程式行為研究, 台灣網際網路研討會(TANET 2012), 2012 (國科會:100-2218-E-110-011)
- 陳嘉玫、蔡旻螢, 多節點異常警告之關聯研究, 第二十二屆資訊安全會議 (CISC 2012), 2012 (國科會:100-2218-E-110-011)
- 陳嘉玫、蕭漢威、李宗南、楊中皇、楊鵬宇, 偵測聯合攻擊之研究, 第二十三屆國際資訊管理學術研討會 (ICIM 2012), 2012 (國科會:100-2218-E-110-011)
- 陳嘉玫、王則堯、蔡閎亘, 簡潔化惡意軟體行為分析, 第二十三屆國際資訊管理學術研討會 (ICIM 2012), 2012 (國科會:100-2218-E-100-004-MY3)
- Chia-Mei Chen, M. Z. Huang, Y. H. Ou, Detecting Web-Based Botnets with Fast-flux Domains, International Computer Symposium (ICS2012), Taiwan, 2012
- Chia-Mei Chen, S. T. Cheng, J. H. Chou, Y. H. Ou, Formulistic detection of Malicious Fast-Flux Domains, IEEE International Symposium on Parallel Architectures, Algorithms and Programming (PAAP 2012), 2012
- Chia-Mei Chen, D. J. Guan, Y. Z. Huang, and Y. H. Ou, Attack Sequence Detection in Cloud Using Hidden Markov Model, The Asia JointConference on Information Security(AsiaJCIS 2012), 日本東京, 2012
- Chia-Mei Chen, D. J. Guan, Y.-Z. Huang, and Y.-H. Ou, Attack Sequence Detection in Cloud Using Hidden Markov Model, The Asia Joint Conference on Information Security (AsiaJCIS 2012), 2012
- Chia-Mei Chen, D. J. Guan, Q.-K. Su, and S.-T. Cheng, Detecting Suspicious URLs in Social Network Service, The 2012 IEEE International Conference on Computing and Security (ICCS), 2012
- Chia-Mei Chen, Y.-H. Ou, J.-J. Huang, Detecting Web Attacks Based on Domain Reputation, The 2012 IEEE International Conference on Computing and Security (ICCS), 2012
- Chia-Mei Chen, Detecting Anomaly Mobile Web Page through Template Classification, The 11th Emerging Information and Technology Conference (EITC 2011), 28~ 29 2011
- 陳嘉玫、歐雅惠、黃銘宗, 偵測具有動態網域特性的殭屍網路, 第二十一屆資訊安全會議, 2011
- Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, Web Botnet Detection Based on Flow Information, ICS 2010 International Computer Symposium, 16~ 18 2010
- 陳嘉玫、吳惠麟、王則堯, 惡意網站軟體誘捕系統, 2010資訊安全技術創新應用研討會, 2010
- 陳嘉玫、歐雅惠、林士棻, 行動裝置安全瀏覽網頁之機制, IMP 2010 第十六屆資訊管理暨實務研討會, 2010
- 陳嘉玫、洪瑞麟、林孝忠、吳惠麟, 以Linux 系統為基礎之日誌檔樣式化研究, TANET 2010 台灣網際網路研討會, 2010
- Chia-Mei Chen, Wan-Yi Tsai, Yung-Tsung Hou, Malicious Webpage Detection, FIRST 2009, Kyoto, Japan, 26~ 3 2009
- Gu-Hsin Lai, Chao-Wei Chou, Chia-Mei Chen, Ya-Hua Ou, Anti-Spam Filter Based on Data Mining and Statistical Test, 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009), Shanghai, China, 1~ 3 2009
- H.C. Lin, Chia-Mei Chen, J. Y. Tzeng, “Flow Based Botnet Detection”, Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009), 7~ 9 2009
- Chia-Mei Chen, W. Y. Tsai., H. C. Lin, Anomaly Behavior Analysis for Web Page Inspection, The First International Conference on Networks & Communications (NetCoM-2009), 27~ 29 2009
- 蔡育洲, 林孝忠, 陳嘉玫, “植基於Flow 資訊之網頁為基礎之殭屍網路偵測”, 全國計算機會議 (NCS 2009), 27~ 28 2009
- M. Wu, Chia-Mei Chen, and C. H. Wang, “CPDCF for IEEE 802,11 WLANs”, The Fourth International Conference on Communications and Networking in China (CHINACOM 2009), 2009
