陳 嘉 玫
Chia-Mei Chen

TEL: 886-7-525-2000 ext 4726
FAX: 886-7-5254799
E-MAIL: cchen@mail.nsysu.edu.tw
最近更改日期:2012年12月3日



重要學歷(EDUCATIONAL BACKGROUND):



重要經歷(MAIN EXPERIENCES):



研究方向(RESEARCH AREAS):


系統實作


馬拉松志工攝影

20121021 里港馬拉松 20121103 台灣大道馬拉松賽前一天 20121104 台灣大道馬拉松 20121118 屏東馬拉松

學術論文(PUBLICATION LIST):

(A) Journal Papers:
  1. Chia-Mei Chen, S.-T. Cheng, and R-Y. Zeng, “A Proactive Approach to Intrusion Detection and Malware Collection,” accepted by Security and Communication Networks (SCI).
  2. 陳嘉玫、官大智、陳怡綾,“以行為為基礎偵測異常IRC 流量,”資訊安全通訊 (Communications of the CCISA), Vol. 18, No. 3, July 2012.
  3. G. H. Lai, C. S. Ouyang, Chia-Mei Chen, “A Group-based Deployment for Wormhole Prevention in Sensor Networks,” Journal of Information Science and Engineering, Vol. 27, pp. 79-93, 2011 (SCI).
  4. 侯雍聰、陳嘉玫,“以異常行為為基礎之即時惡意網頁偵測之研究,” 電子商務學報 (Journal of e-Business), Vol. 13, No. 1, pp. 117-134, March 2011.
  5. Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks,” Wireless Networks, Vol. 14, No. 4, pp. 1033-1043, 2010 (SCI).
  6. Chia-Mei Chen, Y. L. Chen, H. C. Lin, “An efficient network intrusion detection,” Computer Communications, Vol. 33, No.4, pp. 477-484, 2010 (SCIE).
  7. Y. Hou, Y. Chang, T. Chen, C. Laih, and Chia-Mei Chen, “Malicious Web Content Detection by Machine Learning,” Expert Systems with Applications, Vol. 37, Issue 1, pp. 55-60, January 2010 (SCI).
  8. J. L. Liu, C. W. Chou, and Chia-Mei Chen, “Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm,” International Journal Business Intelligence and Data Mining, Vol. 5, No. 1, 2010.
  9. J. L. Liu and Chia-Mei Chen, “Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization Design,” Engineering Optimization, Vol. 42, No. 2, 2009 (SCI).
  10. G. H. Lai, C. W. Chou, Chia-Mei Chen, and Ya-Hua Ou, “Anti-Spam Filter Based on Data Mining and Statistical Test”, Studies in Computational Intelligence, Vol. 208, 2009.
  11. 賴谷鑫、周照偉、陳嘉玫, “結合資料探勘與統計檢定之垃圾郵件過濾器之研究,”電子商務學報, Vol. 11, No. 4, December 2009 (TSSCI). 
  12. G. H. Lai, Chia-Mei Chen, C. S. Laih, and T. Chen, “A Collaborative Anti-Spam System,” Expert Systems with Applications, Vol. 44, No. 1, 2008, (SCI). 
  13. Chia-Mei Chen, B. C. Jeng, G. H. Lai, W Chao, “Ant-Based IP Traceback,” Expert Systems with Applications, Vol. 36, No. 3, 2008 (SCI).
  14. G. H. Lai and Chia-Mei Chen, “Detecting Denial of Service Attacks in Sensor Networks,” Journal of Computers, Vol. 18, No. 4, 2008.
  15. Chia-Mei Chen and C. P. Wei, “Efficient Network Monitoring for Large Networks,” Journal of Computers, Vol. 18, No. 4, 2008.
  16. H. C. Wang, B. C. Jeng, and Chia-Mei Chen, "Structural Testing Using a Memetic Algorithm," Journal of Software Engineering Studies, 2007.
  17. H. M. Sun, Chia-Mei Chen, and L. C. Shu, “Object-based Multimedia Scheduling Based on Bipartite Graphs,” IEICE Transaction on Communication, Vol. E88-B, No. 1, January 2005 (SCI).
  18. Chia-Mei Chen, H. M. Sun, L. C. Shu, “Optimizing Object-based Multimedia Delivery Across Bandwidth Constrained Networks,” Computer Journal, Vol. 47, No. 5, September, 2004 (SCI).
  19. S-T Cheng, C. Chen, C. Li, and Chia-Mei Chen, “Network topology management in a mobile-switch ATM network: dynamic partition algorithms,” International Journal of Network Management, Vol. 12, No. 2, pp. 99-115, 2002 (EI).
  20. S-T Cheng, Chia-Mei Chen, and H. T. Liu, “Dynamic Round-based Resource Management for On-Demand Multimedia Servers,” Computer Journal, Vol. 43, No.5, pp. 386-395, 2000 (SCI).
  21. S-T Cheng, Chia-Mei Chen, and S. K. Tripathi, “A Fault-Tolerant Model for Multiprocessor Real-Time Systems,” Journal of Computer and Systems Sciences, Vol. 61, No. 3, pp. 457-477, December 2000 (SCI).
  22. S-T Cheng and Chia-Mei Chen, “Temporal Analysis and Algorithms for Real-Time Scheduling and Allocation,” IJCA International Journal of Computers and Their Applications, March 1998.
  23. S-T Cheng, Chia-Mei Chen, and Jing-Wen Hwang, “Low Power Design for Real-Time Systems,” Real-Time Systems, September 1998 (SCI).
  24. Chia-Mei Chen, Shyh-In Hwang, and Satish K. Tripathi, “A Performance Study of Real-Time Optimistic Concurrency Control with the Knowledge of Execution Time,” ISCA International Journal of Computers and Their Applications, December, 1995.
  25. Chia-Mei Chen and W. H. Tsai, “Automatic Identification of Chinese Seal Imprints with Arbitrary or Partial Shapes,” Computer Processing of Chinese and Oriental Languages, October, 1986.

