I-Long Lin

According to our database1, I-Long Lin authored at least 14 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analysis of Smart Building System: Risks, Threats, and Standards.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

2014
Elucidating the role of IT/IS assessment and resource allocation in IT/IS performance in hospitals.
Inf. Manag., 2014

Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
A Study on the Integration of ISO 27001 & 27011 and the New Personal Information Protection Act in the Telecom Enterprises in Taiwan.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2011
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. Univers. Comput. Sci., 2011

A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence.
Digit. Investig., 2011

A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Research of Digital Evidence Forensics Standard Operating Procedure with Comparison and Analysis Based on Smart Phone.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Predicting vertebrate promoters using heterogeneous clusters.
Int. J. Ad Hoc Ubiquitous Comput., 2010

VoIP network forensic analysis with digital evidence procedure.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP).
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A recommender system to avoid customer churn: A case study.
Expert Syst. Appl., 2009

2008
Computer Forensics and Culture.
Proceedings of the Intelligence and Security Informatics, 2008

1993
An Information Retrieveal Model for Crime Investigation.
Proceedings of the First Pacific Asia Conference on Information Systems, 1993


  Loading...