公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
---|---|---|---|---|---|---|
2012 | A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure | Christine Peijinn Chai; He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Yun-Hsin Chuang; Chin-Laung Lei; Chun-Ying Huang; Chi-Wen Teng; Yuh-Sheng Shaw; Minsiong Liang; CHIN-LAUNG LEI | The 2nd. International Conference on Applied and Theoretical Information Systems Research | |||
2011 | A Mechanism on Risk Analysis of Information Security with Dynamic Assessment | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 3rd International Workshop on Managing Insider Security Threats | |||
2014 | A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | Workshop on Cryptography and Information Security, ICS 2014 | |||
2013 | Access Control over Vulnerable Devices in Advanced Metering Infrastructure | He-Ming Ruan; Yun-Hsin Chuang; CHIN-LAUNG LEI | National Computer Symposium | |||
2014 | Access Control System and Access Control Method Thereof | Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI | ||||
2013 | Access Control System and Access Control Method Thereof | Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI | ||||
2011 | AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | The 6th Joint Workshop on Information Security | |||
2014 | An AMI Threat Detection Mechanism Based on SDN Networks | Po-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; CHIN-LAUNG LEI | The Eighth International Conference on Emerging Security Information, Systems and Technologies | |||
2012 | An Analysis of Security Patch Lifecycle Using Google Trend Tool | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 7th Asia Joint Conference on Information Security | |||
2012 | Data Integrity on Remote Storage for On-line Co-working | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | 7th Asia Joint Conference on Information Security | |||
2012 | Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | International Computer Symposium, Advances in Intelligent Systems and Applications | |||
2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; Ming-Hwa Tsai; Yen-Nun Huang; Yen-Hua Liao; CHIN-LAUNG LEI | the 10th Asia Joint Conference on Information Security | |||
2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; CHIN-LAUNG LEI | Engineering Science & Technology Bulletin | |||
2012 | Enabling Efficient Batch Verification on Data Integrity for Remote Storage | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | The 13th International Conference on Internet Computing | |||
2014 | Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage | He-Ming Ruan; CHIN-LAUNG LEI | The 9th Asia Joint Conference on Information Security | |||
2011 | Generic Framework for Electronic Anonymous Auctions | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | International Conference on Information Security | |||
2014 | Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | Workshop on Cryptography and Information Security, ICS 2014 | |||
2017 | Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System | He-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies | 2 | 0 | |
2013 | Security Event Handling Framework For Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | International Conference on Applied and Theoretical Information Systems Research | |||
2011 | Security Threats in Advanced Metering Infrastructure | He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; CHIN-LAUNG LEI | The 6th Joint Workshop on Information Security |