Chun-Jen Chung

Orcid: 0000-0002-8873-2382

According to our database1, Chun-Jen Chung authored at least 28 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Southbound Message Delivery With Virtual Network Topology Awareness in Clouds.
IEEE/ACM Trans. Netw., February, 2023

2022
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning.
IEEE Trans. Netw. Serv. Manag., 2022

Security Challenges for Modern Data Centers with IoT: A Preliminary Study.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

2019
Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs.
Proceedings of the ACM Conference on Global Computing Education, 2019

2018
Conceptualizing Student Engagement in Virtual Hands-on Lab: Preliminary Findings from a Computer Network Security Course (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Improving student learning performance in a virtual hands-on lab system in cybersecurity education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
A survey on the usability and practical applications of Graphical Security Models.
Comput. Sci. Rev., 2017

ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2015
Efficient Attribute-Based Comparable Data Access Control.
IEEE Trans. Computers, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

2014
SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet.
Comput. Networks, 2014

2013
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
IEEE Trans. Dependable Secur. Comput., 2013

Retailer's replenishment policy for deteriorating item in response to future cost increase and incentive-dependent sale.
Math. Comput. Model., 2013

An easy method to derive the integrated vendor-buyer production-inventory model with backordering using cost-difference rate comparison approach.
Math. Comput. Model., 2013

Investigating imperfect process and demand effects on inspection scheduling and supply chain replenishment policy.
Comput. Ind. Eng., 2013

SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Economic replenishment Plan with Imperfect Production Process and Business-Return Dependent Demand.
Asia Pac. J. Oper. Res., 2012

Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE).
Proceedings of IEEE International Conference on Communications, 2012

2010
Green-product-design value and information-technology investment on replenishment model with remanufacturing.
Int. J. Comput. Integr. Manuf., 2010

2009
A modified method to compute economic order quantities without derivatives by cost-difference comparisons.
Eur. J. Oper. Res., 2009

2007
A note on the economic lot size of the integrated vendor-buyer inventory system derived without derivatives.
Eur. J. Oper. Res., 2007

Optimizing the economic lot size of a three-stage supply chain with backordering derived without derivatives.
Eur. J. Oper. Res., 2007

Optimal replenishment Policy for an Integrated Supplier-buyer deteriorating inventory Model Considering Multiple JIT Delivery and Other Cost Functions.
Asia Pac. J. Oper. Res., 2007

2006
A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production Process.
Proceedings of the Computational Science and Its Applications, 2006


  Loading...