(B) Conference Papers:

  1. Chia-Mei Chen, D. J. Guan, Y.-Z. Huang, and Y.-H. Ou, “Attack Sequence Detection in Cloud Using Hidden Markov Model,” The Asia Joint Conference on Information Security (AsiaJCIS 2012), IEEE Computer Society press, August 2012. 
  2. Chia-Mei Chen, D. J. Guan, Q.-K. Su, and S.-T. Cheng, “Detecting Suspicious URLs in Social Network Service,” The 2012 IEEE International Conference on Computing and Security (ICCS), July 2012.
  3. Chia-Mei Chen, Y.-H. Ou, J.-J. Huang, “Detecting Web Attacks Based on Domain Reputation,” The 2012 IEEE International Conference on Computing and Security (ICCS), July 2012.
  4. Chia-Mei Chen and Y.-H. Ou, “Secure Mechanism for Mobile Web Browsing,” IEEE ICPADS 2011 Joint Workshop on Network and System Security, Dec. 2011.
  5. Chia-Mei Chen, D. J. Guan, Q-K Su, and T-Y Wang, “Malicious URL Detection on Facebook,” The Sixth Joint Workshop on Information Security (JWIS 2011), Oct. 2011.
  6. Chia-Mei Chen, “Detecting Anomaly Mobile Web Page through Template Classification,” The 11th Emerging Information and Technology Conference (EITC 2011), July 28-29, 2011.
  7. 陳嘉玫、歐雅惠、黃銘宗,“偵測具有動態網域特性的殭屍網路,”第二十一屆資訊安全會議, 2011.
  8. Chia-Mei Chen, Y-H Ou, and Y-C Tsai, “Web Botnet Detection Based on Flow Information,” ICS 2010 International Computer Symposium, December 16-18, 2010.
  9. 陳嘉玫、吳惠麟、王則堯,“惡意網站軟體誘捕系統,” 2010資訊安全技術創新應用研討會, 2010.
  10. 陳嘉玫、歐雅惠、林士棻,“行動裝置安全瀏覽網頁之機制,” IMP 2010 第十六屆資訊管理暨實務研討會,2010 年12 月11 日.
  11. 陳嘉玫、洪瑞麟、林孝忠、吳惠麟,“以Linux系統為基礎之日誌檔樣式化研究,” TANET 2010 台灣網際網路研討會,2010年10月27-29日.
  12. Chia-Mei Chen, W. Y. Tsai., H. C. Lin, “Anomaly Behavior Analysis for Web Page Inspection,” The First International Conference on Networks & Communications (NetCoM-2009), December 27-29, 2009.
  13. H.C. Lin, Chia-Mei Chen, J. Y. Tzeng, “Flow Based Botnet Detection,” Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009), December 7 - 9, 2009.
  14. M. Wu, Chia-Mei Chen, and C. H. Wang, “CPDCF for IEEE 802,11 WLANs,” The Fourth International Conference on Communications and Networking in China (CHINACOM 2009), August 2009.
  15. D. J. Guan, Chia-Mei Chen, J. S. Luo, and Y. T. Hou, “Malicious Web Page Detection based on Anomaly Semantics,” The fourth Joint Workshop on Information Security (JWIS 2009), August 2009.
  16. D. J. Guan, Chia-Mei Chen, and J. B. Lin, “Anomaly Based Malicious URL Detection in Instant Messaging,” The fourth Joint Workshop on Information Security (JWIS 2009), August 2009.
  17. G. H. Lai, Chia-Mei Chen, R. Y. Tzeng, C. S. Laih, and C. Faloutsos, “Botnet Detection by Abnormal IRC Traffic Analysis,” The fourth Joint Workshop on Information Security (JWIS 2009), August 2009.
