Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chen-Chi Shing is active.

Publication


Featured researches published by Chen-Chi Shing.


Archive | 2011

A Security Risk Model Using Game Theory

Marn-Ling Shing; Chen-Chi Shing

This paper uses game theory to model the strategies against the threats based on the cost.If the frequencies of threats occurrence are known, the optimal pure strategy can be found by expected effectiveness. However, if those frequencies are unknown, the optimal strategy is a mixed strategy provided by game theory. The problem can also be solved by linear programming method.


international symposium on electronic commerce and security | 2010

Information Security Risk Assessment Using Markov Models

Marn-Ling Shing; Chen-Chi Shing

Risk assessment is important in assessing the security states in information security. This paper proposed to use Markov models to assess the risk of information security. The simulation results were shown using different distributions.


fuzzy systems and knowledge discovery | 2009

Validating a Two Category Secured Access Database Model

Marn-Ling Shing; Chen-Chi Shing; Kuo Lane Chen; Huei Lee

Unauthorized attempts to access database and data warehouse in a data mining system are unavoidable. The privileged group and the public group are involved in a secured data mining system. The privileged group may take four different actions and the public group who has only two different “read” privileges. In this paper this two category secured access database model by semi-Markov chains is discussed. It shows how to validate this simplified two category secured access database model.


asia-pacific conference on information processing | 2009

Confidentiality Simulation in a Simplified Database Model

Marn-Ling Shing; Chen-Chi Shing; Kuo Lane Chen; Huei Lee

In an e-commerce environment, databases are accesses constantly. This paper looks into the confidentiality issues involved in a simplified database access. In a simplified secured database access model, there are two groups involved: privileged group and public group which they can access data with any distribution. In order to secure the confidentiality policy of the database, this paper shows how to simulate an Erlang distribution which is used in a proposed semi-Markov chains.


Communications of the IIMA | 2007

Modeling in Confidentiality and Integrity for a Supply Chain Network

Kuo Lane Chen; Marn-Ling Shing; Huei Lee; Chen-Chi Shing


international workshop on education technology and training & international workshop on geoscience and remote sensing | 2008

A Simulation Study of Confidentiality Modeling in a Secured Supply Chain Network

Marn-Ling Shing; Chen-Chi Shing; Kuo Lane Chen; Huei Lee


International Journal of Electronics and Electrical Engineering | 2016

Smartphone Security Risks: Android

Lee Pin Shing; Lee Hur Shing; Chen-Chi Shing; Meng Chu Chiang; Che Wei Yang; Tzu-Chieh Lu; Marn-Ling Shing


Advances in Management and Applied Economics | 2012

An Optimization Approach In Information Security Risk Management

Marn-Ling Shing; Chen-Chi Shing; Lee-Pin Shing; Lee-Hur Shing


Proceedings of the 2018 3rd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2018) | 2018

Test Spark Installation on Linux Clusters

Lee-Hur Shing; Lee-Pin Shing; Marn-Ling Shing; Chen-Chi Shing


fuzzy systems and knowledge discovery | 2015

Vulnerabilities of radio frequencies

LeeHur Shing; Jessica Astacio; Alejandro Figueroa; Chen-Chi Shing

Collaboration


Dive into the Chen-Chi Shing's collaboration.

Top Co-Authors

Avatar

Marn-Ling Shing

Taipei Municipal University of Education

View shared research outputs
Top Co-Authors

Avatar

Huei Lee

Eastern Michigan University

View shared research outputs
Top Co-Authors

Avatar

Kuo Lane Chen

California State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge