2011 |
Alvaro Cardenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang and Shankar Sastry, "Attacks Against Process Control Systems: Risk Assessment, Detection, and Response, ”accepted for publication by the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). |
2011 |
B.T. Chen and Y.L. Huang, “The Design and Implementation of a Multi-core Supported Network Intrusion Detection System,”the 20th Cryptology and Information Security Conference (CISC 2010), Taiwan, 2010. |
2011 |
蔡欣宜、王继伟、陈柏廷、黄育纶、谢续平, “基于虚拟装置之无线网络安全测试平台,” the 20th Cryptology and Information Security Conference (CISC 2010), Taiwan, 2010. |
2011 |
Zong-Syun Lin, Alvaro Cardenas, Saurabh Amin, Hsinyi Tsai, Y. L. Huang and Shankar Sastry,“Security Analysis for Process Control Systems,”the 16th ACM Conference on Computer and Communications Security, 2009. |
2011 |
Y. L. Huang, C. Y. Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin, "Provable Secure AKA Scheme with Reliable Key Delegation in UMTS," The 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, Shanghai, China, July 8-10, 2009. |
2011 |
Z. S. Lin, A. Cardenas, H. Y. Tsai, S. Amin, Y. L. Huang and S. Sastry, “Understanding the Physical Consequences of Attacks on Control Systems,” Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 22 - 25, 2009 |
2011 |
Y. L. Huang, J. D. Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, S. P. Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong, “SWOON: A Testbed for Secure Wireless Overlay Networks,” USENIX Workshop on Cyber Security Experimentation and Test (CSET’08), San Jose, July 28, 2008. |
2011 |
Y. L. Huang, J. S. Hu, “Design Methodology and Hands-on Practices for Embedded Operating Systems,” The 1st Asia-Pacific Workshop on Embedded System Education and Research (APESER 2007), Dec. 7, 2007. |
2011 |
Y. L. Huang, P. H. Lu, M. Newlin Rajkumar, C. T. Hsu, “Secure and Fast Authentication Protocol for Wireless Networks in Homecare Systems,” in the proceeding of 2007 CACS Automatic Control Conference, Nov. 9-10, 2007. |
2011 |
Y. L. Huang, E. C. Hsia, J. S. Hu, “The Design and Implementation of an Embedded Software Architecture for Intelligent Robots (ESAIR), ” in the procedding of International Conference on Open Source, Nov 1-4, 2007. |
2011 |
Y. L. Huang, J. S. Hu, “The Curriculum and Teaching Laboratory for Embedded Systems,” 2007 Workshop on Embedded System Education, Oct. 4-5, Salzburg, Austria. |
2011 |
Y. L. Huang, M. Newlin Rajkumar, E. C. Hsia, “A Hybrid Network and Software Architecture for Digital Home Care Systems,” in the proceeding of 2006 CACS Automatic Control Conference, Nov. 10-11, 2006. |
2011 |
Zao, John K.; Hu, Jwu-Sheng; Chiou, Jin-Chern; Huang, Yu-Lun; Li, Shu-Chen; Kuo, Zee-Yih; Chuang, Ming-Chuen; Hsu, Shang-Hwa; Tseng, Yu-Chee; Liu, Jane W. S.; Lin, Chin-Teng;, “Kannon: Ubiquitous Sensor/Actuator Technologies for Elderly Living and Care: A Multidisciplinary Effort in National Chiao Tung University, Taiwan”, IEEE International Conference on Systems, Man and Cybernetics, 2006 (ICSMC '06), Volume 5, 8-11 Oct. 2006 Page(s):4297 – 4303. |
2011 |
Y. L. Huang, F. S. Ho, H. Y. Tsai, H. M. Kao, “A Control Flow Obfuscation Method to Discourage Malicious Tampering of Software Codes,” in the proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS’06), March 21-24, 2006. |
2011 |
Y. L. Huang, F. S. Ho, E. C. Hsia, C. C. Tsao, “A Multi-Interface Control Infrastructure for Bio-Sensing Devices in Home Care Systems, " the 2005 CACS Automatic Control Conference, Nov. 17-19, 2005 |
2011 |
Y. L. Huang, J. S. Hu, “A Teaching Laboratory and Course Programs for Embedded Software Design”, the iCEER-2005 iNEER Conference for Engineering Education and Research, March 1-5. |
2011 |
F.S. Ho, S.P. Shieh, Y. L. Huang, K.L. Tsai, “A Service Probing and Channel Establishment Protocol across Multiple Network Address Translation Realms,” the Proceedings of 2002 International Computer Symposium, Dec. 18–21, 2002. |
2011 |
Y. L. Huang, S.P. Shieh, J.C. Wang, "Practical Key Distribution Schemes for Channel Protection," the 24th IEEE Computer Society International Computer Software and Applications Conference, Oct. 2000. |
2011 |
Y. L. Huang, S.P. Shieh, "A Fair Settlement Protocol for Online Transactions," the Proceedings of Information Security Conference, May 2000. |
2011 |
S.P. Shieh, Y. L. Huang, F.S. Ho, "A Family of Secure Network Protocols," the Proceedings of Information Security Conference, May 1996. |