Chen-Chi Shing
Radford University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Chen-Chi Shing.
Archive | 2011
Marn-Ling Shing; Chen-Chi Shing
This paper uses game theory to model the strategies against the threats based on the cost.If the frequencies of threats occurrence are known, the optimal pure strategy can be found by expected effectiveness. However, if those frequencies are unknown, the optimal strategy is a mixed strategy provided by game theory. The problem can also be solved by linear programming method.
international symposium on electronic commerce and security | 2010
Marn-Ling Shing; Chen-Chi Shing
Risk assessment is important in assessing the security states in information security. This paper proposed to use Markov models to assess the risk of information security. The simulation results were shown using different distributions.
fuzzy systems and knowledge discovery | 2009
Marn-Ling Shing; Chen-Chi Shing; Kuo Lane Chen; Huei Lee
Unauthorized attempts to access database and data warehouse in a data mining system are unavoidable. The privileged group and the public group are involved in a secured data mining system. The privileged group may take four different actions and the public group who has only two different “read” privileges. In this paper this two category secured access database model by semi-Markov chains is discussed. It shows how to validate this simplified two category secured access database model.
asia-pacific conference on information processing | 2009
Marn-Ling Shing; Chen-Chi Shing; Kuo Lane Chen; Huei Lee
In an e-commerce environment, databases are accesses constantly. This paper looks into the confidentiality issues involved in a simplified database access. In a simplified secured database access model, there are two groups involved: privileged group and public group which they can access data with any distribution. In order to secure the confidentiality policy of the database, this paper shows how to simulate an Erlang distribution which is used in a proposed semi-Markov chains.
Communications of the IIMA | 2007
Kuo Lane Chen; Marn-Ling Shing; Huei Lee; Chen-Chi Shing
international workshop on education technology and training & international workshop on geoscience and remote sensing | 2008
Marn-Ling Shing; Chen-Chi Shing; Kuo Lane Chen; Huei Lee
International Journal of Electronics and Electrical Engineering | 2016
Lee Pin Shing; Lee Hur Shing; Chen-Chi Shing; Meng Chu Chiang; Che Wei Yang; Tzu-Chieh Lu; Marn-Ling Shing
Advances in Management and Applied Economics | 2012
Marn-Ling Shing; Chen-Chi Shing; Lee-Pin Shing; Lee-Hur Shing
Proceedings of the 2018 3rd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2018) | 2018
Lee-Hur Shing; Lee-Pin Shing; Marn-Ling Shing; Chen-Chi Shing
fuzzy systems and knowledge discovery | 2015
LeeHur Shing; Jessica Astacio; Alejandro Figueroa; Chen-Chi Shing