- D. J. Guan, Chia-Mei Chen, J. S. Luo, and Y. T. Hou, “Malicious Web Page Detection based on Anomaly Semantics”, The fourth Joint Workshop on Information Security (JWIS 2009), 2009
- D. J. Guan, Chia-Mei Chen, and J. B. Lin, “Anomaly Based Malicious URL Detection in Instant Messaging”, The fourth Joint Workshop on Information Security (JWIS 2009), 2009
- G. H. Lai, Chia-Mei Chen, R. Y. Tzeng, C. S. Laih, and C. Faloutsos, “Botnet Detection by Abnormal IRC Traffic Analysis”, The fourth Joint Workshop on Information Security (JWIS 2009), 2009
- 林士強, 陳嘉玫, 林孝忠, “在行動P2P 網路環境中的集購資訊散播率之研究”, ICIM 第20 屆國際資訊管理學術研討會─資訊科技與創新, 23 2009
- G. H. Lai, Chia-Mei Chen, Y. F. Chiu, C. S. Laih, and T. Chen, “A Collaborative Approach to Anti-Spam”, 20th Annual FIRST Conference, 22~ 27 2008
- S. T. Cheng, S. Y. Li, and Chia-Mei Chen, “Distributed Detection in Wireless Sensor Networks”, Seventh IEEE/ACIS International Conference on Computer and Information Science (ICIS 08), 14~ 16 2008
- Y. C. Cheng, C. S. Laih, G. H. Lai, Chia-Mei Chen, T. Chen, “Defending On-Line Web Application Security with User-Behavior Surveillance”, Third International Conference on Availability, Reliability and Security, 4~ 7 2008
- S. F. Lin, Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “Malicious Webpage Detection by Semantics-Aware Reasoning”, IEEE Intelligent System Design and Application (ISDA) Conference, 2008
- G. H. Lai, C. S. Ouyang, Chia-Mei Chen, “A Group-based Deployment for Wormhole Prevention in Sensor Networks”, The 14th International Conference on Distributed Multimedia Systems, 2008
- C. Y. Lee, Chia-Mei Chen, H. C. Lin, “Buffer Overflow Prevention Based on Binary Exploit Code”, International Conference on Information Management, 2008
- Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept”, International Conference on Network-Based Information Systems (NBiS2007), Regensburg, Germany, 3~ 7 2007
- G. H. Lai, Chia-Mei Chen, B. C. Jeng, “DoS Detection in Cluster-based Sensor Networks”, IASTED International Conference on Communication,Network and Information Security (CNIS 2007), Berkeley, USA, 24~ 26 2007
- Y. T. Hou, Chia-Mei Chen, B. C. Jeng, “Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks”, IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), 26~ 28 2007
- W. Y. Lai, Chia-Mei Chen, B. C. Jeng, G. H. Lai, and H. C. Lin, “Information Exchange Mechanism Based on Reputation in Mobile P2P Networks”, IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), 26~ 28 2007
- Chia-Mei Chen, B. C. Jeng, G. H. Lai, C. L. Wang, “Adaptive Clustering for Sensor Network” , International Conference in IT and Application (ICITA) sponsored by IEEE NSW Section, Harbin, China, 15~ 18 2007
- Y. F. Chiu, Chia-Mei Chen, B. C. Jeng, and H. C. Lin, “An Alliance-based Anti-Spam Approach”, International Conference on Natural Computation, Haikou, China, 2007
- Y. T. Hou, Chia-Mei Chen and B. C. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept”, Lecture Notes in Computer Science, 2007
