衍生計畫 (回 成果亮點



計畫名稱 起迄年月 補助機構
行動寬頻尖端技術跨校教學聯盟-行動寬頻網路與應用-小細胞基站聯盟中心第二期 105/4/1-106/1/31 教育部
教育單位網站資安防護服務計畫(3/3) 105/1/1-105/12/31 教育部
雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究--總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(2/2)  104/8/1-105/7/31 國科會
教育單位網站資安防護服務計畫(2/3) 104/1/1-104/12/31 教育部
雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究---總計畫暨子計畫一:雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究(1/2) 103/8/1-104/7/31 教育部
教育單位網站資安防護服務計畫(1/3) 103/1/1-103/12/31 教育部
中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (3/3)
103/9/1-104/8/31 經濟部
雲端環境下之網路目標性攻擊、關連分析與多層次防禦技術研究-雲端系統中分散式日誌蒐集、錯誤偵測、稽核及預警系統 MOST 103-2221-E-006 -146 -MY3 103/8/1-106/7/31 科技部
中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (2/3) 102/9/1-103/8/31 經濟部
中小企業雲端服務中介平台與閘道器技術研發--雲端服務安全技術 (1/3) 101/9/1-102/8/31 經濟部
車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(2/2) NSC 101-2219-E-006-003- 101/5/1-102/4/30 國科會
車用行動生活之協力式多媒體串流服務平台--子計畫二:車輛隨意網路下具效率與安全之群組重疊網路設計(1/2) NSC 100-2219-E-006-004- 100/5/1-101/4/30 國科會

專利技轉 (回 成果亮點




專利名稱 專利編號 專利人 國別
分散式多重傳輸協定之跨層日誌搜集系統與方法(DISTRIBUTED MULTIPLE PROTOCOL CROSS-LAYER LOG COLLECTION SYSTEM AND METHOD) I514174 李忠憲, 劉奕賢, 盧建同, 張家瑋, 楊竹星, 蔡邦維   中華民國
特徵嵌入方法(SIGNATURE EMBEDDING METHOD) I501633 李忠憲, 劉奕賢, 謝哲人, 高傳凱, 郭奕岑  中華民國
基於跨層日誌記錄的資料軌跡追蹤系統與方法(BASE ON CROSS-LAYER LOG DATA TRACE SYSTEM AND METHOD) I484331 李忠憲, 劉奕賢, 盧建同, 張家瑋 中華民國
惡意程式破壞系統及其破壞方法(MALICIOUS SCRIPTS SUPPRESSION SYSTEM AND SUPPRESSION METHOD THEREOF) I461955 李忠憲, 林敬皇, 劉奕賢, 馬健原, 陳柏霖, 安家駒  中華民國
車用隨意網路系統(VANET SYSTEM) I454164 李忠憲, 劉奕賢, 謝哲人, 高傳凱 中華民國
車用隨意網路系統(VANET SYSTEM) I419596 李忠憲, 劉奕賢, 謝哲人, 高傳凱 中華民國
影像數位標籤嵌入方法、即時鑑識方法及其鑑識系統 I423068 李忠憲, 謝哲人, 翁吉田 中華民國
語音閘道架構及其通訊方法 I408923 李忠憲, 謝哲人, 曾昭展 中華民國
具有數位修正的多媒體版權管理機制(Digital Right Management with Fingerprint Correction) I354451 李忠憲, 謝哲人, 洪丞甫, 趙志宏  中華民國
多重傳輸通道的重疊網路串流方法及其系統 I528843 李忠憲, 劉奕賢, 盧建同, 張家瑋, 王大利, 林駿凱 中華民國

