Hai-Cheng Chu

According to our database1, Hai-Cheng Chu authored at least 24 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect.
Mob. Networks Appl., 2019

2016
Efficient identity authentication and encryption technique for high throughput RFID system.
Secur. Commun. Networks, 2016

The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows.
Secur. Commun. Networks, 2016

Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts.
Secur. Commun. Networks, 2016

The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia.
Multim. Tools Appl., 2016

2015
The Digital Fingerprinting Analysis Concerning <i>Google Calendar</i> under Ubiquitous Mobile Computing Era.
Symmetry, 2015

Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
Symmetry, 2015

Scheduling contention-free broadcasts in heterogeneous networks.
Int. J. Commun. Syst., 2015

The Cooperation Mechanism of Multi-agent Systems with Respect to Big Data from Customer Relationship Management Aspect.
Proceedings of the Intelligent Information and Database Systems - 7th Asian Conference, 2015

2014
The digital forensics of GPS path records and the discovery of previous Facebook IDs on a Pocket PC PDA.
Secur. Commun. Networks, 2014

Digital evidence discovery of networked multimedia smart devices based on social networking activities.
Multim. Tools Appl., 2014

2013
The disclosure of an Android smartphone's digital footprint respecting the Instant Messaging utilizing Skype and MSN.
Electron. Commer. Res., 2013

An Efficient Method for Optimizing RFID Reader Deployment and Energy Saving
CoRR, 2013

2012
A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition.
Secur. Commun. Networks, 2012

The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Information retrieval concerning attitudinal and motivational antecedents of contribution concerning web 2.0 online rescue activities based on the pervasive it education.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Innovative Semantic Web Services for Next Generation Academic Electronic Library via Web 3.0 via Distributed Artificial Intelligence.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments.
Wirel. Pers. Commun., 2011

The digital forensics of portable electronic communication devices based on a Skype IM session of a pocket PC for NGC.
Wirel. Commun. Mob. Comput., 2011

Digital forensics of <i>WLM</i> 8.1 via check point methodology within corporate intranet in future communication security.
Secur. Commun. Networks, 2011

Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous <i>Wi</i>-<i>Fi</i> access points and the corresponding digital forensics.
Multim. Syst., 2011

Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data.
IEEE J. Sel. Areas Commun., 2011

Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

2009
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears.
J. Univers. Comput. Sci., 2009


  Loading...