1. Chia-Mei Chen, D. J. Guan, Y. Z. Hwang, and Y. H. Ou (2016, Apr). Anomaly Network Intrusion Detection Using Hidden Markov Model. International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 12, No. 2, pp. 569 – 580. (EI).
2. Chia-Mei Chen, J. J. Huang, Y. H. Ou (2015, Oct). Efficient Suspicious URL Filtering Based on Reputation . Journal of Information Security and Applications (JISA), 20, 26-36. (EI).
3. Chia-Mei Chen, Hsiao-Chung Lin (2015, Apr). Detecting botnet by anomalous traffic. Journal of Information Security and Application (JISA), vol.21, 42-51. (EI).
4. Chia-Mei Chen, D. J. Guan, Qun-Kai Su (2014, Dec). Feature set identification for detecting suspicious URLs using Bayesian classification in social networks. Information Sciences (INS), vol. 289, 133-147. (SCI).
5. Chia-Mei Chen and G. H. Lai (2014, Aug). Research on Classification of Malware Source Code. Journal of Shanghai Jiaotong University. (EI).
6. Chia-Mei Chen, M. Z. Huang, Y. H. Ou (2014, Apr). Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain. Journal of Information Hiding and Multimedia Signal Processing(JIHMSP)(EI).
7. Chia-Mei Chen, S. T. Cheng, and J. H. Chou (2013, Jun). Detection of Fast-Flux Domains. Journal of Advances in Computer Networks (JACN), Vol. 1, No. 2, pp.148-152.
8. Chia-Mei Chen, S. T. Cheng, and R. Y. Zeng (2013, Jun). A Proactive Approach to Intrusion Detection and Malware Collection. Security and Communication Networks, Vol. 6, pp.844-853. (SCI). NSC 100-2218-E-100-004-MY3.
9. B. C. Jeng, D. M. Yeh, D. R. Wang, S. L Chu, and Chia-Mei Chen (2011, Jul). A Specific Effort Estimation Method Using Function Point. Journal of Information Science and Engineering, Vol. 27, pp.1363-1376. (SCI).
10. Chia-Mei Chen, G. H. Lai, C. S. Ouyang (2011, Jan). A Group-Based Deployment for Wormhole Prevention. Journal of Information Science and Engineering, Vol. 27, pp. 79-93,. (SCI).
11. H. T. Hou, Chia-Mei Chen, and B. C. Jeng (2010, May). An Optimal New-Node Placement to Enhance the Coverage of Wireless Sensor Networks. Wireless Networks, Vol.16, No.4, pp.1033-1043. (SCI).
12. Chia-Mei Chen, Y. L. Chen, H. C. Lin (2010, Mar). An efficient network intrusion detection. Computer Communications, Vol.33, No.4, pp.477-484. (SCI). NSC 96-2218-E-110-005.
13. J. L. Liu, C. W. Chou, and Chia-Mei Chen (2010, Jan). Optimising mobile base station placement using an enhanced Multi-Objective Genetic Algorithm. International Journal Business Intelligence and Data Mining, Vol.5, No.1, pp.19-42.
14. Y. Hou, Y. Chang, T. Chen, C. Laih, and Chia-Mei Chen (2010, Jan). Malicious Web Content Detection by Machine Learning. Expert Systems with Applications, Vol.37, No.1, pp.55-60. (SCI).
15. G. H. Lai, C. W. Chou, Chia-Mei Chen, and Y. H. Ou (2009, Jun). Anti-Spam Filter Based on Data Mining and Statistical Test. Studies in Computational Intelligence, Vol. 208, pp.179-192. (EI).
16. G. H. Lai, Chia-Mei Chen, C. S Laih and T. Chen (2009, Apr). A Collaborative Anti-Spam System. Expert Systems with Applications, Vol.36, No.3, pp.6645-6653. (SCI).
17. J. L. Liu and Chia-Mei Chen (2009, Feb). Improved Intelligent Genetic Algorithm Applied to Long-endurance Airfoil Optimization Design. Engineering Optimization, Vol.41, No.2, pp.137-154. (SCI).
18. Chia-Mei Chen, B. C. Jeng, G. H. Lai (2008, May). Ant-Based IP Traceback. Expert Systems with Applications, Vol.34, No.4, pp.3071-3080. (SCI). NSC 94-2213-E-110-049.
19. Chia-Mei Chen, C. P. Wei (2008, Jan). Efficient Network Monitoring for Large Networks. Journal of Computer, Vol.18, No.4. (SCI). NSC 96-2218-E-110-005.
20. G. H. Lai , Chia-Mei Chen (2008, Jan). Detecting Denial of Service Attacks in Sensor Networks. Journal of Computers, Vol.18, No.4. (SCI). NSC 96-2219-E-006-009.
