Extending the TAM model to explore the factors that affect Intention to Use an Online Learning Community
Liu, I-Fan, Chen, Meng Chang, Sun, Yeali S., Wible, David, Kuo, Chin-Hwa
Published in Computers and education (01.02.2010)
Published in Computers and education (01.02.2010)
Get full text
Journal Article
A framework of handoffs in wireless overlay networks based on mobile IPv6
Cheng Wei Lee, Cheng Wei Lee, Li Ming Chen, Li Ming Chen, Meng Chang Chen, Meng Chang Chen, Yeali Sunny Sun, Yeali Sunny Sun
Published in IEEE journal on selected areas in communications (01.11.2005)
Published in IEEE journal on selected areas in communications (01.11.2005)
Get full text
Journal Article
A novel approach to evaluate software vulnerability prioritization
Huang, Chien-Cheng, Lin, Feng-Yu, Lin, Frank Yeong-Sung, Sun, Yeali S.
Published in The Journal of systems and software (01.11.2013)
Published in The Journal of systems and software (01.11.2013)
Get full text
Journal Article
A scalable network forensics mechanism for stealthy self-propagating attacks
Chen, Li Ming, Chen, Meng Chang, Liao, Wanjiun, Sun, Yeali S.
Published in Computer communications (15.07.2013)
Published in Computer communications (15.07.2013)
Get full text
Journal Article
Behavior grouping of Android malware family
Shun-Wen Hsiao, Sun, Yeali S., Meng Chang Chen
Published in 2016 IEEE International Conference on Communications (ICC) (01.05.2016)
Published in 2016 IEEE International Conference on Communications (ICC) (01.05.2016)
Get full text
Conference Proceeding
Enhanced bulk scheduling for supporting delay sensitive streaming applications
Tu, Yung-Cheng, Chen, Meng Chang, Sun, Yeali S., Shih, Wei-Kuan
Published in Computer networks (Amsterdam, Netherlands : 1999) (10.04.2008)
Published in Computer networks (Amsterdam, Netherlands : 1999) (10.04.2008)
Get full text
Journal Article
A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services
Hsu, Hsien-Ming, Lin, Feng-Yu, Sun, Yeali Sunny, Chen, Meng Chang
Published in Journal of communications (01.02.2012)
Published in Journal of communications (01.02.2012)
Get full text
Journal Article
Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques
Huang, Chiao-Cheng, Huang, Pei-Yu, Kuo, Ying-Ren, Wong, Guo-Wei, Huang, Yi-Ting, Sun, Yeali S., Chang Chen, Meng
Published in 2022 IEEE International Conference on Big Data (Big Data) (17.12.2022)
Published in 2022 IEEE International Conference on Big Data (Big Data) (17.12.2022)
Get full text
Conference Proceeding