論文著作 (回 成果亮點

(A)期刊論文

(i) IEEE Transactions

    1. Y.-M. Hu, I.-C. Chang, and J.-S. Li, 2015, “Hybrid Blocking Algorithm for Identification of Overlapping Staying Tags between Multiple Neighboring Readers in RFID Systems”, IEEE Sensors Journal, Vol. 15, No. 7, pp. 4076-4085 
    2. H.-T. Lin, Y.-Y. Lin, W.-S. Yan, and F.-B. Hsieh, 2015, “Efficient Frame Aggregation Transmission Using Random Linear Network Coding”, IEEE Wireless Communications Letters, Vol. 3 No. 6, pp. 629-632 
    3. Y.-S. Su, S.-L. Su, and J.-S. Li, 2014, “Joint topology-transparent scheduling and QoS routing”, IEEE Transactions on Vehicular Technology, Vol. 63, No. 1, pp. 372-389 
    4. J.-S. Li and Y.-M. Hu, 2013, “An Efficient Time-Bound Collision Prevention Scheme for RFID Re-entering Tags”, IEEE Transactions on Mobile Computing, Vol. 12, No. 6, pp. 1054-1064.

       (ii) Other Journals

    1. Chia-Mei Chen, Dah-Jyh Guan, Yu-Zhi Huang, Ya-Hui Ou, 2016, " Anomaly Network Intrusion Detection Using Hidden Markov Model", International Journal of Innovative Computing, Information and Control. Vol. 12, No. 2,  pp. 569-580
    2. 陳嘉玫賴谷鑫, 2016, “基於漸增式分群法之惡意程式自動分類研究”, 電子商務學報, Vol. 18, No.2, pp. 225-248.
    3. C.-T. Lu, C.-W. Chang, and J.-S. Li, 2015, "VM Scaling based on Hurst Exponent and Markov Transition with Empirical Cloud Data", Journal of Systems and Software.Vol. 99, pp. 199–207
    4. C.-B. Jiang, and J.-S. Li, 2015, "Ontology-based Botnet Topology Discovery Approach with IP Flow Data", International Journal of Innovative Computing, Information and Control, Vol. 11, No. 1, pp. 309–326. 
    5. 陳嘉玫王士豪, 2015, “QR Code智慧型藥袋藥物影音查詢系統”, Management Information Computing, Vol. 4, No. 1, pp. 224-233.
    6. Kai Chain, Cheng-Chung Kuo, Chu-Sing Yang, 2016, " The analysis and implementation of Botnet and DDoS", International Journal of Computer Science and Information Security, Vol. 14, No. 10, pp. 194-200.
    7. C.-B Jiang, I.-H Liu, Y.-N Chung, J.-S Li, 2016, " T Novel Intrusion Prediction Mechanism based on Honeypot Log Similarity", International Journal of Network management, Vol. 26, No. 3, pp. 156-175.
    8. Tzy-Shiah Wang, Hui-Tang Lin*, Wei-Tsung Cheng, Chang-Yu Chen, 2016, " DBod: Clustering and Detecting DGA-based Botnets Using DNS Traffic Analysis", Computers & Security, Vol. 64, pp. 1-15.
    9. Tzy-Shiah Wang, Hui-Tang Lin*, Ping Wang, 2016, " Weighted-Spectral Clustering Algorithm for Detecting Community Structures in Complex Networks", Artificial Intelligence Review, Volume 47, Issue 4, pp 463–483
    10. K.-C. Hu, C.-W. Tsai, M.-C. Chiang, and C.-S. Yang, 2015, "A Multiple Pheromone Table Based Ant Colony Optimization for Clustering", Mathematical Problems in Engineering, Vol. 2015, Article ID 158632, pp. 11
    11. C.-H. Lin, C.-T. Lu, Y.-H. Chen, and J.-S. Li, 2014, “Resource allocation in cloud virtual machines based on empirical service traces”, International Journal of Communication Systems.Vol. 27, No. 12, pp. 4210–4225. 
    12. C.-J. Hsieh, C.-T. Weng, and J.-S. Li, 2014, “JPEG Forensics Scheme for Signature Embedding and Packet-Level Detection”, International Journal of Communication Systems.Vol. 27, No. 11, pp. 3368–3382. 