  18. Gu-Hsin Lai, Chao-Wei Chou, Chia-Mei Chen, Ya-Hua Ou  “Anti-Spam Filter Based on Data Mining and Statistical Test”, 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009), June 1-3, 2009, Shanghai, China.
  19. Chia-Mei Chen, Wan-Yi Tsai, Yung-Tsung Hou, “Malicious Webpage Detection”, FIRST 2009, June 26-July 3, 2009, Kyoto, Japan.
  20. 蔡育洲, 林孝忠, 陳嘉玫, “植基於Flow 資訊之網頁為基礎之殭屍網路偵測,” 全國計算機會議 (NCS 2009), November 27-28, 2009.
  21. 林士強, 陳嘉玫, 林孝忠, “在行動P2P 網路環境中的集購資訊散播率之研究,” ICIM 第20屆國際資訊管理學術研討會─資訊科技與創新, May 23, 2009. 
  22. S. F. Lin, Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “Malicious Webpage Detection by Semantics-Aware Reasoning,” IEEE Intelligent System Design and Application (ISDA) Conference, Nov. 2008.
  23. G. H. Lai, C. S. Ouyang, Chia-Mei Chen, “A Group-based Deployment for Wormhole Prevention in Sensor Networks”, The 14th International Conference on Distributed Multimedia Systems, 2008.
  24. G. H. Lai, Chia-Mei Chen, Y. F. Chiu, C. S. Laih, and T. Chen, “A Collaborative Approach to Anti-Spam,” 20th Annual FIRST Conference, June 22-27, 2008.
  25. S. T. Cheng, S. Y. Li, and Chia-Mei Chen, “Distributed Detection in Wireless Sensor Networks,” Seventh IEEE/ACIS International Conference on Computer and Information Science (ICIS 08), May 14-16, 2008.
  26. Y. C. Cheng, C. S. Laih, G. H. Lai, Chia-Mei Chen, T. Chen , 2008, “Defending On-Line Web Application Security with User-Behavior Surveillance”, Third International Conference on Availability, Reliability and Security, March 4-7, 2008.
  27. C. Y. Lee, Chia-Mei Chen, H. C. Lin, “Buffer Overflow Prevention Based on Binary Exploit Code,” International Conference on Information Management, 2008.
  28. Y. T. Hou, Chia-Mei Chen, B. C. Jeng, “Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks,” IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Nov. 26-28, 2007.
  29. W. Y. Lai, Chia-Mei Chen, B. C. Jeng, G. H. Lai, and H. C. Lin, “Information Exchange Mechanism Based on Reputation in Mobile P2P Networks,” IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Nov. 26-28, 2007.
  30. Y. T. Hou, Chia-Mei Chen, and B. C. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept,” International Conference on Network-Based Information Systems (NBiS2007), Regensburg, Germany, Sept. 3-7, 2007.
  31. G. H. Lai, Chia-Mei Chen, B. C. Jeng, “DoS Detection in Cluster-based Sensor Networks,” IASTED International Conference on Communication, Network and Information Security (CNIS 2007),  Sept. 24-26, 2007, Berkeley, USA.