21. H. C. Wang, B. C. Jeng, Chia-Mei Chen (2007). Structural Testing Using a Memetic Algorithm. Journal of Software Engineering Studies (JSES), Vol.4, No.2.
22. Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai (2006, Apr). Tracing Denial of Service Origin: Ant Colony Approach. Lecture Notes in Computer Science: Applications of Evolutionary Computing, Vol.3907, pp.286-295. (SCI).
23. H. M. Sun, Chia- Mei Chen and L. C. Shu (2005, Jan). Object-based Multimedia Scheduling Based on Bipartite Graph. IEICE Trans. Communications, Vol.88, No.1, pp.372-383. (SCI).
24. Chia- Mei Chen, H. M. Sun and L. C. Shu (2004, Sep). Optimize Object-based Multimedia Delivery Across Bandwidth Constrainted Networks. Computer Journal, Vol. 47, No. 5. (SCI).
25. S. T. Cheng, C. Chen, C. Li, and Chia-Mei Chen (2002, Jan). Network topology management in a mobile-switch ATM network: dynamic partition algorithms. International Journal of Network Management, Vol. 12, No. 2, pp. 99-115. (EI).
26. S. T. Cheng, Chia-Mei Chen, and S. K. Tripathi (2000, Dec). A Fault-Tolerant Model for Multiprocessor Real-Time Systems. Journal of Computer and Systems Sciences, Vol. 61, No. 3, pp. 457-477. (SCI).
27. S.T. Cheng, Chia-Mei Chen, and H. T. Liu (2000, May). Dynamic Round-based Resource Management for On-Demand Multimedia Servers. Computer Journal, Vol. 43, No.5, pp. 386-395. (SCI).
28. S. T. Cheng, Chia-Mei Chen, and J. W. Hwang (1998, Sep). Low Power Design for Real-Time Systems. Real-Time System. (SCI).
29. S. T. Cheng and Chia-Mei Chen (1998, Mar). Temporal Analysis and Algorithms for Real-Time Scheduling and Allocation. IJCA International Journal of Computers and Their Applications.
30. Chia-Mei Chen, S. I. Hwang, and S. K. Tripathi (1995, Dec). A Performance Study of Real-Time Optimistic Concurrency Control with the Knowledge of Execution Time. ISCA International Journal of Computers and Their Applications.
31. Chia-Mei Chen and W. H. Tsai (1986, Oct). Automatic Identification of Chinese Seal Imprints with Arbitrary or Partial Shapes. Computer Processing of Chinese and Oriental Languages.
32. 陳嘉玫、賴谷鑫(2015年12月)。基於漸增式分群法之惡意程式自動分類研究。電子商務學報 (TSSCI) 。
33. 陳嘉玫、林哲銘、歐雅惠、賴谷鑫(2015年09月)。以汙染傳遞為基礎之行動軟體威脅行為偵測。電子商務學報 (TSSCI),pp. 375-391。
34. 王士豪、陳嘉玫(2015年03月)。QR Code智慧型藥袋藥物影音查詢系統。管理資訊計算。
35. 陳嘉玫, 江玟璟, 歐雅惠(2014年09月)。開放資料應用於行動惡意程式分析研究。電子商務研究期刊,319-335。
36. 陳嘉玫,黃哲諄,歐雅惠(2014年07月)。以信譽機制為基礎之巨量資料偵測可疑網址。資訊安全通訊。
37. 陳嘉玫、楊佳蕙、賴谷鑫(2013年12月)。基於結構相似度之惡意程式原始碼分類研究。電子商務學報,519-539。(TSSCI)。
38. 官大智、陳嘉玫、林家賓、王則堯(2012年07月)。以異常為基礎之即時通訊惡意網址偵測。資訊管理學報,Vol.19, No.3, pp.567-589。(TSSCI)。國科會:100-2218-E-110-011。
39. 陳嘉玫、官大智、陳怡綾(2012年07月)。以行為為基礎偵測異常IRC 流量。資訊安全通訊 (Communications of the CCISA),Vol.18, No.3, pp.32-47。國科會:100-2218-E-110-011。
40. 侯雍聰、陳嘉玫(2011年03月)。以異常行為為基礎之即時惡意網頁偵測之研究。電子商務學報 (Journal of e-Business),Vol.1, pp.117-134。(TSSCI)。
41. 賴谷鑫、周照偉、陳嘉玫(2009年12月)。結合資料探勘與統計檢定之垃圾郵件過濾器之研究。電子商務學報,Vol.11, No.4, pp.773-792。(TSSCI)。
1. 梁定澎,陳嘉玫(2000年)。電子商務理論與實務,第四章網路安全。華泰文化出版。
1. Chia-Mei Chen, J. J. Huang, Y. H Ou. Detecting Web Attacks Based on Domain Statistics. Lecture Notes in Computer Science . Aug, 2013: Vol.8039, pp. 97-106.