    13. C.-T. Lu, C.-L. Chang, I-H. Liu, and J.-S. Li, 2014, “Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks”, Journal of Wireless Person Communication, Vol. 77, No. 4, pp. 2793-2816. 
    14. I-H. Liu, C.-G. Liu, C.-T. Lu, Y.-T. Kuo, and J.-S. Li, 2014, “A Multi-hop Resource Scheduling Algorithm for IEEE 802.16j Relay Networks”, Computer Networks, Vol. 67, pp. 164–179. 
    15. J.-S. Li, I-H. Liu, C.-K. Kao, and C.-M. Tseng, 2013, “Intelligent Adjustment Forwarding: A Compromise between End-to-End and Hop-by-Hop Transmissions in VANET”, Journal of Systems Architecture, Vol. 59, No. 10, pp. 1319–1333.
    16. C.-G. Liu, I-H. Liu, T.-T. Yang, and J.-S. Li, 2013, “Navigation-Aware Association Control in Vehicular Wireless Networks”, Journal of High Speed Networks, Vol. 19, No. 4, pp. 311-324. 
    17. C.-H. Chao, C.-F. Yang, P.-T. Lin, and J.-S. Li, 2013, “Novel Distributed Key Revocation Scheme for Wireless Sensor Networks”, Journal of Security and Networks, Vol. 6, No. 10, pp. 1271-1280 
    18. J.-S. Li, C.-J. Hsieh, and W.-C. Liu, 2013, “Digital Evidence Collection for Web Image Access”, Security and Networks, Vol. 6, No. 6 , pp. 765-776 (SCI, EI)
    19. J.-S. Li, C.-J. Hsieh, and H.-Y. Lin, 2013, “A Hierarchical Mobile-Agent-based Security Operation Center”, International Journal of Communication Systems, Vol. 26, No. 12, pp.1503-1519 
    20. J.-S. Li, C.-J. Hsieh, and Y.-K. Wang, 2013, “Distributed Key Management Scheme for P2P Live Streaming Services”, International Journal of Communication Systems, Vol. 26, No. 10, pp. 1259-1272
    21. J.-S. Li and K.-H. Liu, 2013, “A Lightweight Identity Authentication Protocol for Vehicular Networks”, Telecommunication Systems, Vol. 53, No. 4, pp. 425-438 
    22. C.-G. Liu, C.-H. Chao, C.-W. Leou and  J.-S. Li, 2012, “Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks”,The Computer Journal. Vol. 55, No. 12, pp. 1467-1458.
    23. C.-H. Lin, J.-Y. Ma, C.-S. Laih, and J.-S. Li, 2012, "MSS: Use File Format Conversion for Suppress Malicious Scripts in Multimedia", Journal of Internet Technology.Vol. 13.No. 5 , 2012, pp. 843-852.
    24. J.-S. Li, K.-H. Liu, N. Chilamkurti, L. Shu and T. Q. Duong, 2012, "Scheduling Performance Enhancement by Network Coding in Wireless Mesh Networks", IET Communications, Vol. 6, No. 13, pp. 1912-1919.
    25. J.-S. Li, K.-H. Liu, and C.-H. Wu, 2012, "Efficient Real-time Group Multicast Node Scheduling Schemes in Multi-hop Wireless Networks", Computer Communications, Vol. 35, No. 10, pp. 1247-1258.
    26. J.-S. Li and K.-H. Liu, 2012, “Network-coding-based Cache Policy for Loss Recovery Enhancement in Reliable Multicast”, International Journal of Network Management. Vol. 22, No. 4, pp. 330-345.
    27. K.-H. Liu, J.-S. Li, C.-Y. Wang, N. Chilamkurti and T. Vasilakos, 2012, “Minimizing Multi-player Interactive Delay in Multihop Wireless Networks”,International Journal of Communication Systems. Vol. 25, No. 10, pp. 1330-1349.
    28. C.-B. Jiang and J.-S. Li, 2012, “IP Flow Data Correlation with Interference Rules”, Advanced Materials Research, Vol. 406, No. 1, pp. 1211-1214.