  32. Y. F. Chiu, Chia-Mei Chen, B. C. Jeng, and H. C. Lin, “An Alliance-based Anti-Spam Approach,” International Conference on Natural Computation, August, 2007, Haikou, China.
  33. Chia-Mei Chen, B. C. Jeng, G. H. Lai, C. L. Wang, “Adaptive Clustering for Sensor Network,” International Conference in IT and Application (ICITA) sponsored by IEEE NSW Section, 15-18, January, 2007, Harbin, China.
  34. Y. T. Hou, Chia-Mei Chen and B. C. Jeng, “A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept,” Lecture Notes in Computer Science, 2007.
  35. 李常友、陳嘉玫、鄭炳強、趙善中、林孝忠,「以關聯規則法分析攻擊探測程式之緩衝區溢位防治研究」,TANET 2007。
  36. 林士棻、陳嘉玫、鄭炳強,「以模式基礎推論用於偵測惡意動態網頁之研究」,Information Security Conference (ISC 2007)。
  37. 陳嘉玫、侯雍聰,「Linux 開放架構下數位生活家用網路安全之嵌入式平台開發」,2007開放原始碼技術與應用研討會。
  38. Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach,” Lecture Notes in Computer Science: Applications of Evolutionary Computing, 2006 (SCI).
  39. S. T. Cheng, C. Y. Wang, and Chia-Mei Chen, “An Adaptive Data Broadcasting for Wireless Access,” the IASTED International Conference on Wireless Network and Emerging Technologies, Banff, Canada, 2006.
  40. Y. T. Hou, T. C. Lee, Chia-Mei Chen, and B. C. Jeng, “Node Placement for Optimal Coverage in Sensor Networks,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 5-7, June, 2006.
  41. Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai, “Tracing Denial of Service Origin: Ant Colony Approach,” European Workshop on Evolutionary Computation in Communication, Networks and Connected Systems (EvoCOMNET) 2006, 10-12 April, 2006, Budapest, Hungary.
  42. Y. T. Hou, T. C. Lee, B. C. Jeng, and Chia-Mei Chen, “Optimal Coverage Deployment for Wireless Sensor Networks,” International Conference on Advanced Communication Technology co-sponsored by IEEE Communications Society, 20-22 February, 2006, Phoenix Park, Korea.
  43. 邱郁芬、林孝忠、陳嘉玫,「以區域聯防為基礎之垃圾郵件防治研究」,2006 數位教學暨資訊實務研討會。
  44. Y. L. Chen, Chia-Mei Chen, and C. Ravishankar, “A Lightweight Network Intrusion Detection,” 2005 International Forensic Science Symposium (IFSS), Nov. 2005.
  45. Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin, “Localization on Network Auditing System,” 2005 International Forensic Science Symposium (IFSS), Nov. 2005.
  46. Chia-Mei Chen, S.-P. We, and J. S. Cheng, “Effective Network Monitor Based on Flow Traffic,” FIRST Computer Security Incident Handling Conference, Singapore, June 2005.
  47. 曾漠益、 賴谷鑫、 陳嘉玫、 鄭炳強,「以約略集合理論為基礎之垃圾郵件過濾研究」,第十一屆資訊管理暨實務研討會 (IMP),2005。
  48. 曾仲強、 賴谷鑫、 陳嘉玫、 鄭炳強,「以支援向量機為基礎之後門程式入侵偵測」,第十屆人工智慧與應用研討會 (TAAI),2005。
  49. 陳雅玲、陳嘉玫、 鄭炳強,「LINIDS:輕型網路入侵偵測系統」,第十六屆國際資訊管理學術研討會 (ICIM) 2005。
