Chi-Hsiang Hung

Learn More
In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and(More)
To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor, called as key distribution server (KDS), generates a key matrix and establishes a quorum system from the key matrix. The quorum system is a set system of subsets that(More)
One of the killer applications for Radio frequency identification (RFID) system is the automatic identification of physical objects. To do that, each object must be labeled with a RFID tag containing identifying data. However, collisions occur when several tags send their data simultaneously. This paper proposes a secure scheme for zero-collision RFID tags(More)
A folic acid-anchored, poly(ethylene glycol)-linked (PEGgylated) phospholipid and an immunoaffinity chromatographic column were prepared and employed to develop a liposomal immunodiagnostic assay for the direct determination of folic acid (FA) in this study. Distearoylphosphatidylethanolamine-poly(ethylene glycol)2000-folic acid (DSPE-PEG2000-FA) was(More)
Although biotin is an important vitamin for cellular function and growth, there are no rapid, simple, and reliable analytical tools available for its quantitation in bodily fluids or foodstuffs. In this study, we developed an immunoaffinity chromatographic biosensing system for the direct determination of biotin. A stationary phase having affinity for(More)
Compared with current distributed networks, Software defined networking is an innovative technology to manage networks by a centralized controller with global visibility. OpenFlow is one kind of SDN protocols. It provides flow-level controllability of network traffic to simplify the management of the administrators of data center. Flow control rules used by(More)
  • 1