 (B)研討會論文

    1. 安家駒劉奕賢李儂偉李忠憲, 2016, “區塊鏈技術實現跨組織認證架構”, TANET 2016, October. 19-21, Hualien, Taiwan.
    2. 張成睿劉奕賢劉川綱李忠憲, 2016, “雲端資料加密環境下的多關鍵字搜尋技術探討”, TANET 2016, October. 19-21, Hualien, Taiwan.
    3. 陳佳秀劉奕賢蔡一郎李忠憲, 2016, “雲端系統虛擬帳號誘捕機制”, TANET 2016, October. 19-21, Hualien, Taiwan.
    4. 蔡金瑞劉奕賢陳信文邱志傑劉川綱李忠憲楊竹星, 2016, “網頁圖像隱私偵測系統構”, TANET 2016, October. 19-21, Hualien, Taiwan.
    5. 宋彥徵賴家齡高毓英林輝堂, 2016, “支援服務品質於分時/分波多工長距離光纖網路之即時性演算法”, TANET 2016, October. 19-21, Hualien, Taiwan.
    6. 郭振忠林季偉姚書涵楊竹星, 2016, “設計與實作基於埠號監控的殭屍網路惡意程式偵測框架”, TANET 2016, October. 19-21, Hualien, Taiwan.
    7. 陳嘉玫吳惠麟張明達曾昭銘陳怡靜, 2016, “多層次網路防護系統”, TANET 2016, October. 19-21, Hualien, Taiwan.
    8. 黃瓊瑩孫明功陳嘉玫張子敬賴谷鑫, 2016, “注入惡意DLLAPT攻擊手法研究”, TANET 2016, October. 19-21, Hualien, Taiwan.
    9. 富榮光陳嘉玫, 2016, “資訊主機監控系統設計與建置之研究”, TANET 2016, October. 19-21, Hualien, Taiwan.
    10. 涂嘉成林季偉張家綸姚書涵楊竹星, 2016, “設計與實作基於NetFlow分析的路由調整”, ITAOI2016, May. 20-21, Kaohsiung, Taiwan.
    11. 郭振忠程凱楊竹星, 2016, “設計安全的訓用暨後維管理網站平台”, CISC2016, May. 26-27, Taichung, Taiwan.
    12. 陳嘉玫賴谷鑫王奕凱, 2016, “惡意程式組件分析與關連性分群”, CISC2016, May. 26-27, Taichung, Taiwan.
    13. 陳嘉玫賴谷鑫王則堯, 2016, “以機率粗糙集合論為基礎的 HTTP-based 殭屍網路偵測”, CISC2016, May. 26-27, Taichung, Taiwan.
    14. 王子夏林致聖林輝堂, 2016, “植基於社群網路分析方法之DAG型態殭屍網路偵防研究”, CISC2016, May. 26-27, Taichung, Taiwan.
    15. Nian Xia, Chu-Sing Yang, 2016, “Recent Advances in Machine-to-Machine Communications”, IoTSC2016, May. 29-31, Nanjing, China.
    16. Shih-Hsiung Lee, Chin-Nan Hu, Chu-Sing Yang, 2016, “Token-oriented based for Internet of Things and Clouding computing services”, ICC2016, March. 22-23, Cambridge, United Kingdom.
    17. Chia-Mei Chen, Sung-Chien HSU, Gu-Hsin Lai, 2016, “Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks”, ICGEC2016, November. 7-9Fuzhou City, Fujian Province, China.
    18. Chia-Mei Chen, Gu-Hsin Lai, 2016, “Detecting Command and Control Servers Using Ant Colony Optimization”, ICCSIT 2016, December. 7-12Limerick City, Ireland.
    19. Shi-Hao Wang, Chia-Mei Chen, Gu-Hsin Lai, 2016, “Exploring Cross-Site Scripting Botnet Detection and Simulation”, PACIS2016, June 27- July 1Chiayi, Taiwan.
    20. Chia-Mei Chen, Gu-Hsin Lai, Pong-Yu Young, 2016, “Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection”, AsiaJCIS2016, August 4-5, Fukuoka, Japan.
    21. Chia-mei Chen, Han-wei Hsiao, Tien-ho Chang, 2016, “The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs”, MobiSec2016, July 13-16Taichung, Taiwan.
    22. S.-C Tsai, I.- Liu, C.-T Lu, B.-L Chen, J.-S Li, 2016, “Factor Impact of Virtual Switch Performance by Factorial Design in Cloud Computing”, ICS2016, December. 15-17Chiayi, Taiwan. 