2. Chia-Mei Chen, M. Z. Huang, and Y. H. Ou. Detecting Web-Based Botnets with Fast-flux Domains. Advances in Intelligent Systems and Applications - Volume 2 Smart Innovation, Systems and Technologies . 2013: Vol. 21, pp. 79-89.
3. Y. T. Hou, Chia-Mei Chen, B. C. Jeng . A Key Predistribution Scheme for Wireless Sensor Network Using the Small-World Concept. Lecture Notes in Computer Science (LNCS). Sep, 2007: 4658, 137-146.
1. Chia-Mei Chen, Han Wei Hsiao and Tienho Chang (2016, Jul). The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs. The 2016 International Symposium on Mobile Internet Security (MobiSec).
2. Chia-Mei Chen, Gu-Hsin Lai (2016). Detecting Command and Control Servers Using Ant Colony Optimization. The International Conference on Computer Science and Information Technology (ICCSIT 2016).
3. Chia-Mei Chen, Gu-Hsin Lai, Pong-Yu Young (2016). Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection. The 11th Asia Joint Conference on Information Security (AsiaJCIS 2016).
4. S. H. Wang, Chia-Mei Chen, G. S. Lai (2016). Exploring Cross-site Scripting Botnet Detection and Simulation. The 20th Pacific Asia Conference on Information Systems (PACIS 2016).
5. Chia-Mei Chen and T. Chang (2015, May). The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, An Advanced and Efficient Method. AsiaJCIS 2015.
6. Chia-Mei Chen and Gu-Hsin Lai (2015). Classifying Targeted Email Attacks. 2015 National Computer Symposium (NCS 2015).
7. Chia-Mei Chen, G. H. Lai, Y. H. Tsai, and S. T. Cheng (2015). Classifying Anomalous Mobile Applications Based on Data Flows. The Fourteen International Conference on Networks (ICN).
8. Chia-Mei Chen, S. C. Hsu, and G. H. Lai (2015). Defense DoS Attacks on IPv6 Wireless Sensor Networks. The Ninth International Conference on Genetic and Evolutionary Computing (ICGEC 2015).
9. G. H. Lai and Chia-Mei Chen (2014, Dec). An Efficient Honeypot Based Malware Classification System . ICS2014.
10. Chia-Mei Chen, J. M. Lin and G. H. Lai (2014, Jun). Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code. 1st International Conference on Trustworthy Systems and Their Applications (TSA 2014).
11. Chia-Mei Chen, P. Y. Yang, Y. H. Ou, H. W. Hsia (2014, May). Targeted Attack Prevention at Early Stage. The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014).
12. Gu-Hsin Lai, Chia-Mei Chen, Yu-Yun Le (2013, Dec). Botnet Server Detection Using Ant Algorithm. 全國計算機會議(NCS2013).
13. Chia-Mei Chen, G. H. Lai, Y. Y. Le, and J. C. Fan (2013, Aug). Botnet Threat Traceback for Open Network Environments. Cross-Strait Conference on Information Management Development and Strategy (CSIM 2013).
14. Chia-Mei Chen, H. W. Hsiao, P. Y. Yang, and Y. H. Ou (2013, Aug). Defending Malicious Attacks in Cyber Physical Systems. Cyber-Physical Systems, Networks, and Applications (CPSNA2013).
15. Chia-Mei Chen, J. J. Huang, Y. H. Ou (2013, Aug). Detecting Web Attacks Based on Domain Statistics. Pacific Asia on Intelligence and Security Informatics( PAISI2013).
16. Chia-Mei Chen, S. T. Cheng, J. H. Chou (2013, Apr). Efficient Detection of Fast-Flux Domains. 2013 The 5th International Conference on Computer Engineering and Technology(ICCET 2013).
17. Chia-Mei Chen, D.J. Guan, Y. Z. Huang, and Y. H Ou (2013, Feb). State-based Attack Detection for Cloud. International Symposium on Next-Generation Electronics (ISNE2013) .
18. H. Lin and Chia-Mei Chen (2013). Centralized Botnet Detection Using Network Analysis. 2013 International Conference on Electronic Engineering and Computer Science (EECS 2013).
19. Chia-Mei Chen, M. Z. Huang, Y. H. Ou (2012, Dec). Detecting Web-Based Botnets with Fast-flux Domains. International Computer Symposium (ICS2012).
