Patrick S. Chen

According to our database1, Patrick S. Chen authored at least 21 papers between 2000 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015

The Classification of Information Assets and Risk Assessment: An Exploratory Study using the Case of C-Bank.
J. Glob. Inf. Manag., 2015

Effects of virtualization on information security.
Comput. Stand. Interfaces, 2015

A verification protocol of mobile payment based on signature recognition.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

A novel method of mining network flow to detect P2P botnets.
Peer-to-Peer Netw. Appl., 2014

2013
Coding behavior of authentication code on the internet.
Comput. Hum. Behav., 2013

Parameter identification study of a trilayer conjugated polymer actuator curvature model.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

2010
An Emergent Traffic Messaging Service Using Wireless Technology.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

2008
Discovering Investigation Clues through Mining Criminal Databases.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Preservation of Evidence in Case of Online Gaming Crime.
Proceedings of the Intelligence and Security Informatics, 2008

2006
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

2005
An analysis of online gaming crime characteristics.
Internet Res., 2005

Improved inventory models with service level and lead time.
Comput. Oper. Res., 2005

Standardizing the Construction of a Digital Forensics Laboratory.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

2004
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan.
Proceedings of the Second Annual Conference on Privacy, 2004

2003
Note on supplier-restricted order quantity under temporary price discounts.
Math. Methods Oper. Res., 2003

2002
A note on inventory replenishment policies for deteriorating items in an exponentially declining market.
Comput. Oper. Res., 2002

2001
A note for "On an inventory model for deteriorating items and time-varying demand".
Math. Methods Oper. Res., 2001

The impact of time-varying demand and production rates on determining inventory policy.
Math. Methods Oper. Res., 2001

2000
An Automatic System for Collecting Crime Information on the Internet.
J. Inf. Law Technol., 2000


  Loading...