- 李常友、陳嘉玫、鄭炳強、趙善中、林孝忠, 「以關聯規則法分析攻擊探測程式之緩衝區溢位防治研究」, TANET 2007, 2007
- 林士棻、陳嘉玫、鄭炳強, 「以模式基礎推論用於偵測惡意動態網頁之研究」, Information Security Conference (ISC 2007), 2007
- 陳嘉玫、侯雍聰, 「Linux 開放架構下數位生活家用網路安全之嵌入式平台開發」, 2007 開放原始碼技術與應用研討會, 2007
- Y. T. Hou, T. C. Lee, Chia-Mei Chen, and B. C. Jeng, “Node Placement for Optimal Coverage in Sensor Networks”, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 5~ 7 2006
- Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach”, European Workshop on Evolutionary Computation in Communication Networks and Connected Systems (EvoCOMNET) 2006, Budapest, Hungary, 10~ 12 2006
- Y. T. Hou, T. C. Lee, B. C. Jeng, and Chia-Mei Chen, “Optimal Coverage Deployment for Wireless Sensor Networks”, International Conference on Advanced Communication Technology co-sponsored by IEEE Communications Society, Phoenix Park, Korea, 20~ 22 2006
- Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach”, Lecture Notes in Computer Science:Applications of Evolutionary Computing, 2006
- S. T. Cheng, C. Y. Wang, and Chia-Mei Chen, “An Adaptive Data Broadcasting for Wireless Access” , the IASTED International Conference on Wireless Network and Emerging Technologies , Banff, Canada, 2006
- 邱郁芬、林孝忠、陳嘉玫, 「以區域聯防為基礎之垃圾郵件防治研究」, 2006 數位教學暨資訊實務研討會, 2006
- Y. L. Chen, Chia-Mei Chen, and C. Ravishankar, “A Lightweight Network Intrusion Detection”, 2005 International Forensic Science Symposium (IFSS), 2005
- Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin, “Localization on Network Auditing System”, 2005 International Forensic Science Symposium (IFSS), 2005
- Chia-Mei Chen, S.-P. We, and J. S. Cheng, “Effective Network Monitor Based on Flow Traffic”, FIRST Computer Security Incident Handling Conference, Singapore, 2005
- 曾漠益、 賴谷鑫、 陳嘉玫、 鄭炳強, 「以約略集合理論為基礎之垃圾郵件過濾研究」, 第十一屆資訊管理暨實務研討會 (IMP), 2005
- 曾仲強、 賴谷鑫、 陳嘉玫、 鄭炳強, 「以支援向量機為基礎之後門程式入侵偵測」, 第十屆人工智慧與應用研討會 (TAAI), 2005
- 陳雅玲、陳嘉玫、 鄭炳強, 「LINIDS:輕型網路入侵偵測系統」, 第十六屆國際資訊管理學術研討會 (ICIM), 2005
- 陳嘉玫、楊鴻鈞、賴谷鑫, 「滿足服務品質需求之資源管理研究」, 第十六屆國際資訊管理學術研討會 (ICIM), 2005
- 陳嘉玫、賴谷鑫、羅哲峰, 「客戶需求傳輸之動態資源管理研究」, 資通技術管理與應用研討會 (SAICT), 2005
- 邱郁芬、 賴谷鑫、 陳嘉玫、 鄭炳強, 「以區域聯防為基礎之垃圾郵件防治研究」, 「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會, 2005
- 陳嘉玫、魏川弼, 「大型網路上的網路監控」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2004
- 陳嘉玫、王辭寒, 「遠端攻擊入侵偵測」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2004
- 賴昆宜、陳嘉玫, 「弱點掃描之區域化研究」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2004
- 鄭進興、陳威安、陳嘉玫、林敬皇, 「DNSSEC 安全機制實作研究」, TANET 2004, 2004
- Chia-Mei Chen, Analysis and Trend of Security Crime in Taiwan, Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT), 2004
- H. M. Sun, Chia-Mei Chen, L. C. Shu, “Optimizing multimedia delivery over bandwidth limited networks”, The 13th International Conference on Pacific Rim Management, Association for Chinese Management Educators (ACME 2003), 2003
- 陳嘉玫、吳啟常、鄭進興、陳年興, 「Code Automation for Vulnerability Scanner」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2003