20. Chia-Mei Chen, S. T. Cheng, J. H. Chou, Y. H. Ou (2012, Dec). Formulistic detection of Malicious Fast-Flux Domains. IEEE International Symposium on Parallel Architectures, Algorithms and Programming (PAAP 2012).
21. Chia-Mei Chen, D. J. Guan, Y. Z. Huang, and Y. H. Ou (2012, Aug). Attack Sequence Detection in Cloud Using Hidden Markov Model. The Asia Joint Conference on Information Security (AsiaJCIS 2012).
22. Chia-Mei Chen, J. J. Huang, Y. H. Ou (2012, Aug). Detecting Drive-by Download Attacks Based on Reputation Criteria. Asia Pacific Wireless Communications Symposium ( APWCS2012).
23. Chia-Mei Chen, D. J. Guan, Q. K. Su, and S. T. Cheng (2012, Jul). Detecting Suspicious URLs in Social Network Service. The 2012 IEEE International Conference on Computing and Security (ICCS 2012).
24. Chia-Mei Chen, Y. H. Ou, J. J. Huang (2012, Jul). Detecting Web Attacks Based on Domain Reputation. The 2012 IEEE International Conference on Computing and Security (ICCS 2012).
25. Chia-Mei Chen and Y. H. Ou (2011, Dec). Secure Mechanism for Mobile Web Browsing. IEEE ICPADS 2011 Joint Workshop on Network and System Security (ICPADS 2011). NSC 99-2220-E-110-002.
26. Chia-Mei Chen, D. J. Guan, Q. K Su, and T. Y Wang (2011, Oct). Malicious URL Detection on Facebook. The Sixth Joint Workshop on Information Security (JWIS 2011).
27. Chia-Mei Chen (2011, Jul). Detecting Anomaly Mobile Web Page through Template Classification. The 11th Emerging Information and Technology Conference (EITC 2011). NSC 98-2220-E-110-011.
28. Chia-Mei Chen, Y. H. Ou, and Y. C. Tsai (2010, Dec). Web Botnet Detection Based on Flow Information. International Computer Symposium (ICS 2010).
29. Chia-Mei Chen, W. Y. Tsai., H. C. Lin (2009, Dec). Anomaly Behavior Analysis for Web Page Inspection. The First International Conference on Networks & Communications (NetCoM-2009). NSC 98-2220-E-110-011.
30. H.C. Lin, Chia-Mei Chen, J. Y. Tzeng (2009, Dec). Flow Based Botnet Detection. Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009).
31. D. J. Guan, Chia-Mei Chen, J. S. Luo, and Y. T. Hou (2009, Aug). Malicious Web Page Detection based on Anomaly Semantics. The fourth Joint Workshop on Information Security (JWIS 2009).
32. D. J. Guan, Chia-Mei Chen, and J. B. Lin, (2009, Aug). Anomaly Based Malicious URL Detection in Instant Messaging. The fourth Joint Workshop on Information Security (JWIS 2009).
33. G. H. Lai, Chia-Mei Chen, R. Y. Tzeng, C. S. Laih, and C. Faloutsos (2009, Aug). Botnet Detection by Abnormal IRC Traffic Analysis. The fourth Joint Workshop on Information Security (JWIS 2009).
34. M. Wu, Chia-Mei Chen, and C. H. Wang (2009, Aug). CPDCF for IEEE 802.11 WLANs. The Fourth International Conference on Communications and Networking in China (ChinaCOM 2009).
35. Chia-Mei Chen, W. Y. Tsai, Y. T. Hou (2009, Jun). Malicious Webpage Detection . 21th Annual FIRST conference (FIRST 2009) .
36. S. F. Lin, Y. T. Hou, Chia-Mei Chen, and B. C. Jeng (2008, Nov). Malicious Webpage Detection by Semantics-Aware Reasoning. IEEE Intelligent System Design and Application Conference (ISDA 2008).
37. G. H. Lai, C. S. Ouyang, Chia-Mei Chen (2008, Sep). A Group-based Deployment for Wormhole Prevention in Sensor Networks. The 14th International Conference on Distributed Multimedia Systems (DMS 2010).
38. G. H. Lai, Chia-Mei Chen, Y. F. Chiu, C. S. Laih, and T. Chen (2008, Jun). A Collaborative Approach to Anti-Spam . 20th Annual FIRST Conference (FIRST 2008).
39. Y. C. Cheng, C. S. Laih, G. H. Lai, Chia-Mei Chen, T. Chen (2008, Mar). Defending On-Line Web Application Security with User-Behavior Surveillance. Third International Conference on Availability, Reliability and Security (ARES 2008).
40. C. Y. Lee, Chia-Mei Chen, H. C. Lin (2008). Buffer Overflow Prevention Based on Binary Exploit Code. International Conference on Information Management.