    23. C.-B Jiang, I.-H Liu, C.-G Liu, Y.-C Chen, J.-S Li, 2016, “Distributed Log System in Cloud Digital Forensics”, ICS2016, December. 15-17, Chiayi, Taiwan. 
    24. S.-C Tsai, I.-H Liu, C.-T Lu, C.-H Chang, J.-S Li, 2016, “Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network”, IIH-MSP2016, November 21-23, Kaohsiung, Taiwan. 
    25. I-Hsien Liu, Chuan-Gang Liu, Kun-Hsuan Liu , Shun-Hsiung Yu , Zhi-Yuan Su , Jung-Shian Li, 2016, “Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks”, Qshine2016, July 7-8Seoul, South Korea.
    26. Ci-Bin Jiang , Jung-Shian Li, 2016, “Exploring Global IP-usage Patterns in Fast-Flux Service Networks”, ICICA2016, January 18-19, Brisbane, Australia.
    27. Jung-Shian Li, 2016, “Digital Forensic with Cross-Layer Log Files”, BAI2016July 3-5, Nagoya, Japan.
    28. Tzy-Shiah Wang, Hui-Tang Lin, 2016, “DGA Botnet Detection Utilizing Social Network Analysis”, IS3C2016, July 4-6, Xi'an, China.
    29. C.-M. Chen, T. Chang, 2015, “The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack”, AsiaJCIS 2015, May. 24-26, Kaohsiung, Taiwan.
    30. I-Hsien Liu, Chun-Kai Lin, and Jung-Shian Li, 2015, “An enhancing video streaming scheme over hybrid VANET”, AROB 2015, Jan. 21-23, Beppu, Japan.
    31. 許凱竣郭振忠楊竹星, 2015, 基於靜態分析之可攜式文件格式檔案過濾系統”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
    32. 陳嘉玫王士豪, 2015, 漸進式惡意程式分類方法”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
    33. 陳嘉玫王則堯羅文翎, 2015, 智慧型僵屍網路偵測”, CISC2015, May. 28-29, Kaohsiung, Taiwan.
    34. I-Hsien Liu, Tian-Li Wang, and Jung-Shian Li, 2014, “An Effective Group Communications in Hybrid VANET”, ICS 2014, Dec. 12-14, Taichung, Taiwan.(Best Poster Award)
    35. 郭振忠歐雅惠劉奕賢王子夏郭鎮穎陳嘉玫李忠憲林輝堂楊竹星, 2014, “網路威脅搜捕、分析、追蹤與過濾技術之研究”, Cyberspace 2014, Dec. 5, Taipei, Taiwan.
    36. 郭振忠盧建同林敬皇李忠憲楊竹星, 2013, “基於測試平台之網路攻防演練活動設計與實作”, NCS 2013, Dec. 13-14, Taichung, Taiwan.
    37. 陳怡臻、劉奕賢、盧建同、方泰鈞、李忠憲, 2013, “雲端分散式日誌搜集方法”, NST 2013, Nov. 14-16, Tainan, Taiwan.
    38. 劉奕賢蔡舜智江啟賓張家瑋安家駒李忠憲, 2013, “結構化惡意程式資料庫系統 ”, TANET 2013, Oct. 23-25, Taichung, Taiwan.
    39. Chuan-Gang Liu, Chuan-Kang Kao, Huoc-Yong Koo, and Jung-Shian Li, 2013 “A Novel Group-based Location Service Management Scheme in VANETs”, ICICN 2013, Jan. 19-20, Singapore.
    40. 謝哲人,劉奕賢,黃證翰,方泰鈞,李忠憲, 2012, “校園網路動態目錄服務與Google Apps學術雲端服務整合之研究”, TANET 2012, Oct. 23-25, Taichung, Taiwan.
    41. 林敬皇盧建同李忠憲楊竹星, 2012, “網路攻擊與防禦平台之研究與實作”, CISC 2012, May 30-31, Tai-Chung, Taiwan.
    42. Jung-Shian Li, I-Hsien Liu, Kun-Hsuan Liu, and Shun-Hsiung Yu, 2012 , “Schedule Multi-player Online Game Transmission Services in Wireless Multi-hop Networks”, MASS 2012,  Aug. 10-12, Shanghai, China.