- 陳嘉玫、鄭偉成、鄭進興、陳年興, 「Intrusion Detection on Distribution Attacks」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2003
- 鄭進興、沈志昌、古東明、陳嘉玫, 「DNS 網域安全稽核防護系統之建置」, TANET 2003, 2003
- H. M. Sun, Chia-Mei Chen, L. C. Shu, “Real-Time Scheduling for Multimedia Streams Over Resource-Constrained Networks”, The 8th International Conference on Real-Time Computing Systems and Applications (RTCSA), Tokyo, Japan, 2002
- S. T Cheng, J. P. Liu, J. L. Kao, and C. M. Chen, “A New Framework for Mobile Web Services”, Symposium on Applications and the Internet (SAINT), Nara, Japan, 2002
- 鄭進興、林柏宇、陳嘉玫、陳年興, 「DNS 安全檢測系統」, TANET 2002, 2002
- 陳嘉玫、鄭進興等, 「校園網路安全性之評估」, 「網際空間:資訊、法律與社會」學術研究暨實務研討會, 2001
- H. M. Sun, Chia-Mei Chen, L. C. Shu, “Real-Time Multimedia Delivery Over Wireless Networks”, The 7th International Conference on Distributed Multimedia System (DMS), 2001
- S. T. Cheng and Chia-Mei Chen, “Security in Personal Area Networks”, The 13th Annual FIRST Computer Security Incident Handling Conference, Toulouse, France, 2001
- 黃世昆、陳嘉玫、陳年興、賴冠州, 「政府網路安全性之評估」, 第十一屆全國資訊安全會議, 台灣, 2001
- S. K. Huang, N. S. Chen, Chia-Mei Chen, and B. J. Lin, “Survival Acceptability Evaluation and Incident Case Report in Taiwan”, The 12th Annual FIRST Computer Security Incident Handling Conference, Chicago, 2000
- 林秉忠、陳嘉玫、陳年興、黃世昆, 「台灣網路安全性之評估」, 第十屆全國資訊安全會議, 台灣, 2000
- 張平河、陳嘉玫、王貴英, 「大型企業分散式資訊系統之安全管理」, 第十屆國際資訊管理學識研討會, 1999
- Chia-Mei Chen and S. T. Cheng, "A Simple Web-Based Single Sign-On Solution", The National Information Security Conference, Taiwan, 1998
- Chia-Mei Chen , S. T. Cheng, and Y. C. Lee, "Secure Bank Account Purchasing in the Web", The National Information Security Conference, Taiwan, 1998
- "Sheng-Tzong Cheng,Chia-Mei Chen,and Jing-Wen Hwang", Low-Power Design for Real-Time Systems, "Proc,of the 1st International Conference on Information,Communications & Signal Processing (ICICS'97)", Signapore, 1997
- "Shyh-In Hwang,Chia-Mei Chen,and Ashok K. Agrawala", Scheduling an Overloaded Real-Time System, Procs of the IEEE International Phoenix Conference on Computers and Communications, Arizona, ~ 1996
- Chia-Mei Chen and Satish K. Tripathi, An Analytical Model for the Reliability of Real-Time Systems, "Procs. of the International Association of Science and Technology for Development (IASTED) International Conference on Applied Modelling,Simulation and Optimization", 1995
- "Chia-Mei Chen,and Satish K. Tripathi", Fault-Tolerance Scheduling in Real-Time Systems, Procs. of the International Society for Computers and Their Applications (ISCA) International Conference on Computer Applications in Industry and Engineering, 1995
- "Chia-Mei Chen,Satish K. Tripathi,and S. Cheng", A Fault-Tolerance Model for Real-Time Systems, Procs. of the 1994 IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, 1994
