Dwen-Ren Tsai
Chinese Culture University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dwen-Ren Tsai.
international carnahan conference on security technology | 2003
Dwen-Ren Tsai; Wen-Pin Tai; Chi-Fang Chang
We propose a hybrid intelligent intrusion detection system to recognize novel attacks. Current works in intrusion detection solve the anomaly detection and the misuse detection. The misuse detection cannot recognize the new types of intrusions; while the abnormal detection also suffers from the false alarms. The mechanism to detect new forms of attacks in the systems will be the most important issue for intrusion detection For this purpose, we apply the neural network approach to learn the attack definitions and the fuzzy inference approach to describe the relations of attack properties for recognition This study concentrates the focus on detecting distributed denial of service attacks to develop this system. Experiment results will verify the performance of the model.
international carnahan conference on security technology | 2009
Chi-Hsiang Wang; Dwen-Ren Tsai
In response to the diversification and the rapid evolution of business environment, it is a rising tendency that organization needs to adopt some relevant management systems in order to continuously reinforce its information management mechanisms. Meanwhile, the arrangement for introducing any new management system needs to comply with a series of regulatory procedures and standards. In order to exert and maintain multiple management systems in an efficient as well as better quality way, their common/similar management functionalities should be integrated and modularized. For instance, consider the internal control systems of both ISO 9001 Quality Management and ISO 27001 Information Security Management in terms of their documents and records control, correction and prevention, internal audit, management review, and the cyclic management of Plan-Do-Check-Act (PDCA). How to achieve an effective integration and modularization, with an organizations current resources is an important task for the organization in order to carry out its management improvement This research centers on comparison as well as integration of the internal control systems of both ISO 9001 Quality Management and ISO 27001 Information Security Management. We explore the commonality of these two management systems and then proceed to integrate them into an effective management model. We anticipate that such management integration model will benefit the intended management of an organization very efficiently. We adopt an exploratory hypothesis research method to proceed toward our research goal. Then we present our research result with a case study on a private enterprise whose information process center is located across the country. This integration work is still in progress and intends to implement the PDCA cyclic management mechanism for integrated ISO management systems.
IEEE Transactions on Consumer Electronics | 2012
Yuan-Chih Yu; Shing-chern D. You; Dwen-Ren Tsai
In this paper, we propose a prototype of smart furniture for the smart home-a magic mirror table. The proposed system has a camera to capture the viewers facial expression. By analyzing the expressions, the system is able to determine the emotion of the viewer. If the viewer is in a negative emotion, the system then speaks positive sentences and plays the viewers favorite music to alleviate his/her emotion. The experimental results confirm that the system is able to relieve the sad mood of the viewer. In addition, the proposed system can serve as a calendar for event reminding.
international carnahan conference on security technology | 2009
Allen Y. Chang; Dwen-Ren Tsai; Chang-Lung Tsai; Yong-Jiang Lin
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.
international carnahan conference on security technology | 2009
Dwen-Ren Tsai; Allen Y. Chang; Peichi Liu; Hsuan-Chang Chen
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.
international carnahan conference on security technology | 2010
Dwen-Ren Tsai; Allen Y. Chang; Sheng-Chieh Chung; You Sheng Li
In the past few years, social networking websites such as Facebook and Myspace become very popular. The usage rage of social networking websites even exceeds that of Google. Followed by the popularity is many potential networking threats. How to prevent and improve these threats to avoid their expansion has become a major challenge.
international conference on consumer electronics | 2012
Yuan-Chih Yu; Shing-chern D. You; Dwen-Ren Tsai
Social awareness is the next-generation challenge of aware computing. The ability to understand and manage social signals from the interaction between teacher and students becomes an emergence need for intelligent service on the smart classroom. Social signals like stress, politeness, and disagreement can reveal important feedback to improve the teaching, learning and assessment method in the learning process delivering. By embedding social intelligence into classroom, we confirmed the benefits as helping teachers know each student learning state, negotiating conflicts between teaching and learning, building social awareness on e-learning system, and reaching class consensus to improve learning satisfaction.
international conference on advanced learning technologies | 2010
Yuan-Chih Yu; Shing-chern D. You; Dwen-Ren Tsai
Classroom usually has a timetable plate embedded on the wall near the front door. However, the only purpose for displaying classroom’s timetable cannot fulfill the future digital classroom requirement. They need more automatic, integrated, and intelligent functionality in the classroom environment. Besides, the vision of future smart classroom is to select sustainable technology solutions that have the possibilities of dramatically improving the instructional delivery process and to engage the student in their learning experience. Therefore, the aspiration for providing more intelligent capability will go back to the improvement of classroom environment itself. Within the classroom, how to create a smart space is our goal. By means of introducing smart timetable plate, we can create a new use case for the application of smart classroom. The creative model not only bring the new style school living but also encourage the reform of traditional classroom environment.
international carnahan conference on security technology | 2010
Dwen-Ren Tsai; Hui-An Sang
Information flow and business workflow within an organization are close related. While organizational information infrastructures becomes more and more complex, disasters or accidents usually cause serious damages and losses to organizations and individuals, sometimes even force companies to withdraw from markets. Hence, many organizations consider disaster recovery as an important issue regarding to their business continuity managements. Disaster recovery allows an organization restore its business from consequences of various accidents. However, the consequences of an accident on a system usually depend on the statuses of systems interconnected to the system. While evaluating system risks, interdependent systems should be considered together. Usually under cost constrains, organizations seldom adopt N-to-N schemes while implementing their backup systems. In this paper, we propose a system backup model based on risk dependency considering overall availability of interconnected mutual backup systems. There are four types of interdependencies in information systems, fully dependent, partially dependent, multiple dependent and indirect dependent will be defined. The overall availability of systems with fundamental interconnection topologies, serial connection and parallel connection, will also be discussed and calculated in detail.
intelligent information hiding and multimedia signal processing | 2010
Kuo-Kai Hsu; Dwen-Ren Tsai
In today’s Digital Libraries, mobile devices belong to readers often move from one network to the other frequently. Communications with a fixed support infrastructure may not be suitable for original library applications. Ubiquitous computing environments need to be deployed for new library era. This paper discusses the role of Mobile ad hoc networks (MANET) in the Library. A case study is discussed with educational purposes.