41. W. Y. Lai, Chia-Mei Chen, B. C. Jeng, G. H. Lai, and H. C. Lin (2007, Nov). Information Exchange Mechanism Based on Reputation in Mobile P2P Networks. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007).
42. Y. T. Hou, Chia-Mei Chen, B. C. Jeng (2007, Nov). Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP 2007).
43. G. H. Lai, Chia-Mei Chen, B. C. Jeng (2007, Sep). DoS Detection in Cluster-based Sensor Networks. IASTED International Conference on Communication, Network and Information Security (CNIS 2007).
44. Y. F. Chiu, Chia-Mei Chen, B. C. Jeng, and H. C. Lin (2007, Aug). An Alliance-based Anti-Spam Approach. International Conference on Natural Computation (ICNC 2007).
45. 林士棻、陳嘉玫、鄭炳強 (2007, May). 以模式基礎推論用於偵測惡意動態網頁之研究. 第17屆資訊安全會議(CISC 2007).
46. Chia-Mei Chen, B. C. Jeng, G. H. Lai, C. L. Wang (2007, Jan). Adaptive Clustering for Sensor Network. International Conference in IT and Application (ICITA) sponsored by IEEE NSW Section.
47. S. T. Cheng, C. Y. Wang, and Chia-Mei Chen (2006, Jul). An Adaptive Data Broadcasting for Wireless Access. the IASTED International Conference on Wireless Network and Emerging Technologies (WNET 2006).
48. Y. T. Hou, T. C. Lee, Chia-Mei Chen, and B. C. Jeng (2006, Jun). Node Placement for Optimal Coverage in Sensor Networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC).
49. Chia-Mei Chen, B. C. Jeng, C. R. Yang, and G. H. Lai (2006, Apr). Tracing Denial of Service Origin: Ant Colony Approach. 3rd European Workshop on Evolutionary Computation in Communication, Networks and Connected Systems (EvoCOMNET).
50. Y. T. Hou, T. C. Lee, B. C. Jeng, and Chia-Mei Chen (2006, Feb). Optimal Coverage Deployment for Wireless Sensor Networks. International Conference on Advanced Communication Technology co-sponsored by IEEE Communications Society.
51. Chia-Mei Chen, N. S. Chen, J. S. Cheng, I. L. Lin (2005, Nov). Localization on Network Auditing System. 2005 International Forensic Science Symposium (2005 IFSS).
52. Y. L. Chen, Chia-Mei Chen, and C. Ravishankar (2005, Nov). A Lightweight Network Intrusion Detection. 2005 International Forensic Science Symposium (2005 IFSS).
53. Chia-Mei Chen, S. P. We, and J. S. Cheng (2005, Jun). Effective Network Monitor Based on Flow Traffic. 17th Annual FIRST Conference.
54. 鄭進興、陳威安、陳嘉玫、林敬皇 (2004, Oct). DNSSEC安全機制實作研究. 台灣網際網路研討會 (TANET 2004).
55. Chia-Mei Chen (2004, Feb). Analysis and Trend of Security Crime in Taiwan. Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT).
56. 陳嘉玫、鄭偉成、鄭進興、陳年興 (2003, Nov). Intrusion Detection on Distribution Attacks. 2003 第5屆「網際空間:資訊、法律與社會」學術研究暨實務研討會.
57. 陳嘉玫、吳啟常、鄭進興、陳年興 (2003, Nov). Code Automation for Vulnerability Scanner. 2003 第5屆「網際空間:資訊、法律與社會」學術研究暨實務研討會.
58. 鄭進興、沈志昌、古東明、陳嘉玫 (2003, Oct). DNS網域安全稽核防護系統之建置. 台灣網際網路研討會(TANET 2003).
59. H. M. Sun, Chia-Mei Chen, L. C. Shu (2003, Aug). Optimizing multimedia delivery over bandwidth limited networks. The 13th International Conference on Pacific Rim Management, Association for Chinese Management Educators (ACME 2003).
60. 鄭進興、沈志昌、陳嘉玫、陳年興 (2002, Oct). DNS安全檢測系統. 台灣網際網路研討會(TANET 2002).
61. H. M. Sun, Chia-Mei Chen, L. C. Shu (2002, Mar). Real-Time Scheduling for Multimedia Streams Over Resource-Constrained Networks. The 8th International Conference on Real-Time Computing Systems and Applications (RTCSA).
62. S. T. Cheng, J. P. Liu, J. L. Kao, and Chia Mei Chen (2002, Jan). A New Framework for Mobile Web Services. Symposium on Applications and the Internet (SAINT).