- "Chia-Mei Chen,Satish K. Tripathi,and Alex Blackmore", A Resource Synchronization Protocol for Multiprocessor Real-Time Systems, Procs. of the 1994 International Conference on Parallel Processing, 1994
- Chia-Mei Chen and Satish K. Tripathi, An Optimistic Concurrency Control Algorithm in Real-Time Database Systems, Procc. of the ISCA International Conference on Parallel and Distributed Computing, 1993
Books
- 吳惠麟、 陳嘉玫 , 網路安全概論與實務:開源碼架構之網路安全防禦解密, 碁峰, 2014
- Chia-Mei Chen, J. J. Huang, Y. H Ou, Detecting Web Attacks Based on Domain, Lecture Notes in Computer Science, 2013 (Vol.8039, pp. 97-106)
- Chia-Mei Chen, M. Z. Huang, and Y. H. Ou, Detecting Web-Based Botnets with Fast-flux Domains, Smart Innovation, Systems and Technologies, 2013 (Vol. 21, pp. 79-89)
- Y. T. Hou, Chia-Mei Chen, B. C. Jeng, A Key Predistribution Scheme for Wireless Sensor Network Using the Small-World Concept, Lecture Notes in Computer Science (LNCS), 2007 (4658, 137-146)
- 陳嘉玫, 電子商務理論與實務,梁定彭主編,第四章網路安全, 華泰文化, 2002 (二版)
- 陳嘉玫, 電子商務理論與實務,梁定彭主編,第四章網路安全, 華泰文化, 2000 (初版)
Research Reports
- Chia-Mei Chen, "Scheduling Issues in Real-Time Systems", Department of Computer Science, University of Maryland, technical report, 1995 (CS-TR-3493, UMIACS-TR-9583)
- Chia-Mei Chen, N. Roussopoulos, "Evaluation of Transferring Files Through RPC, TCP Approaches", Department of Computer Science, University of Maryland, technical report, 1991 (CS-TR-779)
- Chia-Mei Chen, Satish K. Tripathi, "Multiprocessor Priority Ceiling-Based Protocols", Department of Computer Science, University of Maryland, technical report(CS-TR-3253)
Others
- 陳嘉玫, 漫談網路安全之社交工程, 刊登於科學發展月刊, 2010
- 陳嘉玫, 網路安全, 刊登於電子商務理論與實務, 梁定彭所著, 華泰出版社, 2000
National Science Council Projects
- 基於Hadoop平台之APT攻擊大數據分析研究
-105-2221-E-261 -003 -MY2, 共同主持人, 2016-8-1-2018-8-31 - 資安監控與管理技術開發--資安監控與管理技術開發(1/3)
-106-3114-E-006 -003 -, 共同主持人, 2017-6-1-2018-5-31 - 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究--雲端環境中持續且目標性攻擊偵測之研究
-103-2221-E-110 -049 -MY3, 主持人, 2014-8-1-2017-7-31 - 雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端環境中持續且目標性攻擊偵測之研究
-MOST 103-2221-E-110 -049 -MY3
-科技部, 主持人, 2014-8-1-2017-7-31 - 網路威脅搜捕、態樣分析、追蹤與過濾技術研究-子計畫一:網路威脅搜捕研究
-Project NO.NSC 100-2218-E-110 -004 -MY3, 主持人, 2011-8-1-2014-7-31 - 網路威脅搜捕、態樣分析、追蹤與過濾技術研究-總計畫
-NSC100-2218-E-006-028-MY3, 共同主持人, 2011-8-1-2014-7-31 - 雲端資安監控平台之研發-子計畫三:安全的上網環境之研究
-NSC100-2218-E-110-011, 主持人, 2011-10-1-2012-7-31 - 雲端資安監控平台之研發-總計畫
-NSC100-2218-E-110-009, 共同主持人, 2011-10-1-2012-7-31 - 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用(III)
-NSC100-2219-E-006-001, 共同主持人, 2011-1-1-2012-4-30 - 府城柑仔店(3/3)
-NSC100-2218-E-006-004, 共同主持人, 2011-11-1-2012-10-31 - 府城柑仔店(2/3)
-NSC99-2218-E-006-009, 共同主持人, 2010-11-1-2012-1-31 - 有主動防禦機制的誘捕系統研究(開放軟體元件開發分項)
-NSC99-2220-E-110-002, 主持人, 2010-8-1-2011-8-31 - 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用(Ⅱ)
-NSE99-2219-E-006-011, 共同主持人, 2010-1-1-2011-1-31 - 網宇實體系統 (Cyber-Physical Systems) 之創新資安技術研發
-NSC98-2218-E-006-250, 共同主持人, 2009-10-1-2010-7-31 - 網路威脅搜捕分析與追蹤技術研究-子計畫一:分散式網路威脅搜捕技術研究
