default search action
Hai-Cheng Chu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j18]Hai-Cheng Chu, Chun-Hsien Sung, Hui-Lin Lee:
The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect. Mob. Networks Appl. 24(3): 829-838 (2019) - 2016
- [j17]Hai-Cheng Chu, Minghao Yin, Ching-Hsien Hsu, Jong Hyuk Park:
The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia. Multim. Tools Appl. 75(22): 14039-14055 (2016) - [j16]Hai-Cheng Chu, Han-Chieh Chao:
Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts. Secur. Commun. Networks 9(11): 1405-1416 (2016) - [j15]Ching-Hsien Hsu, Shangguang Wang, Daqiang Zhang, Hai-Cheng Chu, Ning Lu:
Efficient identity authentication and encryption technique for high throughput RFID system. Secur. Commun. Networks 9(15): 2581-2591 (2016) - [j14]Hai-Cheng Chu, Gai-Ge Wang, Der-Jiunn Deng:
The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows. Secur. Commun. Networks 9(18): 5698-5709 (2016) - 2015
- [j13]Ching-Hsien Hsu, Tai-Lung Chen, Chao-Tung Yang, Hai-Cheng Chu:
Scheduling contention-free broadcasts in heterogeneous networks. Int. J. Commun. Syst. 28(5): 952-971 (2015) - [j12]Hai-Cheng Chu, Gai-Ge Wang, Jong Hyuk Park:
The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era. Symmetry 7(2): 383-394 (2015) - [j11]Hai-Cheng Chu, Jong Hyuk Park:
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment. Symmetry 7(2): 546-560 (2015) - [c5]Luyao Xu, Hai-Cheng Chu:
The Cooperation Mechanism of Multi-agent Systems with Respect to Big Data from Customer Relationship Management Aspect. ACIIDS (1) 2015: 562-572 - 2014
- [j10]Hai-Cheng Chu, Szu-Wei Yang, Ching-Hsien Hsu, Jong Hyuk Park:
Digital evidence discovery of networked multimedia smart devices based on social networking activities. Multim. Tools Appl. 71(1): 219-234 (2014) - [j9]Hai-Cheng Chu:
The digital forensics of GPS path records and the discovery of previous Facebook IDs on a Pocket PC PDA. Secur. Commun. Networks 7(12): 2627-2636 (2014) - 2013
- [j8]Hai-Cheng Chu, Chi-Hsiang Lo, Han-Chieh Chao:
The disclosure of an Android smartphone's digital footprint respecting the Instant Messaging utilizing Skype and MSN. Electron. Commer. Res. 13(3): 399-410 (2013) - [i1]Ching-Hsien Hsu, Daqiang Zhang, Chao-Tung Yang, Hai-Cheng Chu:
An Efficient Method for Optimizing RFID Reader Deployment and Energy Saving. CoRR abs/1305.3338 (2013) - 2012
- [j7]Hai-Cheng Chu, Szu-Wei Yang, Jong Hyuk Park:
A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition. Secur. Commun. Networks 5(10): 1193-1198 (2012) - [c4]Hai-Cheng Chu, Szu-Wei Yang:
Innovative Semantic Web Services for Next Generation Academic Electronic Library via Web 3.0 via Distributed Artificial Intelligence. ACIIDS (1) 2012: 118-124 - [c3]Fei-Wen Hsiao, Hai-Cheng Chu, Szu-Wei Yang, Kuo-Hsivng Chang:
Information retrieval concerning attitudinal and motivational antecedents of contribution concerning web 2.0 online rescue activities based on the pervasive it education. ICMLC 2012: 1884-1889 - [c2]Hai-Cheng Chu, Szu-Wei Yang, Shiuh-Jeng Wang, Jong Hyuk Park:
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone. ITCS 2012: 171-178 - 2011
- [j6]Hai-Cheng Chu, Der-Jiunn Deng, Jong Hyuk Park:
Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data. IEEE J. Sel. Areas Commun. 29(7): 1368-1376 (2011) - [j5]Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao:
Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics. Multim. Syst. 17(4): 341-349 (2011) - [j4]Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao:
Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security. Secur. Commun. Networks 4(9): 1044-1062 (2011) - [j3]Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao:
The digital forensics of portable electronic communication devices based on a Skype IM session of a pocket PC for NGC. Wirel. Commun. Mob. Comput. 11(2): 211-225 (2011) - [j2]Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao:
An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments. Wirel. Pers. Commun. 56(1): 5-19 (2011) - [c1]Hai-Cheng Chu, Li-Wei Wu, Hsiang-Ming Yu, Jong Hyuk Park:
Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example. STA Workshops 2011: 41-49
2000 – 2009
- 2009
- [j1]Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang:
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. J. Univers. Comput. Sci. 15(12): 2373-2386 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint