Li-Chiou Chen

According to our database1, Li-Chiou Chen authored at least 29 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Perceived security of BYOD devices in medical institutions.
Int. J. Medical Informatics, 2022

2021
A dictionary-based method for detecting machine-generated domains.
Inf. Secur. J. A Glob. Perspect., 2021

Understanding Nigerian e-mail scams: A computational content analysis approach.
Inf. Secur. J. A Glob. Perspect., 2021

Analyzing Students' Problem-Solving Abilities in a Virtual Network on the Cloud.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

2020
Carp: A cost-aware relaxed protocol for encrypted data stores.
J. Inf. Secur. Appl., 2020

Applying Text Analytics to Examination of End Users' Mental Models of Cybersecurity.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Using Raspberry Pi as a Platform for Teaching Cybersecurity Concepts.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Individual Risk Perception and Choice using Cryptocurrency for Transactions.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Seed-based authentication for mobile clients across multiple devices.
Inf. Secur. J. A Glob. Perspect., 2018

2017
A comparison of classifiers and features for authorship authentication of social networking messages.
Concurr. Comput. Pract. Exp., 2017

2016
An Analysis of Server-Side Design for Seed-Based Mobile Authentication.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Image-Based Seed Generation.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Embedding Model-Based Security Policies in Software Development.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Multi Seed Authentication Using S/Key Scheme.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Electronic Health Record Error Prevention Approach Using Ontology in Big Data.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Seed-based authentication.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
Authorship Authentication Using Short Messages from Social Networking Sites.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

2012
Teaching Web Security using Portable Virtual Labs.
J. Educ. Technol. Soc., 2012

2010
An Integrated Model of Individual Web Security Behavior.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

Secure Web Development Teaching Modules.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
A Hands-on Introduction to GIS with a Simple Application to Wi-Fi Security.
Proceedings of the 15th Americas Conference on Information Systems, 2009

An Investigation of Decision-Making and the Tradeoffs involving Computer Security Risk.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2006
BioWar: Scalable Agent-Based Model of Bioattacks.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Model alignment of anthrax attack simulations.
Decis. Support Syst., 2006

2004
The impact of countermeasure propagation on the prevalence of computer viruses.
IEEE Trans. Syst. Man Cybern. Part B, 2004

Characterization of defense mechanisms against distributed denial of service attacks.
Comput. Secur., 2004

Aligning Simulation Models of Smallpox Outbreaks.
Proceedings of the Intelligence and Security Informatics, 2004

The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...