-NSC98-2218-E-110-007, 主持人, 2009-10-1-2010-7-31 - 網路威脅搜捕分析與追蹤技術研究-總計畫
-NSC98-2218-E-006-252, 共同主持人, 2009-10-1-2010-7-31 - 智慧行動裝置瀏覽網頁之安全機制(開放軟體元件開發分項)
-NSC98-2220-E-110-011, 主持人, 2009-8-1-2010-7-31 - 府城柑仔店(1/3)
-NSC98-2218-E-006-257, 共同主持人, 2009-11-1-2010-11-30 - 府城柑仔店(1/3)
-NSC98-2218-E-006-257, 共同主持人, 2009-11-1-2010-11-30 - 網路安全測試平台(Testbed@TWISC)之建置、推廣與應用
-NSC98-2219-E-006-001, 共同主持人, 2009-1-1-2010-1-31 - 智慧型數位生活空間之無線感測網路技術之研究(3/3)
-NSC97-2218-E-006-003, 共同主持人, 2008-11-1-2009-10-31 - 結合資料探勘與統計檢定之垃圾郵件過濾器之研究(自由軟體產業關鍵技術開發分項)
-NSC97-2218-E-110-004, 主持人, 2008-8-1-2009-10-31 - 智慧家庭監控系統之研究(自由軟體產業關鍵技術開發分項)
-NSC96-2218-E-110-005, 主持人, 2007-8-1-2008-7-31 - 資通安全人才培育計畫-子計畫三:資通安全人才培育-國立成功大學資通安全研究與教學中心
-NSC97-2219-E-006-003, 共同主持人, 2008-5-1-2008-12-31 - 智慧型數位生活空間之無線感測網路技術之研究(2/3)
-NSC96-2218-E-006-008, 共同主持人, 2007-11-1-2008-10-31 - 無線感測網路之覆蓋研究
-NSC95-2221-E-110-083, 主持人, 2006-8-1-2007-7-31 - 智慧型數位生活空間之無線感測網路技術之研究(1/3)
-NSC95-2218-E-006-055, 共同主持人, 2006-1-1-2007-10-31 - Linux開放架構下數位生活家用網路安全之嵌入式平台開發
-NSC95-3113-P-110-001, 主持人, 2006-2-1-2007-1-31 - 以螞蟻演算法為基礎之來源追蹤之研究
-NSC94-2213-E-110-049, 主持人, 2005-8-1-2006-7-31 - 以使用者行為特徵為基礎之安全機制
-NSC93-2213-E-110-045, 主持人, 2004-8-1-2005-7-31 - 位置衍生之服務與應用技術-子計劃二:位置認知下資訊安全機制與服務(I)
-NSC91-2219-E-110-002, 主持人, 2002-8-1-2003-7-31 - 位置衍生之服務與應用技術-總計劃(I)
-NSC91-2219-E-006-010-, 共同主持人, 2002-8-1-2003-7-31 - 無線網路遊戲平台與魔法卡交易遊戲之研究開發
-NSC91-2622-E-110-014-CC3, 主持人, 2002-12-1-2003-11-30 - 虛擬攻防系統之建置, 主持人, 2001-08-01-2002-07-31
- 行動非同步傳輸模式網路之行動與資源管理研究, 主持人, 2000-08-01-2001-07-31
- 台灣電子商務發展之研究—電子商務之資訊安全管理研究(II), 主持人, 1999-08-01-2000-07-31
Others
- TACERT臺灣學術網路危機處理中心營運計畫
-教育部, 主持人, 2012-1-1-2012-11-30 - TACERT台灣學術網路危機處理中心營運計畫
-教育部, 主持人, 2010-6-1-2011-2-28 - TACERT臺灣學術網路危機處理中心營運計畫
-教育部, 主持人, 2011-3-1-2011-12-31 - 教育機構資安通報應變暨資安人才培訓計畫
-教育部, 主持人, 2009-6-1-2010-5-31 - Design Profiling and Security Enhancement in Cloud Computing Environment for TSMC Open Innovation Platform
-TSMC 台機電委托, 共同主持人, 2010-2-1-2010-12-31 - 3G行動通訊系統之資訊安全監控與管理
-台灣大哥大, 主持人, 2007-2-1-2008-4-30 - 網路安全檢測服務
-宏瞻資訊科技股份有限公司, 協同主持人, 2005-2-1-2006-1-31 - 大專生參與專題研究計畫(劉威成)
-行政院國家科學委員會, 主持人, 2004-7-1-2005-2-28 - DNS安全檢測及事件紀錄分析機制實做研究
-TWNIC, 主持人, 2004-6-1-2005-2-16 - 資通安全區域聯防計畫
-資策會, 協同主持人, 2005-7-1-2005-12-31 - DNS Security資源網站建置維護暨DNSSEC之研究
-TWNIC, 主持人, 2003-8-23-2004-5-22 - DNS伺服器安全檢測與防護體系之建置與運作
-TWNIC, 主持人, 2002-8-1-2003-8-30 - 國家寬頻實驗網路(NBEN)網路安全建置與實驗計畫
-NSC, 協同主持人, 2003-3-1-2003-12-31 - 建置與運作資安區域聯防機制
-資策會, 協同主持人, 2002-5-1-2003-12-31 - 資安區域聯防機制之運作
-資策會, 協同主持人, 2003-5-1-2003-11-30 - 駭客入侵防護研究
-資策會, 協同主持人, 2003-5-1-2003-11-30 - 研發網路入侵偵測技術並提供系統弱點及解決方案
-資策會, 協同主持人, 2001-9-1-2001-12-31 - 微軟網路安全研究計劃
-台灣微軟股份有限公司, 協同主持人, 2001-7-1-2001-12-31 - 大規模網路安全檢查系統之研究
-國推會, 協同主持人, 2001-1-1-2001-12-31 - 台灣電腦網路危機處理中心90年度工作
-電信總局, 協同主持人, 2001-1-1-2001-12-31
Undergraduate Program
Year | Course Name | Hour |
106 | OPERATING SYSTEMS | 3 |
105 | 3 | |
104 | OPERATING SYSTEMS | 3 |
103 | OPERATING SYSTEMS | 3 |