63. S. T. Cheng and Chia-Mei Chen (2001, Oct). Security in Personal Area Networks. The 13th Annual FIRST Computer Security Incident Handling Conference.
64. H. M. Sun, Chia-Mei Chen, L. C. Shu (2001, Mar). Real-Time Multimedia Delivery Over Wireless Networks. The 7th International Conference on Distributed Multimedia System (DMS).
65. S. K. Huang, N. S. Chen, Chia-Mei Chen, and B. J. Lin (2000). Survival Acceptability Evaluation and Incident Case Report in Taiwan. The 12th Annual FIRST Computer Security Incident Handling Conference.
66. Chia-Mei Chen and S. T. Cheng (1999). A Simple Web-Based Single Sign-On Solution. The National Information Security Conference.
67. Chia-Mei Chen , S. T. Cheng, and Y. C. Lee (1998). Secure Bank Account Purchasing in the Web. The National Information Security Conference.
68. S. T. Cheng, Chia-Mei Chen, and J. W. Hwang (1997). Low-Power Design for Real-Time Systems. The 1st International Conference on Information, Communications & Signal Processing.
69. S. I. Hwang, Chia-Mei Chen, and A. K. Agrawala (1996). Scheduling an Overloaded Real-Time System. The IEEE International Phoenix Conference on Computers and Communications.
70. Chia-Mei Chen and S. K. Tripathi (1995). Fault-Tolerance Scheduling in Real-Time Systems. The ISCA International Conference on Computer Applications in Industry and Engineering.
71. Chia-Mei Chen and S. K. Tripathi (1995). An Analytical Model for the Reliability of Real-Time Systems. The IASTED International Conference on Applied Modeling, Simulation and Optimization.
72. Chia-Mei Chen, S. K. Tripathi, and S. T. Cheng (1995). Adaptive Redundancy for Fault-Tolerance Real-Time Systems. Fault-Tolerance Parallel and Distributed Systems,.
73. Chia-Mei Chen, S. K. Tripathi, and A. Blackmore (1994). A Resource Synchronization Protocol for Multiprocessor Real-Time Systems. The International Conference on Parallel Processing.
74. Chia-Mei Chen, S. K. Tripathi, and S. T. Cheng (1994). A Fault-Tolerance Model for Real-Time Systems. The IEEE Workshop on Fault-Tolerance Parallel and Distributed Systems.
75. Chia-Mei Chen and S. K. Tripathi (1993). An Optimistic Concurrency Control Algorithm in Real-Time Database Systems. The ISCA International Conference on Parallel and Distributed Computing.