  50. 陳嘉玫、楊鴻鈞、賴谷鑫,「滿足服務品質需求之資源管理研究」,第十六屆國際資訊管理學術研討會 (ICIM),2005。
  51. 陳嘉玫、賴谷鑫、羅哲峰,「客戶需求傳輸之動態資源管理研究」,資通技術管理與應用研討會 (SAICT),2005。
  52. 邱郁芬、 賴谷鑫、 陳嘉玫、 鄭炳強,「以區域聯防為基礎之垃圾郵件防治研究」,「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會,2005。
  53. 陳嘉玫、魏川弼,「大型網路上的網路監控」,「網際空間:資訊、法律與社會」學術研究暨實務研討會,12/2004。
  54. 陳嘉玫、王辭寒,「遠端攻擊入侵偵測」,「網際空間:資訊、法律與社會」學術研究暨實務研討會,12/2004。
  55. 賴昆宜、陳嘉玫,「弱點掃描之區域化研究」,「網際空間:資訊、法律與社會」學術研究暨實務研討會,12/2004。
  56. 鄭進興、陳威安、陳嘉玫、林敬皇,「DNSSEC安全機制實作研究」,TANET 2004。
  57. Chia-Mei Chen, Analysis and Trend of Security Crime in Taiwan, Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT), 2004.
  58. H. M. Sun, Chia-Mei Chen, L. C. Shu, “Optimizing multimedia delivery over bandwidth limited networks,” The 13th International Conference on Pacific Rim Management, Association for Chinese Management Educators (ACME 2003).
  59. 陳嘉玫、吳啟常、鄭進興、陳年興,「Code Automation for Vulnerability Scanner」,「網際空間:資訊、法律與社會」學術研究暨實務研討會,12/2003。
  60. 陳嘉玫、鄭偉成、鄭進興、陳年興,「Intrusion Detection on Distribution Attacks」,「網際空間:資訊、法律與社會」學術研究暨實務研討會,12/2003。
  61. 鄭進興、沈志昌、古東明、陳嘉玫,「DNS網域安全稽核防護系統之建置」,TANET 2003。
  62. H. M. Sun, Chia-Mei Chen, L. C. Shu, “Real-Time Scheduling for Multimedia Streams Over Resource-Constrained Networks”, The 8th International Conference on Real-Time Computing Systems and Applications (RTCSA), Tokyo, Japan, 2002.
  63. S. T Cheng, J. P. Liu, J. L. Kao, and C. M. Chen, “A New Framework for Mobile Web Services,” Symposium on Applications and the Internet (SAINT), Nara, Japan, 2002.
  64. 鄭進興、沈志昌、陳嘉玫、陳年興,「DNS安全檢測系統」,TANET 2002。
  65. 鄭進興、林柏宇、陳嘉玫、陳年興,「台灣地區網路伺服器調查及安全性評估」,「網際空間:資訊、法律與社會」學術研究暨實務研討會, 12/2002。
  66. 陳嘉玫、鄭進興等,「校園網路安全性之評估」,「網際空間:資訊、法律與社會」學術研究暨實務研討會,12/2001。
  67. H. M. Sun, Chia-Mei Chen, L. C. Shu, “Real-Time Multimedia Delivery Over Wireless Networks,” The 7th International Conference on Distributed Multimedia System (DMS), 2001.
  68. S. T. Cheng and Chia-Mei Chen, “Security in Personal Area Networks,” The 13th Annual FIRST Computer Security Incident Handling Conference, Toulouse, France, 2001.
  69. 黃世昆、陳嘉玫、陳年興、賴冠州,「政府網路安全性之評估」,第十一屆全國資訊安全會議,2001。
  70. S. K. Huang, N. S. Chen, Chia-Mei Chen, and B. J. Lin, “Survival Acceptability Evaluation and Incident Case Report in Taiwan,” The 12th Annual FIRST Computer Security Incident Handling Conference, Chicago, 2000.
  71. 林秉忠、陳嘉玫、陳年興、黃世昆,「台灣網路安全性之評估」,第十屆全國資訊安全會議,2000。
  72. 張平河、陳嘉玫、王貴英,「大型企業分散式資訊系統之安全管理」, 第十屆國際資訊管理學識研討會,1999。
  73. Chia-Mei Chen and S. T. Cheng, “A Simple Web-Based Single Sign-On Solution,” The National Information Security Conference, Taiwan, 1998.
