Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Dam Control System’s Cybersecurity Testbed

    The attack on a water purification plant in Florida in February 2021 shows that there are many vulnerabilities in the ICS field, and government agencies and experts are actively proposing industrial control sy...

    I-Hsien Liu, Jie-Shin Chen, Kuan-Ming Su in Advances in Intelligent Information Hiding… (2023)

  2. No Access

    Chapter and Conference Paper

    A Survey on SCADA Security and Honeypot in Industrial Control System

    Nowadays, the infrastructure employs SCADA (supervisory control and data acquisition) system for monitoring, such as power plants, reservoir, manufacturing, and logistics industry. With the rapid development o...

    Kuan-Chu Lu, I-Hsien Liu, Meng-Wei Sun in Recent Trends in Data Science and Soft Com… (2019)

  3. No Access

    Chapter and Conference Paper

    Distributed Node Scheduling Algorithms for Multiple Group Communications in Wireless Multi-hop Networks

    We study the scheduling problem in performing multiple multicast communications in wireless multi-hop networks, it is necessary to ensure that each multicast group can complete one transmission from the source...

    I-Hsien Liu, Chuan-Gang Liu, Kun-Hsuan Liu in Quality, Reliability, Security and Robustn… (2017)

  4. No Access

    Chapter and Conference Paper

    Defending Cloud Computing Environment Against the Challenge of DDoS Attacks Based on Software Defined Network

    With the explosive growth of cloud computing, virtualization technology has become more and more mature. However, it also increases the complexity of the network topology and causes many new important issues. ...

    Shuen-Chih Tsai, I-Hsien Liu, Chien-Tung Lu in Advances in Intelligent Information Hiding… (2017)

  5. No Access

    Article

    Novel Advanced Broadcast Scheme for Efficient Safety Message Collision Alleviation in Vehicular Networks

    Safety message broadcasting may cause a broadcast storm in vehicular ad-hoc network without an effective feedback mechanism. In particular, with increasing number of vehicles, serious collisions and incurred l...

    Chien-Tung Lu, Chih-Lun Chang, I-Hsien Liu in Wireless Personal Communications (2014)

  6. No Access

    Article

    A lightweight identity authentication protocol for vehicular networks

    In vehicular ad-hoc networks (VANETs), vehicles perform a handover procedure in order to connect to the next RSU. In general, the handover procedure comprises two stages, namely searching for an appropriate ro...

    Jung-Shian Li, Kun-Hsuan Liu in Telecommunication Systems (2013)

  7. No Access

    Chapter and Conference Paper

    Traffic-Oriented STDMA Scheduling in Multi-hop Wireless Networks

    For complicated traffic-oriented transmissions (e.g., multiple multicasting) in Spatial Time Division Multiple Access (STDMA) network, scheduling algorithms are employed to determine an efficient assignment fo...

    Jung-Shian Li, Kun-Hsuan Liu, Chun-Yen Wang in Recent Progress in Data Engineering and In… (2012)

  8. No Access

    Article

    Differentiated recovery in WDM networks

    A scheme is proposed for supporting dual-failure priority-aware survivability in wavelength division multiplexing (WDM) networks with two classes of working traffic by means of a proportional spare capacity al...

    Jung-Shian Li, Ching-Fang Yang in Photonic Network Communications (2011)