76. S. T. Cheng, Chia-Mei Chen, and A. K. Agrawala (1993). Performance-Oriented Replication of Series-Parellel Graphs for Computation-Intensive Applications. The International Conference on Parallel and Distributed Systems (ICPADS).
77. 陳嘉玫, 張育涵, 賴谷鑫(2016年12月)。雲端開放資料分析運算平台之研究。第三屆Open Data學術研討會(2016 Conference on Open Data),張榮發基金會國際會議中心。本人為第一作者、通訊作者。
78. 富榮光、陳嘉玫(2016年)。資訊主機監控系統設計與建置之研究。TANET 2016。
79. 陳嘉玫、吳惠麟、張明達、曾昭銘、陳怡靜(2016年)。多層次網路防護系統。TANET 2016。
80. 陳嘉玫、歐雅惠、賴谷鑫(2016年)。利用約略集合理論折減特徵以偵測網路攻擊。全國資訊安全會議 (CISC 2016)。
81. 陳嘉玫、王則堯、賴谷鑫、劉賓陽(2016年)。以機率粗糙集合論為基礎的http-based殭屍網路偵測。全國資訊安全會議 (CISC 2016)。
82. 陳嘉玫、賴谷鑫、王奕凱(2016年)。惡意程式組件分析與關連性分群。全國資訊安全會議(CISC 2016)。
83. 黃瓊瑩、孫明功、陳嘉玫、張子敬、賴谷鑫(2016年)。注入惡意DLL之APT攻擊手法研究。TANET 2016。
84. 王士豪、陳嘉玫(2015年05月)。漸進式惡意程式分類方法。第二十五屆全國資訊安全會議。
85. 陳嘉玫、王則堯、羅文翎(2015年05月)。智慧型僵屍網路偵測。第二十五屆全國資訊安全會議。
86. 王士豪、陳嘉玫(2015年)。漸進式惡意程式分類方法。全國資訊安全會議 (CISC 2015)。
87. 陳嘉玫、歐雅惠、賴谷鑫(2015年)。基於隱含狄利克雷分布模型長時間追蹤多階段目標攻擊。2015Cyberspace 聯合研討會。
88. 陳嘉玫、王則堯、羅文翎(2015年)。智慧型殭屍網路偵測。全國資訊安全會議 (CISC 2015)。
89. 陳嘉玫、賴谷鑫、曾琳銘(2015年)。異常檔案行為的惡意軟體偵測。2015 第九屆海峽兩岸資訊科學與技術交流研討。
90. 陳嘉玫、賴谷鑫、曾琳銘、張明達、陳怡靜、吳惠麟、曾昭銘(2015年)。異常檔案行為的惡意軟體偵測。海峽兩岸學術交流論壇 (CSCIST 2015)。
91. 陳嘉玫、賴季苹、楊竹星、李宗憲、林輝堂(2015年)。以貝式網路為基礎之目標式攻擊偵測。全國計算機會議 2015 National Computer Symposium (NCS 2015)。
92. 陳嘉玫、林俊吾、張哲誠、賴谷鑫(2015年)。偵測進階持續性滲透攻擊之研究。全國資訊安全會議 (CISC 2015)。
93. 郭振忠、歐雅惠、劉奕賢、王子夏、郭鎮穎、陳嘉玫、李忠憲、林輝堂、楊竹星(2014年09月)。網路威脅搜捕、分析、追蹤與過濾技術之研究。2014Cyberspace「雲端服務應用、安全與稽核」研討會。
94. 陳嘉玫、賴谷鑫、歐雅惠(2014年05月)。IPv6 網路環境威脅以及偵測工具 之研究。第四屆網路智能與應用研討會。
95. 陳嘉玫、賴谷鑫、黃僑偉(2014年05月)。基於漸增式分群法之惡意程式自動分類研究。第二十四屆全國資訊安全會議。
96. 曾琳銘, 林孝忠 陳嘉玫(2013年12月)。植基於SVM之惡意軟體分析機制。全國計算機會議(NCS2013)。
97. 陳嘉玫、張哲誠、歐雅惠、林俊吾、賴谷鑫(2013年12月)。使用隱藏馬可夫模型偵測持續性滲透攻擊之研究。全國計算機會議(NCS2013)。
98. 陳嘉玫、林蕙君、王則堯(2013年12月)。惡意郵件社交工程防範作業有效性之研究。第十九屆資訊管理暨實務研討會(IMP2013)。
99. 陳嘉玫、江玟璟、歐雅惠(2013年11月)。開放資料應用於行動惡意程式分析研究。2013 Open data 學術研討會。
100. 陳嘉玫、江玟璟、吳惠麟、陳怡靜、曾昭明(2013年10月)。基於資料外洩的行動惡意程式行為分析。台灣網際網路研討會(TANET2013)。
101. 陳嘉玫、李玉雲、賴谷鑫(2013年05月)。以螞蟻演算法為基礎之殭屍網路命令與控制伺服器朔源研究。第23屆資訊安全會議(CISC2013)。
102. 陳嘉玫、楊佳蕙、賴谷鑫(2013年)。惡意程式原始碼分類研究。第二屆海峽兩岸資安研討會。
103. 陳嘉玫、李玉雲、賴谷鑫(2012年12月)。以螞蟻演算法偵測殭屍網路之命令與控制伺服器。2012資訊安全技術創新應用研討會。
104. 陳嘉玫、蔡旻螢、曾瑞瑜、陳怡靜、張明達、吳惠麟(2012年10月)。多功能惡意程式行為研究。台灣網際網路研討會(TANET 2012)。國科會:100-2218-E-110-011。
105. 陳嘉玫、蔡旻螢(2012年05月)。多節點異常警告之關聯研究 。第二十二屆資訊安全會議 (CISC 2012)。國科會:100-2218-E-110-011。