102 | MANAGEMENT INFORMATION SYSTEMS PROJECT II | 3 |
OPERATING SYSTEMS | 3 | |
101 | MANAGEMENT INFORMATION SYSTEMS PROJECT I | 3 |
OPERATING SYSTEMS | 3 | |
100 | OPERATING SYSTEMS | 3 |
99 | OPERATING SYSTEMS | 3 |
98 | OPERATING SYSTEMS | 3 |
97 | OPERATING SYSTEMS | 3 |
DATA STRUCTURES | 3 | |
96 | BUSINESS DATA COMMUNICATION | 3 |
OPERATING SYSTEMS | 3 | |
DATA STRUCTURES | 3 | |
95 | ELECTRONIC COMMERCE PROJECT (II) | 3 |
OPERATING SYSTEMS | 3 | |
DATA STRUCTURES | 3 | |
94 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
OPERATING SYSTEMS | 3 | |
DATA STRUCTURES | 3 | |
93 | ELECTRONIC COMMERCE PROJECT (II) | 3 |
92 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
OPERATING SYSTEMS | 3 | |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
91 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
OPERATING SYSTEMS | 3 | |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
90 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
OPERATING SYSTEMS | 3 | |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
89 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
OPERATING SYSTEMS | 3 | |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
88 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
DATA STRUCTURES | 3 | |
87 | ELECTRONIC COMMERCE PROJECT (I) | 3 |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
DATA STRUCTURES | 3 | |
86 | NETWORK SECURITY | 3 |
COMMERCIAL INFORMATION SYSTEM DESIGN | 3 | |
85 | DATABASE MANAGEMENT | 3 |
C & UNIX PROGRAMMING | 3 |
Graduate Program
Year | Course Name | Hour |
106 | SPECIAL TOPICS IN COMPUTER NETWORKS | 3 |
INTRODUCTION TO CLOUD COMPUTING | 3 | |
NETWORK SECURITY | 3 | |
105 | NETWORK SECURITY | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
INTRODUCTION TO CLOUD COMPUTING | 3 | |
104 | NETWORK SECURITY | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
INTRODUCTION TO CLOUD COMPUTING | 3 | |
103 | NETWORK SECURITY | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
INTRODUCTION TO CLOUD COMPUTING | 3 | |
102 | INTRODUCTION TO CLOUD COMPUTING | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
NETWORK SECURITY | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
101 | SPECIAL TOPICS IN COMPUTER NETWORKS | 3 |
NETWORK SECURITY | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
WIRELESS NETWORKS AND SERVICE INNOVATION – MOBILE IPTV | 3 | |
100 | SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 |
COMPUTER NETWORKS | 3 | |
WIRELESS NETWORKS AND SERVICE INNOVATION – MOBILE IPTV | 3 | |
NETWORK SECURITY | 3 | |
99 | SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 |
COMPUTER NETWORKS | 3 | |
NETWORK SECURITY | 3 | |
WIRELESS NETWORKS AND SERVICE INNOVATION – MOBILE IPTV | 3 | |
WIRELESS NETWORKS AND SERVICE INNOVATION – MOBILE IPTV | 3 | |
98 | WIRELESS NETWORKS AND SERVICE INNOVATION – MOBILE IPTV | 3 |
NETWORK SECURITY | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 1 | |
COMPUTER NETWORKS | 3 | |