  74. Chia-Mei Chen , S. T. Cheng, and Y. C. Lee, “Secure Bank Account Purchasing in the Web,” The National Information Security Conference, Taiwan, 1998.
  75. S. T. Cheng, Chia-Mei Chen, and J. W. Hwang, “Low-Power Design for Real-Time Systems,” The 1st International Conference on Information, Communications & Signal Processing, Singapore, 1997.
  76. S. I. Hwang, Chia-Mei Chen, and A. K. Agrawala, “Scheduling an Overloaded Real-Time System,” The IEEE International Phoenix Conference on Computers and Communications, Arizona, 1996.
  77. Chia-Mei Chen and S. K. Tripathi, “Fault-Tolerance Scheduling in Real-Time Systems,” The ISCA International Conference on Computer Applications in Industry and Engineering, 1995.
  78. Chia-Mei Chen and S. K. Tripathi, “An Analytical Model for the Reliability of Real-Time Systems,” The IASTED International Conference on Applied Modeling, Simulation and Optimization, 1995.
  79. Chia-Mei Chen, S. K. Tripathi, and S. T. Cheng, “A Fault-Tolerance Model for Real-Time Systems,” The IEEE Workshop on Fault-Tolerance Parallel and Distributed Systems, 1994.
  80. Chia-Mei Chen, S. K. Tripathi, and S. T. Cheng, “Adaptive Redundancy for Fault-Tolerance Real-Time Systems,” in Fault-Tolerance Parallel and Distributed Systems, 1995, IEEE Press.
  81. Chia-Mei Chen, S. K. Tripathi, and A. Blackmore, “A Resource Synchronization Protocol for Multiprocessor Real-Time Systems,” The International Conference on Parallel Processing, 1994.
  82. S. T. Cheng, Chia-Mei Chen, and A. K. Agrawala, “Performance-Oriented Replication of Series-Parellel Graphs for Computation-Intensive Applications,” The International Conference on Parallel and Distributed Systems (ICPADS), 1993.
  83. Chia-Mei Chen and S. K. Tripathi, “An Optimistic Concurrency Control Algorithm in Real-Time Database Systems,” The ISCA International Conference on Parallel and Distributed Computing, 1993.

(C) 專書

  1. 陳嘉玫, 電子商務理論與實務,梁定彭主編,第四章網路安全, 華泰文化, 2002 (二版)
  2. 陳嘉玫, 電子商務理論與實務,梁定彭主編,第四章網路安全, 華泰文化, 2000 (初版)

(D)研究報告

  1. Chia-Mei Chen, 〝Scheduling Issues in Real-Time Systems〞, Department of Computer Science, University of Maryland, technical report, 1995 (CS-TR-3493, UMIACS-TR-9583)
  2. Chia-Mei Chen, N. Roussopoulos, 〝Evaluation of Transferring Files Through RPC, TCP Approaches〞, Department of Computer Science, University of Maryland, technical report, 1991 (CS-TR-779)
  3. Chia-Mei Chen, Satish K. Tripathi, 〝Multiprocessor Priority Ceiling-Based Protocols〞, Department of Computer Science, University of Maryland, technical report(CS-TR-3253)

(E)其他文章

  1. 陳嘉玫, 網路安全, 刊登於電子商務理論與實務, 梁定彭所著, 華泰出版社, 2000