106. 陳嘉玫、蕭漢威、李宗南、楊中皇、楊鵬宇(2012年05月)。偵測聯合攻擊之研究。第二十三屆國際資訊管理學術研討會 (ICIM 2012)。國科會:100-2218-E-110-011。
107. 陳嘉玫、王則堯、蔡閎亘(2012年)。簡潔化惡意軟體行為分析。第二十三屆國際資訊管理學術研討會 (ICIM 2012)。國科會:100-2218-E-100-004-MY3。
108. 陳嘉玫、歐雅惠、黃銘宗(2011年05月)。偵測具有動態網域特性的殭屍網路。第二十一屆資訊安全會議 (CISC 2011)。國科會:98-2220-E-110-011。
109. 陳嘉玫、吳惠麟、王則堯(2010年12月)。惡意網站軟體誘捕系統。2010資訊安全技術創新應用研討會。
110. 陳嘉玫、歐雅惠、林士棻(2010年12月)。行動裝置安全瀏覽網頁之機制。 IMP 2010 第十六屆資訊管理暨實務研討會。
111. 陳嘉玫、洪瑞麟、林孝忠、吳惠麟(2010年10月)。以Linux系統為基礎之日誌檔樣式化研究。台灣網際網路研討會(TANET 2010)。
112. 蔡育洲, 林孝忠, 陳嘉玫(2009年09月)。植基於Flow 資訊之網頁為基礎之殭屍網路偵測。全國計算機會議 (NCS 2009)。
113. 曾瑞瑜、陳嘉玫、賴谷鑫、鄭憲宗(2009年05月)。區域網路內殭屍網路偵測與追蹤。第19屆資訊安全會議(CISC 2009)。
114. 林士強、陳嘉玫、林孝忠(2009年05月)。在行動P2P 網路環境中的集購資訊散播率之研究。第20屆國際資訊管理學術研討會─資訊科技與創新(ICIM 2009)。
115. 陳嘉玫、侯雍聰(2007年11月)。Linux 開放架構下數位生活家用網路安全之嵌入式平台開發。2007開放原始碼技術與應用研討會。
116. 李常友、陳嘉玫、鄭炳強、趙善中、林孝忠(2007年10月)。以關聯規則法分析攻擊探測程式之緩衝區溢位防治研究。台灣網際網路研討會 (TANET 2007)。
117. 邱郁芬、林孝忠、陳嘉玫(2006年12月)。以區域聯防為基礎之垃圾郵件防治研究。2006 數位教學暨資訊實務研討會 (2006 EITS)。
118. 曾漠益、 賴谷鑫、 陳嘉玫、 鄭炳強(2005年12月)。以約略集合理論為基礎之垃圾郵件過濾研究。第十一屆資訊管理暨實務研討會 (IMP)。
119. 曾仲強、 賴谷鑫、 陳嘉玫、 鄭炳強(2005年12月)。以支援向量機為基礎之後門程式入侵偵測。第十屆人工智慧與應用研討會 (TAAI)。
120. 邱郁芬、 賴谷鑫、 陳嘉玫、 鄭炳強(2005年12月)。以區域聯防為基礎之垃圾郵件防治研究。「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會。
121. 陳嘉玫、賴谷鑫、羅哲峰(2005年06月)。客戶需求傳輸之動態資源管理研究。資通技術管理與應用研討會 (SAICT 2005)。
122. 陳嘉玫、楊鴻鈞、賴谷鑫(2005年05月)。滿足服務品質需求之資源管理研究。第十六屆國際資訊管理學術研討會 (ICIM 2005)。
123. 陳雅玲、陳嘉玫、 鄭炳強(2005年05月)。LINIDS:輕型網路入侵偵測系統。第十六屆國際資訊管理學術研討會 (ICIM)。
124. 賴昆宜、陳嘉玫(2004年10月)。弱點掃描之區域化研究。2004 第6屆「網際空間:資訊、法律與社會」學術研究暨實務研討會。
125. 陳嘉玫、魏川弼(2004年10月)。大型網路上的網路監控。2004 第6屆「網際空間:資訊、法律與社會」學術研究暨實務研討會。
126. 陳嘉玫、王辭寒(2004年10月)。遠端攻擊入侵偵測。2004 第6屆「網際空間:資訊、法律與社會」學術研究暨實務研討會。
127. 鄭進興、林柏宇、陳嘉玫、陳年興(2002年11月)。台灣地區網路伺服器調查及安全性評估。2002 第4屆「網際空間:資訊、法律與社會」學術研究暨實務研討會。
128. 陳嘉玫、鄭進興(2001年12月)。校園網路安全性之評估。2001 第3屆「網際空間:資訊、法律與社會」學術研究暨實務研討會。
129. 黃世昆、陳嘉玫、陳年興、賴冠州(2001年05月)。「政府網路安全性之評估。第十一屆全國資訊安全會議(CISC 2001)。
130. 林秉忠、陳嘉玫、陳年興、黃世昆(2000年)。「台灣網路安全性之評估。第十屆全國資訊安全會議。
131. 張平河、陳嘉玫、王貴英(1999年)。大型企業分散式資訊系統之安全管理。第十屆國際資訊管理學識研討會。
1. Chia-Mei Chen and N. Roussopoulos (1991). Evaluation of Transferring Files Through RPC and TCP Approaches.
2. Chia-Mei Chen and Satish K. Tripathi ( ). Multiprocessor Priority Ceiling-Based Protocols.
3. Chia-Mei Chen(1995年)。“Scheduling Issues in Real-Time Systems。
1. 陳嘉玫(2010年)。漫談網路安全之社交工程 (科學發展月刊)。