媒體著作 (回 成果亮點)     


專業證照 (回 成果亮點

資訊安全

1.          EC-Council Computer Hacking Forensic Investigator v8

2.          EC-Council Certified Ethical Hacker v8

3.          CompTIA Security+ ce certificate (COMP001020596063)

4.          International Computer Driving Licence / European Computer Driving License Foundation IT Security 2.0

5.          趨勢科技 Trend Corporate AntiVirus Engineer (TCAE)

6.          SGS BS10012個人資訊管理系統主導稽核員訓練合格

勞委會及其他政府機關

1.          經濟部 資訊專業人員認證(ITE) 網路通訊+網路規劃與設計 (NC+NP-ITE-01114-55)

2.          經濟部 資訊專業人員認證(ITE) 網路通訊 (NC-ITE-0719-3)

3.          經濟部 資訊專業人員認證(ITE) 資訊管理 (IM-ITE040280)

系統管理

1.          LPI Advanced Level Linux Professional (LPI000209620)

2.          LPI Junior Level Linux Professional (LPI000209620)

3.          Microsoft MCSE- Microsoft Windows Server 2003 (3184703)

4.          Microsoft MCSA- Microsoft Windows Server 2003 (3184703)

5.          Microsoft MCITP-Enterprise Support Technician on Windows Vista (3184703)

6.          Microsoft MCTS-Microsoft Windows Vista, Configuration (3184703)

7.          Microsoft Certified Professional (3184703)

8.          Microsoft MTA-Server Administration (3184703)

9.          Microsoft MTA-Networking Fundamentals (3184703)

10.      Microsoft MTA-Windows Operating System (3184703)

11.      HP Accredited Technical Associate: Cloud (HP ATA-Cloud)

12.      HP Accredited Technical Associate: Connected Devices (HP ATA-CD)

13.      HP Accredited Technical Associate: IT Architect (HP ATA-ITA)

14.      HP Accredited Technical Associate: IT for Business (HP ATA-ITB)

15.      HP Accredited Technical Associate: Networks (HP ATA- NET)

16.      HP Accredited Technical Associate: Servers & Storage (HP ATA- SS)

17.      Novell Certified Linux Administrator

18.      Novell PartnerNet Data Center Technical Specialist

系統開發/程式設計

1.          SUN Certified Programmer for JAVA 1.2 (SUN153907)

2.          SUN Certified Web Component Developer for JAVA 1.4 (SUN153907)

3.          Microsoft MCSD- Microsoft Visual Studio 6.0 (3184703)

4.          Microsoft MCTS-Windows Embedded CE 6.0 Developer (3184703)

5.          Microsoft Certified of Completion Windows XP Embedded Training (3184703)

6.          Microsoft Certified of Completion Windows CE Embedded Training (3184703)

資料庫系統

1.          Oracle 8i Database Administrator Certified Professional (SR1409333)

2.          Oracle 9i Database Administrator Certified Associate (SR1409333)

3.          Microsoft MCDBA- Microsoft SQL Server 2000 (3184703)

4.          Microsoft MTA-Database Administration (3184703)

中心榮譽 (回 成果亮點

1.          2014 International Computer Symposium (ICS) Best Poster Award

2.          2014 Cyberspace雲端服務應用、安全與稽核研討會 大會學術論文獎

3.          2005 經濟部 資訊專業人員鑑定-尋找網路達人活動 全國第三名