97 | SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 |
COMPUTER NETWORKS | 3 | |
NETWORK SECURITY | 3 | |
96 | SPECIAL TOPICS IN COMPUTER NETWORKS | 3 |
NETWORK SECURITY | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
95 | SPECIAL TOPICS IN COMPUTER NETWORKS | 3 |
NETWORK SECURITY | 3 | |
94 | NETWORK SECURITY | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
92 | SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 |
NETWORK SECURITY | 3 | |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
91 | NETWORK SECURITY | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
WIRELESS NETWORK | 3 | |
90 | NETWORK SECURITY | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
WIRELESS NETWORK | 3 | |
89 | NETWORK SECURITY | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
WIRELESS NETWORK | 3 | |
88 | SPECIAL TOPICS IN COMPUTER NETWORKS | 3 |
NETWORK SECURITY | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
87 | NETWORK SECURITY | 3 |
86 | SPECIAL TOPICS IN DISTRIBUTED SYSTEMS | 3 |
NETWORK SECURITY | 3 | |
85 | NETWORK SECURITY | 3 |
Ph.D. Program
Year | Course Name | Hour |
106 | SEMINAR IN ADVANCED INFORMATION SYSTEMS (II) | 1 |
SEMINAR IN ADVANCED INFORMATION SYSTEMS (IV) | 1 | |
INTRODUCTION TO CLOUD COMPUTING | 3 | |
NETWORK SECURITY | 3 | |
105 | INTRODUCTION TO CLOUD COMPUTING | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
NETWORK SECURITY | 3 | |
98 | NETWORK SECURITY | 3 |
97 | NETWORK SECURITY | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
96 | SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 |
NETWORK SECURITY | 3 | |
95 | NETWORK SECURITY | 3 |
92 | SPECIAL TOPICS IN COMPUTER NETWORKS | 3 |
NETWORK SECURITY | 3 | |
91 | NETWORK SECURITY | 3 |
Part time MBA
Year | Course Name | Hour |
106 | INTRODUCTION TO CLOUD COMPUTING | 3 |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
NETWORK SECURITY | 3 | |
105 | INTRODUCTION TO CLOUD COMPUTING | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
NETWORK SECURITY | 3 | |
104 | SEMINAR IN MIS (I) | 3 |
INTRODUCTION TO CLOUD COMPUTING | 3 | |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
NETWORK SECURITY | 3 | |
103 | INTRODUCTION TO CLOUD COMPUTING | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
NETWORK SECURITY | 3 | |
102 | SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 |
NETWORK SECURITY | 3 | |
SPECIAL TOPICS IN COMPUTER NETWORKS | 3 | |
98 | NETWORK SECURITY | 3 |
97 | NETWORK SECURITY | 3 |
SPECIAL ISSUES IN INFORMATION TECHNOLOGY | 3 | |
96 | NETWORK SECURITY | 3 |
94 | SEMINAR IN MIS (I) | 3 |
89 | SEMINAR (II) | 3 |
資管專班
Year | Course Name | Hour |
88 | DATA STRUCTURES | 3 |
夜資管
Year | Course Name | Hour |
87 | BUSINESS DATA COMMUNICATION | 3 |
ELECTRONIC COMMERCE PROJECT (II) | 3 | |
ELECTRONIC COMMERCE PROJECT (I) | 3 | |
86 | BUSINESS DATA COMMUNICATION | 3 |
ELECTRONIC COMMERCE PROJECT (I) | 3 | |
85 | DATA STRUCTURES | 3 |